Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAdvisoryAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeExplore CVEs

Explore CVEs

Filter and search through 197,426 vulnerabilities

Filters
0
01000
Showing 20 of 197,426 results
CVE IDDescriptionCVSSPriorityTrendExploitPatch
CVE-2025-58419

Rejected reason: Not used

0.00NeutralNo
Page 129
First PageNext
No
CVE-2025-58418

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-58417

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-58416

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-58415

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-58414

Rejected reason: Not used

0.00NeutralNoNo
CVE-2025-58401

Obsidian GitHub Copilot Plugin versions prior to 1.1.7 store Github API token in cleartext form. As a result, an attacker may perform unauthorized ope...

0.00NeutralNoYes
CVE-2025-58400

RATOC RAID Monitoring Manager for Windows provided by RATOC Systems, Inc. registers a Windows service with an unquoted file path. A user with the writ...

0.00NeutralNoNo
CVE-2025-58383

A vulnerability in Brocade Fabric OS versions before 9.2.1c2 could allow an administrator-level user to execute the bind command, to escalate privileg...

0.00NeutralNoNo
CVE-2025-58382

A vulnerability in the secure configuration of authentication and management services in Brocade Fabric OS before Fabric OS 9.2.1c2 could allow an a...

0.00NeutralNoNo
CVE-2025-58381

A vulnerability in Brocade Fabric OS before 9.2.1c2 could allow an authenticated attacker with admin privileges using the shell commands “source, p...

0.00NeutralNoNo
CVE-2025-58380

A vulnerability in Brocade Fabric OS before 9.2.1 could allow an authenticated attacker with admin privileges using the shell command “grep” to modify...

0.00NeutralNoNo
CVE-2025-58379

Brocade Fabric OS before 9.2.1 has a vulnerability that could allow a local authenticated attacker to reveal command line passwords using commands tha...

0.00NeutralNoNo
CVE-2025-58375

Rejected reason: This CVE is a duplicate of another CVE.

0.00NeutralNoNo
CVE-2025-58367

### Summary [Python class pollution](https://blog.abdulrah33m.com/prototype-pollution-in-python/) is a novel vulnerability categorized under [CWE-915]...

0.00NeutralNoYes
CVE-2025-58366

Onyxia is a data science environment for kubernetes. In versions 4.6.0 through 4.8.0, Onyxia-API leaked the credentials of private helm repositories i...

0.00NeutralNoNo
CVE-2025-58365

### Impact The blog application in XWiki allowed remote code execution for any user who has edit right on any page. Normally, these are all logged-in ...

0.00NeutralNoYes
CVE-2025-58359

### Impact It was not clear that it is not possible to change `min_signers` (i.e. the threshold) with the refresh share functionality (`frost_core::k...

0.00NeutralNoYes
CVE-2025-58356

### Summary A malicious host may provide a crafted LUKS2 volume to a confidential computing guest that is using the [OpenCryptDevice](https://github.c...

0.00NeutralNoYes
CVE-2025-58354

Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In...

0.00NeutralNoNo