Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 197,449 vulnerabilities

Filters
0
01000
Showing 20 of 197,449 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-58375

Rejected reason: This CVE is a duplicate of another CVE.

0.00NeutralNo
Page 154
First PageNext
No
CVE-2025-58367

### Summary [Python class pollution](https://blog.abdulrah33m.com/prototype-pollution-in-python/) is a novel vulnerability categorized under [CWE-915]...

0.00NeutralNoYes
CVE-2025-58366

Onyxia is a data science environment for kubernetes. In versions 4.6.0 through 4.8.0, Onyxia-API leaked the credentials of private helm repositories i...

0.00NeutralNoNo
CVE-2025-58365

### Impact The blog application in XWiki allowed remote code execution for any user who has edit right on any page. Normally, these are all logged-in ...

0.00NeutralNoYes
CVE-2025-58359

### Impact It was not clear that it is not possible to change `min_signers` (i.e. the threshold) with the refresh share functionality (`frost_core::k...

0.00NeutralNoYes
CVE-2025-58356

### Summary A malicious host may provide a crafted LUKS2 volume to a confidential computing guest that is using the [OpenCryptDevice](https://github.c...

0.00NeutralNoYes
CVE-2025-58354

Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In...

0.00NeutralNoNo
CVE-2025-58333

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-58332

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-58331

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-58330

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-58329

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-58328

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-58327

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-58326

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-5832

Pioneer DMH-WT7600NEX Software Update Signing Insufficient Verification of Data Authenticity Vulnerability. This vulnerability allows physically prese...

0.00NeutralNoNo
CVE-2025-58318

Delta Electronics DIAView has an authentication bypass vulnerability.

0.00NeutralNoNo
CVE-2025-5830

Autel MaxiCharger AC Wallbox Commercial DLB_SlaveRegister Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows ne...

0.00NeutralNoNo
CVE-2025-5829

Autel MaxiCharger AC Wallbox Commercial autocharge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physical...

0.00NeutralNoNo
CVE-2025-5828

Autel MaxiCharger AC Wallbox Commercial wLength Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physically present atta...

0.00NeutralNoNo