Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 887 vulnerabilities

Filters
0
01000
Active filters:Zero-dayClear all
Showing 20 of 887 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2015-8651

Integer overflow in Adobe Flash Player allows attackers to execute code.

8.8863NeutralYes
Page 29
PreviousNext
Yes
CVE-2015-8562

Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP Us...

0.00TrendingYesYes
CVE-2015-7756

The encryption implementation in Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3...

0.00NeutralNoYes
CVE-2015-7755

Juniper ScreenOS contains an improper authentication vulnerability that could allow unauthorized remote administrative access to the device.

9.8885NeutralYesYes
CVE-2015-7645

Adobe Flash Player allows remote attackers to execute arbitrary code via a crafted SWF file.

7.8728NeutralYesYes
CVE-2015-6585

hwpapp.dll in Hangul Word Processor allows remote attackers to execute arbitrary code via a crafted heap spray, and by leveraging a "type confusion" v...

0.00NeutralYesYes
CVE-2015-6175

The kernel in Microsoft Windows contains a vulnerability that allows local users to gain privileges via a crafted application.

7.8749NeutralYesYes
CVE-2015-5123

Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allows remote attackers to execu...

9.8999NeutralYesYes
CVE-2015-5122

Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player allows remote attackers to ex...

9.8999NeutralYesYes
CVE-2015-5119

A use-after-free vulnerability exists within the ActionScript 3 ByteArray class in Adobe Flash Player that allows an attacker to perform remote code e...

9.8999LowYesYes
CVE-2015-4902

Unspecified vulnerability in Oracle Java SE allows remote attackers to affect integrity via Unknown vectors related to deployment.

5.3464NeutralYesYes
CVE-2015-4495

Moxilla Firefox allows remote attackers to bypass the Same Origin Policy to read arbitrary files or gain privileges.

8.8927NeutralYesYes
CVE-2015-3900

RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, whi...

0.00NeutralNoYes
CVE-2015-3113

Heap-based buffer overflow vulnerability in Adobe Flash Player allows remote attackers to execute code.

9.8999NeutralYesYes
CVE-2015-3043

A memory corruption vulnerability exists in Adobe Flash Player that allows an attacker to perform remote code execution.

9.8999NeutralYesYes
CVE-2015-2945

mt-phpincgi.php in Hajime Fujimoto mt-phpincgi before 2015-05-15 does not properly restrict URLs, which allows remote attackers to conduct PHP object ...

0.00NeutralNoYes
CVE-2015-2590

An unspecified vulnerability exists within Oracle Java Runtime Environment that allows an attacker to perform remote code execution.

9.8906NeutralYesYes
CVE-2015-2546

The kernel-mode driver in Microsoft Windows OS and Server allows local users to gain privileges via a crafted application.

8.2802NeutralYesYes
CVE-2015-2545

Microsoft Office allows remote attackers to execute arbitrary code via a crafted EPS image.

7.8814NeutralYesYes
CVE-2015-2509

Windows Media Center in Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8, and Windows 8.1 allows user-assisted remote attackers to execute arbitr...

0.00NeutralYesYes