Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 887 vulnerabilities

Filters
0
01000
Active filters:Zero-dayClear all
Showing 20 of 887 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2016-6366

A buffer overflow vulnerability in the Simple Network Management Protocol (SNMP) code of Cisco ASA software could allow an attacker to cause a reload ...

8.8927NeutralYes
Page 28
PreviousNext
Yes
CVE-2016-5195

Race condition in mm/gup.c in the Linux kernel allows local users to escalate privileges.

7.0584ViralYesYes
CVE-2016-4657

Apple iOS WebKit contains a memory corruption vulnerability that allows attackers to execute remote code or cause a denial-of-service (DoS) via a craf...

8.8970LowYesYes
CVE-2016-4656

A memory corruption vulnerability in Apple iOS kernel allows attackers to execute code in a privileged context or cause a denial-of-service (DoS) via ...

7.8857NeutralYesYes
CVE-2016-4655

The Apple iOS kernel allows attackers to obtain sensitive information from memory via a crafted application.

5.5486LowYesYes
CVE-2016-4171

Unspecified vulnerability in Adobe Flash Player allows for remote code execution.

9.8906NeutralYesYes
CVE-2016-4117

An access of resource using incompatible type vulnerability exists within Adobe Flash Player that allows an attacker to perform remote code execution.

9.8885NeutralYesYes
CVE-2016-3714

ImageMagick contains an improper input validation vulnerability that affects the EPHEMERAL, HTTPS, MVG, MSL, TEXT, SHOW, WIN, and PLT coders. This all...

8.4900NeutralYesYes
CVE-2016-3393

A remote code execution vulnerability exists due to the way the Windows GDI component handles objects in the memory. An attacker who successfully expl...

7.8771NeutralYesYes
CVE-2016-3351

An information disclosure vulnerability exists in the way that certain functions in Internet Explorer and Edge handle objects in memory. The vulnerabi...

6.5570NeutralYesYes
CVE-2016-3298

An information disclosure vulnerability exists when the Microsoft Internet Messaging API improperly handles objects in memory. An attacker who success...

6.5570NeutralYesYes
CVE-2016-1409

The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in Cisco IOS XE 2.1 through 3.17S, IOS XR 2.0.0 through 5.3.2, and NX-OS allows ...

0.00NeutralNoYes
CVE-2016-1019

Adobe Flash Player allows remote attackers to cause a denial of service or possibly execute arbitrary code.

9.8885NeutralYesYes
CVE-2016-1010

Integer overflow vulnerability in Adobe Flash Player and AIR allows attackers to execute code.

8.8841NeutralYesYes
CVE-2016-0984

Use-after-free vulnerability in Adobe Flash Player and Adobe AIR allows attackers to execute code.

8.8970NeutralYesYes
CVE-2016-0728

The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error cas...

7.8749ViralYesYes
CVE-2016-0189

The Microsoft JScript nd VBScript engines, as used in Internet Explorer and other products, allow attackers to execute remote code or cause a denial o...

7.5804NeutralYesYes
CVE-2016-0167

Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation via a crafted application

7.8728NeutralYesYes
CVE-2016-0165

Microsoft Win32k contains an unspecified vulnerability that allows for privilege escalation.

7.8728NeutralYesYes
CVE-2016-0034

Microsoft Silverlight mishandles negative offsets during decoding, which allows attackers to execute remote code or cause a denial-of-service (DoS).

8.8927NeutralYesYes