background

CVE & CWE, restez informé

Gestion des CVE et CWE : Votre bouclier contre les Menaces Cyber.

Notre plateforme CVE Find, dédiée à la gestion des CVE et CWE, offre une surveillance en temps réel des vulnérabilités et des faiblesses courantes. Cela permet à nos clients de rester constamment informés des dernières évolutions en matière de cybersécurité. Grâce à notre système d'alerte avancé, vous recevrez des notifications immédiates par SMS et email, garantissant ainsi une réactivité maximale face aux nouvelles menaces.

Avec notre service, vous pourrez sécuriser de manière optimale votre infrastructure réseau et web, renforçant ainsi la protection de vos données critiques contre les intrusions et les cyberattaques. Chez BEXXO, nous vous fournissons les outils nécessaires pour une défense robuste et proactive.

icon

Alerte par Email

icon

Alerte sur les produits que vous utilisez

icon

Déterminer l'impact des risques sur vos produits

icon

Mise à jour permanente

Explorez notre solution mondiale

Avec CVE Find, explorez la plus grande base de données de vulnérabilités au monde.

Le CVE (Common Vulnerabilities and Exposures) est une liste de failles de sécurité informatique divulguées publiquement. Le programme CVE a pour objectif de faciliter le partage des données entre les différentes capacités de détection des vulnérabilités, qu'il s'agisse d'outils, de bases de données ou de services. Il fournit également une norme pour évaluer la couverture de ces outils et services.

Accédez à CVE Find
Mise à jour permanente

Restez en avance avec les dernières failles critiques de sécurité.

Précédent
Prochain
8.8

CVE-2024-32011 - HIGH
11/11/2025

A vulnerability has been identified in Spectrum Power 4 (All versions < V4.70 SP12 Update 2). The affected application is vulnerable to run arbitrary commands via the user interface. This user interface can be used via the network and allows the execution of commands as administrative application user.

OWSAP: A08

>> Plus d'informations avec CVE Find

9.9

CVE-2025-13032 - CRITICAL
11/11/2025

Double fetch in sandbox kernel driver in Avast/AVG Antivirus <25.3  on windows allows local attacker to escalate privelages via pool overflow.

>> Plus d'informations avec CVE Find
8.8

CVE-2025-24299 - HIGH
11/11/2025

Improper input validation for some Intel(R) CIP software before version WIN_DCA_2.4.0.11001 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via network access when attack requirements are not present without sp...

OWSAP: A03

>> Plus d'informations avec CVE Find

8.8

CVE-2025-24838 - HIGH
11/11/2025

Improper privilege management for some Intel(R) CIP software before version WIN_DCA_2.4.0.11001 within Ring 3: User Applications may allow an escalation of privilege. Unprivileged software adversary with an authenticated user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via network access when attack requirements are present without sp...

priviliegemanagementOWSAP: A04

>> Plus d'informations avec CVE Find

8.2

CVE-2025-30255 - HIGH
11/11/2025

Out-of-bounds write for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.160 within Ring 2: Device Drivers may allow a denial of service. Unprivileged software adversary with an unauthenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via adjacent access when attack requirements are not present without speci...

overflow

>> Plus d'informations avec CVE Find

8.2

CVE-2025-32091 - HIGH
11/11/2025

Incorrect default permissions in some firmware for the Intel(R) Arc(TM) B-series GPUs within Ring 1: Device Drivers may allow an escalation of privilege. System software adversary with a privileged user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are not present with special internal knowledge...

OWSAP: A01

>> Plus d'informations avec CVE Find

8.8

CVE-2025-33000 - HIGH
11/11/2025

Improper input validation for some Intel QuickAssist Technology before version 2.6.0 within Ring 3: User Applications may allow an escalation of privilege. System software adversary with an authenticated user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal know...

OWSAP: A03

>> Plus d'informations avec CVE Find

8.8

CVE-2025-33186 - HIGH
11/11/2025

NVIDIA AIStore contains a vulnerability in AuthN. A successful exploit of this vulnerability might lead to escalation of privileges, information disclosure, and data tampering.

