Alertes récentes
| CVE-2021-31944 |
3D Viewer Information Disclosure Vulnerability
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2021-31942 |
3D Viewer Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-31943 |
3D Viewer Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2020-27661 |
A divide-by-zero issue was found in dwc2_handle_packet in hw/usb/hcd-dwc2.c in the hcd-dwc2 USB host controller emulation of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host resulting in a denial of service.
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2021-3564 |
A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system. This flaw affects all the Linux kernel versions starting from 3.13.
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2021-3468 |
A flaw was found in avahi in versions 0.6 up to 0.8. The event used to signal the termination of the client connection on the avahi Unix socket is not correctly handled in the client_work function allowing a local attacker to trigger an infinite loop. The highest threat from this vulnerability is to the availability of the avahi service which becomes unresponsive after this flaw is triggered.
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2021-32027 |
A flaw was found in postgresql in versions before 13.3 before 12.7 before 11.12 before 10.17 and before 9.6.22. While modifying certain SQL array values missing bounds checks let authenticated database users write arbitrary bytes to a wide area of server memory. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2020-27748 |
A flaw was found in the xdg-email component of xdg-utils-1.1.0-rc1 and newer. When handling mailto: URIs, xdg-email allows attachments to be discreetly added via the URI when being passed to Thunderbird. An attacker could potentially send a victim a URI that automatically attaches a sensitive file to a new email. If a victim user does not notice that an attachment was added and sends the email, this could result in sensitive information disclosure. It has been confirmed that the code behind this issue is in xdg-email and not in Thunderbird.
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2021-3565 |
A flaw was found in tpm2-tools in versions before 5.1.1 and before 4.3.2. tpm2_import used a fixed AES key for the inner wrapper potentially allowing a MITM attacker to unwrap the inner portion and reveal the key being imported. The highest threat from this vulnerability is to data confidentiality.
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2021-28211 |
A heap overflow in LzmaUefiDecompressGetInfo function in EDK II.
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2020-35503 |
A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2021-23017 |
A security issue in nginx resolver was identified which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite resulting in worker process crash or potential other impact.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-3545 |
An information disclosure vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw exists in virgl_cmd_get_capset_info() in contrib/vhost-user-gpu/virgl.c and could occur due to the read of uninitialized memory. A malicious guest could exploit this issue to leak memory from the host.
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2021-32078 |
An Out-of-Bounds Read was discovered in arch/arm/mach-footbridge/personal-pci.c in the Linux kernel through 5.12.11 because of the lack of a check for a value that shouldn't be negative e.g. access to element -2 of an array aka CID-298a58e165e4.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-3546 |
An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command from the guest. It could allow a privileged guest user to crash the QEMU process on the host resulting in a denial of service condition or potential code execution with the privileges of the QEMU process.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-28210 |
An unlimited recursion in DxeCore in EDK II.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-26691 |
Apache HTTP Server mod_session response handling heap overflow
|
MSRC | 2026‑02‑21 | Critique |
| CVE-2021-31957 |
ASP.NET Core Denial of Service Vulnerability
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2021-22897 |
curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single "static" variable in the library which has the surprising side-effect that if an application sets up multiple concurrent transfers the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario this weakens transport security significantly.
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2021-22898 |
curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option known as `CURLOPT_TELNETOPTIONS` in libcurl is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables libcurl could be made to pass on uninitialized data from a stack based buffer to the server resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.
|
MSRC | 2026‑02‑21 | Faible |
| CVE-2021-22901 |
curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory libcurl might even call a function pointer in the object making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-29157 |
Dovecot before 2.3.15 allows ../ Path Traversal. An attacker with access to the local filesystem can trick OAuth2 authentication into using an HS256 validation key from an attacker-controlled location. This occurs during use of local JWT validation with the posix fs driver.
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2021-31972 |
Event Tracing for Windows Information Disclosure Vulnerability
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2021-22222 |
Infinite loop in DVB-S2-BB dissector in Wireshark 3.4.0 to 3.4.5 allows denial of service via packet injection or crafted capture file
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-31962 |
Kerberos AppContainer Security Feature Bypass Vulnerability
|
MSRC | 2026‑02‑21 | Critique |
| CVE-2021-28091 |
Lasso all versions prior to 2.7.0 has improper verification of a cryptographic signature.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-33560 |
Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm and the window size is not chosen appropriately. This for example affects use of ElGamal in OpenPGP.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2020-17541 |
Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component. A remote attacker can send a malformed jpeg file to the service and cause arbitrary code execution or denial of service of the target service.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2018-10195 |
lrzsz before version 0.12.21~rc can leak information to the receiving side due to an incorrect length check in the function zsdata that causes a size_t to wrap around.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-3588 |
memory contents disclosure in cli_feat_read_cb
|
MSRC | 2026‑02‑21 | Faible |
| CVE-2021-31978 |
Microsoft Defender Denial of Service Vulnerability
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2021-31985 |
Microsoft Defender Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-33739 |
Microsoft DWM Core Library Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-33741 |
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-34475 |
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2021-34506 |
Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2021-31199 |
Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2021-31201 |
Microsoft Enhanced Cryptographic Provider Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2021-31939 |
Microsoft Excel Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-31980 |
Microsoft Intune Management Extension Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-31940 |
Microsoft Office Graphics Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-31941 |
Microsoft Office Graphics Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-31949 |
Microsoft Outlook Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-31965 |
Microsoft SharePoint Server Information Disclosure Vulnerability
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2021-26420 |
Microsoft SharePoint Server Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-31963 |
Microsoft SharePoint Server Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-31966 |
Microsoft SharePoint Server Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-31964 |
Microsoft SharePoint Server Spoofing Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-31948 |
Microsoft SharePoint Server Spoofing Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2021-31950 |
Microsoft SharePoint Server Spoofing Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
Page 1