background

CVE & CWE, restez informé

Gestion des CVE et CWE : Votre bouclier contre les Menaces Cyber.

Notre plateforme CVE Find, dédiée à la gestion des CVE et CWE, offre une surveillance en temps réel des vulnérabilités et des faiblesses courantes. Cela permet à nos clients de rester constamment informés des dernières évolutions en matière de cybersécurité. Grâce à notre système d'alerte avancé, vous recevrez des notifications immédiates par SMS et email, garantissant ainsi une réactivité maximale face aux nouvelles menaces.

Avec notre service, vous pourrez sécuriser de manière optimale votre infrastructure réseau et web, renforçant ainsi la protection de vos données critiques contre les intrusions et les cyberattaques. Chez BEXXO, nous vous fournissons les outils nécessaires pour une défense robuste et proactive.

icon

Alerte par Email

icon

Alerte sur les produits que vous utilisez

icon

Déterminer l'impact des risques sur vos produits

icon

Mise à jour permanente

Explorez notre solution mondiale

Avec CVE Find, explorez la plus grande base de données de vulnérabilités au monde.

Le CVE (Common Vulnerabilities and Exposures) est une liste de failles de sécurité informatique divulguées publiquement. Le programme CVE a pour objectif de faciliter le partage des données entre les différentes capacités de détection des vulnérabilités, qu'il s'agisse d'outils, de bases de données ou de services. Il fournit également une norme pour évaluer la couverture de ces outils et services.

Accédez à CVE Find
Mise à jour permanente

Restez en avance avec les dernières failles critiques de sécurité.

Précédent
Prochain
8.8

CVE-2025-13189 - HIGH
15/11/2025

A vulnerability has been found in D-Link DIR-816L 2_06_b09_beta. This affects the function genacgi_main of the file gena.cgi. The manipulation of the argument SERVER_ID/HTTP_SID leads to stack-based buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported b...

overflow

>> Plus d'informations avec CVE Find

8.8

CVE-2025-13190 - HIGH
15/11/2025

A vulnerability was found in D-Link DIR-816L 2_06_b09_beta. This vulnerability affects the function scandir_main of the file /portal/__ajax_exporer.sgi. The manipulation of the argument en results in stack-based buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used. This vulnerability only affects products that are no longer supported by the m...

overflow

>> Plus d'informations avec CVE Find

8.8

CVE-2025-13191 - HIGH
15/11/2025

A vulnerability was determined in D-Link DIR-816L 2_06_b09_beta. This issue affects the function soapcgi_main of the file /soap.cgi. This manipulation causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.

overflow

>> Plus d'informations avec CVE Find

9.8

CVE-2025-13188 - CRITICAL
14/11/2025

A vulnerability was detected in D-Link DIR-816L 2_06_b09_beta. Affected by this vulnerability is the function authenticationcgi_main of the file /authentication.cgi. Performing manipulation of the argument Password results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used. This vulnerability only affects products that are no lo...

overflow

>> Plus d'informations avec CVE Find

8.2

CVE-2025-55034 - HIGH
14/11/2025

General Industrial Controls Lynx+ Gateway is vulnerable to a weak password requirement vulnerability, which may allow an attacker to execute a brute-force attack resulting in unauthorized access and login.

OWSAP: A07

>> Plus d'informations avec CVE Find

10

CVE-2025-58083 - CRITICAL
14/11/2025

General Industrial Controls Lynx+ Gateway  is missing critical authentication in the embedded web server which could allow an attacker to remotely reset the device.

authorisationproblemOWSAP: A07

>> Plus d'informations avec CVE Find

8.6

CVE-2025-64309 - HIGH
14/11/2025

Brightpick Mission Control discloses device telemetry, configuration, and credential information via WebSocket traffic to unauthenticated users when they connect to a specific URL. The unauthenticated URL can be discovered through basic network scanning techniques.

OWSAP: A02

>> Plus d'informations avec CVE Find

8.4

CVE-2025-9317 - HIGH
14/11/2025

The vulnerability, if exploited, could allow a miscreant with read access to Edge Project files or Edge Offline Cache files to reverse engineer Edge users' app-native or Active Directory passwords through computational brute-forcing of weak hashes.

OWSAP: A02

>> Plus d'informations avec CVE Find

10

CVE-2025-54339 - CRITICAL
14/11/2025

An Incorrect Access Control vulnerability was found in the Application Server of Desktop Alert PingAlert version 6.1.0.11 to 6.1.1.2 exploitable remotely for Escalation of Privileges.

OWSAP: A01

>> Plus d'informations avec CVE Find

9.6

CVE-2025-54343 - CRITICAL
14/11/2025

An Incorrect Access Control vulnerability was found in the Application Server of Desktop Alert PingAlert version 6.1.0.11 to 6.1.1.2 exploitable remotely for Escalation of Privileges.