OWSAP: A07

>> Plus d'informations avec CVE Find

8.2

CVE-2025-35971 - HIGH
11/11/2025

Out-of-bounds write for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.160 within Ring 2: Device Drivers may allow a denial of service. Unprivileged software adversary with an unauthenticated user combined with a low complexity attack may enable denial of service. This result may potentially occur via adjacent access when attack requirements are not present without speci...

overflow

>> Plus d'informations avec CVE Find

8.8

CVE-2025-59499 - HIGH
11/11/2025

Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network.

sqlinjectionOWSAP: A03

>> Plus d'informations avec CVE Find

9.8

CVE-2025-60724 - CRITICAL
11/11/2025

Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.

>> Plus d'informations avec CVE Find
8.7

CVE-2025-62210 - HIGH
11/11/2025

Improper neutralization of input during web page generation ('cross-site scripting') in Dynamics 365 Field Service (online) allows an authorized attacker to perform spoofing over a network.

crosssitescriptingOWSAP: A03

>> Plus d'informations avec CVE Find

8.7

CVE-2025-62211 - HIGH
11/11/2025

Improper neutralization of input during web page generation ('cross-site scripting') in Dynamics 365 Field Service (online) allows an authorized attacker to perform spoofing over a network.

crosssitescriptingOWSAP: A03

>> Plus d'informations avec CVE Find

8.8

CVE-2025-62220 - HIGH
11/11/2025

Heap-based buffer overflow in Windows Subsystem for Linux GUI allows an unauthorized attacker to execute code over a network.

>> Plus d'informations avec CVE Find
8.8

CVE-2025-62222 - HIGH
11/11/2025

Improper neutralization of special elements used in a command ('command injection') in Visual Studio Code CoPilot Chat Extension allows an unauthorized attacker to execute code over a network.

commandinjectionOWSAP: A03

>> Plus d'informations avec CVE Find

9.8

CVE-2025-8324 - CRITICAL
11/11/2025

Zohocorp ManageEngine Analytics Plus versions 6170 and below are vulnerable to Unauthenticated SQL Injection due to the improper filter configuration.

sqlinjectionOWSAP: A03

>> Plus d'informations avec CVE Find

8.8

CVE-2025-9223 - HIGH
11/11/2025

Zohocorp ManageEngine Applications Manager versions 178100 and below are vulnerable to authenticated command injection vulnerability due to the improper configuration in the execute program action feature.

commandinjectionOWSAP: A03

>> Plus d'informations avec CVE Find

10

CVE-2025-12539 - CRITICAL
11/11/2025

The TNC Toolbox: Web Performance plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.2. This is due to the plugin storing cPanel API credentials (hostname, username, and API key) in files within the web-accessible wp-content directory without adequate protection in the "Tnc_Wp_Toolbox_Settings::save_settings" function. This makes it possib...

OWSAP: A01

>> Plus d'informations avec CVE Find

8.8

CVE-2025-12846 - HIGH
11/11/2025

The Blocksy Companion plugin for WordPress is vulnerable to authenticated arbitrary file upload in all versions up to, and including, 2.1.19. This is due to insufficient file type validation detecting SVG files, allowing double extension files to bypass sanitization while being accepted as a valid SVG file. This makes it possible for authenticated attackers, with author level access and above, to ...

fileinclusionOWSAP: A04

>> Plus d'informations avec CVE Find

8.4

CVE-2025-10714 - HIGH
11/11/2025

AXIS Optimizer was vulnerable to an unquoted search path vulnerability, which could potentially lead to privilege escalation within Microsoft Windows operating system. This vulnerability can only be exploited if the attacker has access to the local Windows machine and sufficient access rights (administrator) to write data into the installation path of AXIS Optimizer.

>> Plus d'informations avec CVE Find
Découvrez comment bexxo peut sécuriser votre entreprise. N'hésitez pas à nous contacter pour une consultation personnalisée dès aujourd'hui !
948+ CVE
Ces 7 Derniers Jours
Dernière mise à jour : 2025-11-12 08:40

Gestion des CVE et CWE : Votre bouclier contre les Menaces Cyber.

16387+ CVE - Authorization problems

8313+ CVE - Cross-Site Request Forgery

16945+ CVE - SQL Injection

39748+ CVE - Cross-site Scripting