Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 887 vulnerabilities

Filters
0
01000
Active filters:Zero-dayClear all
Showing 20 of 887 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2024-44068

An issue was discovered in the m2m scaler driver in Samsung Mobile Processor and Wearable Processor Exynos 9820, 9825, 980, 990, 850,and W920. A Use-A...

8.1806NeutralNo
Page 7
PreviousNext
Yes
CVE-2024-43573

Microsoft Windows MSHTML Platform contains an unspecified spoofing vulnerability which can lead to a loss of confidentiality.

8.1880NeutralYesYes
CVE-2024-43572

Microsoft Windows Management Console contains unspecified vulnerability that allows for remote code execution.

7.8814NeutralYesYes
CVE-2024-43491

Microsoft is aware of a vulnerability in Servicing Stack that has rolled back the fixes for some vulnerabilities affecting Optional Components on Wind...

9.8912NeutralNoYes
CVE-2024-43461

Microsoft Windows MSHTML Platform contains a user interface (UI) misrepresentation of critical information vulnerability that allows an attacker to sp...

8.8841NeutralYesYes
CVE-2024-43451

Microsoft Windows contains an NTLMv2 hash spoofing vulnerability that could result in disclosing a user's NTLMv2 hash to an attacker via a file open o...

6.5628NeutralYesYes
CVE-2024-43093

Android Framework contains an unspecified vulnerability that allows for privilege escalation.

7.3718NeutralYesYes
CVE-2024-43047

Multiple Qualcomm chipsets contain a use-after-free vulnerability due to memory corruption in DSP Services while maintaining memory maps of HLOS memor...

7.8857NeutralYesYes
CVE-2024-41869

Acrobat Reader versions 24.002.21005, 24.001.30159, 20.005.30655, 24.003.20054 and earlier are affected by a Use After Free vulnerability that could r...

7.8755NeutralNoYes
CVE-2024-40891

Multiple Zyxel DSL CPE devices contain a post-authentication command injection vulnerability in the management commands that could allow an authentica...

8.8999NeutralYesYes
CVE-2024-4040

CrushFTP contains an unspecified sandbox escape vulnerability that allows a remote attacker to escape the CrushFTP virtual file system (VFS).

10.0999ViralYesYes
CVE-2024-39717

The Versa Director GUI contains an unrestricted upload of file with dangerous type vulnerability that allows administrators with Provider-Data-Center-...

7.2739NeutralYesYes
CVE-2024-38226

Microsoft Publisher contains a protection mechanism failure vulnerability that allows attacker to bypass Office macro policies used to block untrusted...

7.3632NeutralYesYes
CVE-2024-38217

Microsoft Windows Mark of the Web (MOTW) contains a protection mechanism failure vulnerability that allows an attacker to bypass MOTW-based defenses. ...

5.4418NeutralYesYes
CVE-2024-38213

Microsoft Windows SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the SmartScreen user experience via a...

6.5506NeutralYesYes
CVE-2024-38193

Microsoft Windows Ancillary Function Driver for WinSock contains an unspecified vulnerability that allows for privilege escalation, enabling a local a...

7.8857NeutralYesYes
CVE-2024-38189

Microsoft Project contains an unspecified vulnerability that allows for remote code execution via a malicious file.

8.8927NeutralYesYes
CVE-2024-38178

Microsoft Windows Scripting Engine contains a memory corruption vulnerability that allows unauthenticated attacker to initiate remote code execution v...

7.5697NeutralYesYes
CVE-2024-38112

Microsoft Windows MSHTML Platform contains a spoofing vulnerability that has a high impact to confidentiality, integrity, and availability.

7.5676NeutralYesYes
CVE-2024-38107

Microsoft Windows Power Dependency Coordinator contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker t...

7.8857NeutralYesYes