OWSAP: A01

>> Plus d'informations avec CVE Find

8.6

CVE-2025-63680 - HIGH
14/11/2025

Nero BackItUp in the Nero Productline is vulnerable to a path parsing/UI rendering flaw (CWE-22) that, in combination with Windows ShellExecuteW fallback extension resolution, leads to arbitrary code execution when a user clicks a crafted entry. By creating a trailing-dot folder and placing a same-basename script, Nero BackItUp renders the file as a folder icon and then invokes ShellExecuteW, whic...

directorytraversalOWSAP: A01

>> Plus d'informations avec CVE Find

9.8

CVE-2025-64446 - CRITICAL
14/11/2025

A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1, FortiWeb 7.6.0 through 7.6.4, FortiWeb 7.4.0 through 7.4.9, FortiWeb 7.2.0 through 7.2.11, FortiWeb 7.0.0 through 7.0.11 may allow an attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests.

OWSAP: A01

>> Plus d'informations avec CVE Find

9

CVE-2025-36096 - CRITICAL
13/11/2025

IBM AIX 7.2, and 7.3 and IBM VIOS 3.1, and 4.1 stores NIM private keys used in NIM environments in an insecure way which is susceptible to unauthorized access by an attacker using man in the middle techniques.

OWSAP: A04

>> Plus d'informations avec CVE Find

8.2

CVE-2025-36236 - HIGH
13/11/2025

IBM AIX 7.2, and 7.3 and IBM VIOS 3.1, and 4.1 NIM server (formerly known as NIM master) service (nimesis) could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request to write arbitrary files on the system.

directorytraversalOWSAP: A01

>> Plus d'informations avec CVE Find

10

CVE-2025-36250 - CRITICAL
13/11/2025

IBM AIX 7.2, and 7.3 and IBM VIOS 3.1, and 4.1 NIM server (formerly known as NIM master) service (nimesis) could allow a remote attacker to execute arbitrary commands due to improper process controls.  This addresses additional attack vectors for a vulnerability that was previously addressed in CVE-2024-56346.

>> Plus d'informations avec CVE Find
9.6

CVE-2025-36251 - CRITICAL
13/11/2025

IBM AIX 7.2, and 7.3 and IBM VIOS 3.1, and 4.1 nimsh service SSL/TLS implementations could allow a remote attacker to execute arbitrary commands due to improper process controls. This addresses additional attack vectors for a vulnerability that was previously addressed in CVE-2024-56347.

>> Plus d'informations avec CVE Find
8.8

CVE-2025-43515 - HIGH
13/11/2025

The issue was addressed by refusing external connections by default. This issue is fixed in Compressor 4.11.1. An unauthenticated user on the same network as a Compressor server may be able to execute arbitrary code.

OWSAP: A01

>> Plus d'informations avec CVE Find

8.8

CVE-2025-60679 - HIGH
13/11/2025

A stack buffer overflow vulnerability exists in the D-Link DIR-816A2 router firmware DIR-816A2_FWv1.10CNB05_R1B011D88210.img in the upload.cgi module, which handles firmware version information. The vulnerability occurs because /proc/version is read into a 512-byte buffer and then concatenated using sprintf() into another 512-byte buffer containing a 29-byte constant. Input exceeding 481 bytes tri...

>> Plus d'informations avec CVE Find
9.6

CVE-2025-64709 - CRITICAL
13/11/2025

Typebot is an open-source chatbot builder. In versions prior to 3.13.1, a Server-Side Request Forgery (SSRF) vulnerability in the Typebot webhook block (HTTP Request component) functionality allows authenticated users to make arbitrary HTTP requests from the server, including access to AWS Instance Metadata Service (IMDS). By bypassing IMDSv2 protection through custom header injection, attackers c...

ssrfOWSAP: A10

>> Plus d'informations avec CVE Find

8.8

CVE-2025-63406 - HIGH
13/11/2025

An issue in Intermesh BV GroupOffice vulnerable before v.25.0.47 and 6.8.136 allows a remote attacker to execute arbitrary code via the dbToApi() and eval() in the FunctionField.php

commandinjectionOWSAP: A03

>> Plus d'informations avec CVE Find

Découvrez comment bexxo peut sécuriser votre entreprise. N'hésitez pas à nous contacter pour une consultation personnalisée dès aujourd'hui !
961+ CVE
Ces 7 Derniers Jours
Dernière mise à jour : 2025-11-15 09:10

Gestion des CVE et CWE : Votre bouclier contre les Menaces Cyber.

16453+ CVE - Authorization problems

8327+ CVE - Cross-Site Request Forgery

16980+ CVE - SQL Injection

39797+ CVE - Cross-site Scripting