Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 197,454 vulnerabilities

Filters
0
01000
Showing 20 of 197,454 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-58383

A vulnerability in Brocade Fabric OS versions before 9.2.1c2 could allow an administrator-level user to execute the bind command, to escalate privileg...

0.00NeutralNo
Page 110
First PageNext
No
CVE-2025-58382

A vulnerability in the secure configuration of authentication and management services in Brocade Fabric OS before Fabric OS 9.2.1c2 could allow an a...

0.00NeutralNoNo
CVE-2025-58381

A vulnerability in Brocade Fabric OS before 9.2.1c2 could allow an authenticated attacker with admin privileges using the shell commands “source, p...

0.00NeutralNoNo
CVE-2025-58380

A vulnerability in Brocade Fabric OS before 9.2.1 could allow an authenticated attacker with admin privileges using the shell command “grep” to modify...

0.00NeutralNoNo
CVE-2025-58379

Brocade Fabric OS before 9.2.1 has a vulnerability that could allow a local authenticated attacker to reveal command line passwords using commands tha...

0.00NeutralNoNo
CVE-2025-58375

Rejected reason: This CVE is a duplicate of another CVE.

0.00NeutralNoNo
CVE-2025-58367

### Summary [Python class pollution](https://blog.abdulrah33m.com/prototype-pollution-in-python/) is a novel vulnerability categorized under [CWE-915]...

0.00NeutralNoYes
CVE-2025-58366

Onyxia is a data science environment for kubernetes. In versions 4.6.0 through 4.8.0, Onyxia-API leaked the credentials of private helm repositories i...

0.00NeutralNoNo
CVE-2025-58365

### Impact The blog application in XWiki allowed remote code execution for any user who has edit right on any page. Normally, these are all logged-in ...

0.00NeutralNoYes
CVE-2025-58359

### Impact It was not clear that it is not possible to change `min_signers` (i.e. the threshold) with the refresh share functionality (`frost_core::k...

0.00NeutralNoYes
CVE-2025-58356

### Summary A malicious host may provide a crafted LUKS2 volume to a confidential computing guest that is using the [OpenCryptDevice](https://github.c...

0.00NeutralNoYes
CVE-2025-58354

Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In...

0.00NeutralNoNo
CVE-2025-58333

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-58332

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-58331

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-58330

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-58329

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-58328

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-58327

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-58326

Rejected reason: Not used

0.00NeutralNoNo