Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 887 vulnerabilities

Filters
0
01000
Active filters:Zero-dayClear all
Showing 20 of 887 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2019-13720

Google Chrome WebAudio contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML...

8.8970NeutralYes
Page 24
PreviousNext
Yes
CVE-2019-1367

Microsoft Internet Explorer contains a memory corruption vulnerability in how the scripting engine handles objects in memory. Successful exploitation ...

7.5804NeutralYesYes
CVE-2019-1215

Microsoft Windows contains an unspecified vulnerability due to the way ws2ifsl.sys (Winsock) handles objects in memory, allowing for privilege escalat...

7.8749NeutralYesYes
CVE-2019-1214

Microsoft Windows Common Log File System (CLFS) driver improperly handles objects in memory which can allow for privilege escalation.

7.8749NeutralYesYes
CVE-2019-11708

Mozilla Firefox and Thunderbird contain a sandbox escape vulnerability that could result in remote code execution.

10.0974NeutralYesYes
CVE-2019-11707

Mozilla Firefox and Thunderbird contain a type confusion vulnerability that can occur when manipulating JavaScript objects due to issues in Array.pop,...

8.8841NeutralYesYes
CVE-2019-1132

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory.

7.8728NeutralYesYes
CVE-2019-0880

A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited the vulnerabilit...

7.8728NeutralYesYes
CVE-2019-0863

Microsoft Windows Error Reporting (WER) contains a privilege escalation vulnerability due to the way it handles files, allowing for code execution in ...

7.8814NeutralYesYes
CVE-2019-0859

Microsoft Win32k fails to properly handle objects in memory causing privilege escalation. Successful exploitation allows an attacker to run code in ke...

7.8749NeutralYesYes
CVE-2019-0808

Microsoft Win32k contains a privilege escalation vulnerability due to the component failing to properly handle objects in memory. Successful exploitat...

7.8728LowYesYes
CVE-2019-0803

Microsoft Win32k contains an unspecified vulnerability due to it failing to properly handle objects in memory causing privilege escalation. Successful...

7.8749NeutralYesYes
CVE-2019-0797

Microsoft Win32k contains a privilege escalation vulnerability when the Win32k component fails to properly handle objects in memory. Successful exploi...

7.8749NeutralYesYes
CVE-2019-0703

An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests, which could lead to information disclo...

6.5570NeutralYesYes
CVE-2019-0676

An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. An attacker who successfully exploited thi...

6.5592NeutralYesYes
CVE-2018-9206

Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0

9.8999NeutralYesYes
CVE-2018-8653

Microsoft Internet Explorer contains a memory corruption vulnerability due to how the Scripting Engine handles objects in memory, leading to remote co...

7.5804NeutralYesYes
CVE-2018-8611

A privilege escalation vulnerability exists when the Windows kernel fails to properly handle objects in memory.

7.8728NeutralYesYes
CVE-2018-8589

A privilege escalation vulnerability exists when Windows improperly handles calls to Win32k.sys. An attacker who successfully exploited this vulnerabi...

7.8749NeutralYesYes
CVE-2018-8453

Microsoft Windows Win32k contains a vulnerability that allows an attacker to escalate privileges.

7.8857LowYesYes