Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 887 vulnerabilities

Filters
0
01000
Active filters:Zero-dayClear all
Showing 20 of 887 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2018-8440

An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC).

7.8728NeutralYes
Page 25
PreviousNext
Yes
CVE-2018-8414

A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths.

8.8927NeutralYesYes
CVE-2018-8373

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer.

7.5804NeutralYesYes
CVE-2018-8174

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code E...

7.5804ViralYesYes
CVE-2018-8120

A privilege escalation vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory.

7.0605TrendingYesYes
CVE-2018-5002

Adobe Flash Player have a stack-based buffer overflow vulnerability that could lead to remote code execution.

7.8857NeutralYesYes
CVE-2018-4990

Adobe Acrobat and Reader have a double free vulnerability that could lead to remote code execution.

8.8863NeutralYesYes
CVE-2018-4878

Adobe Flash Player contains a use-after-free vulnerability that could allow for code execution.

7.8857ViralYesYes
CVE-2018-19207

The Van Ons WP GDPR Compliance (aka wp-gdpr-compliance) plugin before 1.4.3 for WordPress allows remote attackers to execute arbitrary code because $w...

0.00LowYesYes
CVE-2018-18956

The ProcessMimeEntity function in util-decode-mime.c in Suricata 4.x before 4.0.6 allows remote attackers to cause a denial of service (segfault and d...

0.00NeutralNoYes
CVE-2018-15982

Adobe Flash Player com.adobe.tvsdk.mediacore.metadata Use After Free Vulnerability

7.8857RisingYesYes
CVE-2018-15454

A vulnerability in the Session Initiation Protocol (SIP) inspection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Thr...

0.00NeutralNoYes
CVE-2018-14847

MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read arbitrary files and remote authenticated attackers to write arbitrary f...

9.1987ViralYesYes
CVE-2018-10657

Matrix Synapse before 0.28.1 is prone to a denial of service flaw where malicious events injected with depth = 2<sup>63</sup> - 1 render rooms unusabl...

0.00NeutralNoYes
CVE-2018-10468

The transferFrom function of a smart contract implementation for Useless Ethereum Token (UET), an Ethereum ERC20 token, allows attackers to steal asse...

0.00NeutralYesNo
CVE-2018-10376

An integer overflow in the transferProxy function of a smart contract implementation for SmartMesh (aka SMT), an Ethereum ERC20 token, allows attacker...

0.00NeutralYesNo
CVE-2018-10299

An integer overflow in the batchTransfer function of a smart contract implementation for Beauty Ecosystem Coin (BEC), the Ethereum ERC20 token used in...

0.00NeutralYesNo
CVE-2018-0802

Microsoft Office contains a memory corruption vulnerability due to the way objects are handled in memory. Successful exploitation allows for remote co...

7.8857NeutralYesYes
CVE-2017-8759

Microsoft .NET Framework contains a remote code execution vulnerability when processing untrusted input that could allow an attacker to take control o...

7.8891ViralYesYes
CVE-2017-8543

Microsoft Windows allows an attacker to take control of the affected system when Windows Search fails to handle objects in memory.

9.8906NeutralYesYes