Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 887 vulnerabilities

Filters
0
01000
Active filters:Zero-dayClear all
Showing 20 of 887 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2017-0149

Microsoft Internet Explorer contains a memory corruption vulnerability that allows remote attackers to execute code or cause a denial-of-service (DoS)...

8.8970NeutralYes
Page 27
PreviousNext
Yes
CVE-2017-0148

The SMBv1 server in Microsoft allows remote attackers to execute arbitrary code via crafted packets.

8.1865NeutralYesYes
CVE-2017-0147

The SMBv1 server in Microsoft Windows allows remote attackers to obtain sensitive information from process memory via a crafted packet.

7.5747NeutralYesYes
CVE-2017-0146

The SMBv1 server in Microsoft Windows allows remote attackers to perform remote code execution.

8.8927NeutralYesYes
CVE-2017-0145

The SMBv1 server in multiple Microsoft Windows versions allows remote attackers to execute arbitrary code via crafted packets.

8.8927NeutralYesYes
CVE-2017-0144

The SMBv1 server in multiple Microsoft Windows versions allows remote attackers to execute arbitrary code via crafted packets.

8.8927ViralYesYes
CVE-2017-0143

Microsoft Windows Server Message Block 1.0 (SMBv1) contains an unspecified vulnerability that allows for remote code execution.

8.8927TrendingYesYes
CVE-2017-0022

Microsoft XML Core Services (MSXML) improperly handles objects in memory, allowing attackers to test for files on disk via a crafted web site.

6.5570NeutralYesYes
CVE-2017-0005

The Graphics Device Interface (GDI) in Microsoft Windows allows local users to gain privileges via a crafted application.

7.8749NeutralYesYes
CVE-2016-9299

The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java objec...

0.00NeutralYesYes
CVE-2016-9079

Mozilla Firefox, Firefox ESR, and Thunderbird contain a use-after-free vulnerability in SVG Animation, targeting Firefox and Tor browser users on Wind...

7.5811LowYesYes
CVE-2016-7892

Adobe Flash Player has an exploitable use-after-free vulnerability in the TextField class.

8.8970NeutralYesYes
CVE-2016-7855

Use-after-free vulnerability in Adobe Flash Player Windows and OS and Linux allows remote attackers to execute arbitrary code.

8.8970NeutralYesYes
CVE-2016-7256

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who succes...

8.8884NeutralYesYes
CVE-2016-7255

Microsoft Win32k kernel-mode driver fails to properly handle objects in memory which allows for privilege escalation. Successful exploitation allows a...

7.8749NeutralYesYes
CVE-2016-7193

Microsoft Office contains a memory corruption vulnerability which can allow for remote code execution.

7.8749NeutralYesYes
CVE-2016-7189

The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code via a crafted web site, aka "Scripting Engine Remote ...

0.00NeutralNoYes
CVE-2016-6909

Buffer overflow in the Cookie parser in Fortinet FortiOS 4.x before 4.1.11, 4.2.x before 4.2.13, and 4.3.x before 4.3.9 and FortiSwitch before 3.4.3 a...

0.00NeutralYesYes
CVE-2016-6415

Cisco IOS, IOS XR, and IOS XE contain insufficient condition checks in the part of the code that handles Internet Key Exchange version 1 (IKEv1) secur...

7.5747NeutralYesYes
CVE-2016-6367

A vulnerability in the command-line interface (CLI) parser of Cisco ASA software could allow an authenticated, local attacker to create a denial-of-se...

7.8891NeutralYesYes