Filter and search through 197,450 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2025-58379 | Brocade Fabric OS before 9.2.1 has a vulnerability that could allow a local authenticated attacker to reveal command line passwords using commands tha... | 0.0 | 0 | Neutral | No |
| No |
| CVE-2025-58375 | Rejected reason: This CVE is a duplicate of another CVE. | 0.0 | 0 | Neutral | No | No |
| CVE-2025-58367 | ### Summary [Python class pollution](https://blog.abdulrah33m.com/prototype-pollution-in-python/) is a novel vulnerability categorized under [CWE-915]... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-58366 | Onyxia is a data science environment for kubernetes. In versions 4.6.0 through 4.8.0, Onyxia-API leaked the credentials of private helm repositories i... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-58365 | ### Impact The blog application in XWiki allowed remote code execution for any user who has edit right on any page. Normally, these are all logged-in ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-58359 | ### Impact It was not clear that it is not possible to change `min_signers` (i.e. the threshold) with the refresh share functionality (`frost_core::k... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-58356 | ### Summary A malicious host may provide a crafted LUKS2 volume to a confidential computing guest that is using the [OpenCryptDevice](https://github.c... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-58354 | Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-58333 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-58332 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-58331 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-58330 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-58329 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-58328 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-58327 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-58326 | Rejected reason: Not used | 0.0 | 0 | Neutral | No | No |
| CVE-2025-5832 | Pioneer DMH-WT7600NEX Software Update Signing Insufficient Verification of Data Authenticity Vulnerability. This vulnerability allows physically prese... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-58318 | Delta Electronics DIAView has an authentication bypass vulnerability. | 0.0 | 0 | Neutral | No | No |
| CVE-2025-5830 | Autel MaxiCharger AC Wallbox Commercial DLB_SlaveRegister Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows ne... | 0.0 | 0 | Neutral | No | No |
| CVE-2025-5829 | Autel MaxiCharger AC Wallbox Commercial autocharge Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows physical... | 0.0 | 0 | Neutral | No | No |