Alertes récentes
| CVE-2022-41089 |
.NET Framework Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41886 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41884 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-4127 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2022-41880 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Critique |
| CVE-2022-41890 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41891 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41895 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41901 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41907 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41909 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41889 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41888 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41894 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41900 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Critique |
| CVE-2022-41897 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41899 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41908 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41893 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41911 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41896 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41898 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-45869 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2022-45939 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-45934 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-4662 |
A flaw incorrect access control in the Linux kernel USB core subsystem was found in the way user attaches usb device. A local user could use this flaw to crash the system.
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2022-4123 |
A flaw was found in Buildah. The local path and the lowest subdirectory may be disclosed due to incorrect absolute path traversal, resulting in an impact to confidentiality.
|
MSRC | 2026‑02‑21 | Faible |
| CVE-2022-4515 |
A flaw was found in Exuberant Ctags in the way it handles the "-o" option. This option specifies the tag filename. A crafted tag filename specified in the command line or in the configuration file results in arbitrary command execution because the externalSortTags() in sort.c calls the system(3) function in an unsafe way.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-43548 |
A OS Command Injection vulnerability exists in Node.js versions <14.21.1 <16.18.1 <18.12.1 <19.0.1 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.The fix for this issue in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 was incomplete and this new CVE is to complete the fix.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-43551 |
A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`. Then in a subsequent request it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-23551 |
AAD Pod Identity obtaining token with backslash
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2021-33640 |
After tar_close() libtar.c releases the memory pointed to by pointer t. After tar_close() is called in the list() function it continues to use pointer t: free_longlink_longname(t->th_buf) . As a result the released memory is used (use-after-free).
|
MSRC | 2026‑02‑21 | Critique |
| CVE-2022-47938 |
An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2misc.c has an out-of-bounds read and OOPS for SMB2_TREE_CONNECT.
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2022-47939 |
An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2pdu.c has a use-after-free and OOPS for SMB2_TREE_DISCONNECT.
|
MSRC | 2026‑02‑21 | Critique |
| CVE-2022-47941 |
An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2pdu.c omits a kfree call in certain smb2_handle_negotiate error conditions aka a memory leak.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-47942 |
An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is a heap-based buffer overflow in set_ntacl_dacl related to use of SMB2_QUERY_INFO_HE after a malformed SMB2_SET_INFO_HE command.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-47943 |
An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is an out-of-bounds read and OOPS for SMB2_WRITE when there is a large length in the zero DataOffset case.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-46392 |
An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. An adversary with access to precise enough information about memory accesses (typically an untrusted operating system attacking a secure enclave) can recover an RSA private key after observing the victim performing a single private-key operation if the window size (MBEDTLS_MPI_WINDOW_SIZE) used for the exponentiation is 3 or smaller.
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2022-47520 |
An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-47521 |
An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_CHANNEL_LIST in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when parsing the operating channel attribute from Wi-Fi management frames.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-47519 |
An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_OPER_CHANNEL in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger an out-of-bounds write when parsing the channel list attribute from Wi-Fi management frames.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-47518 |
An issue was discovered in the Linux kernel before 6.0.11. Missing validation of the number of channels in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when copying the list of operating channels from Wi-Fi management frames.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-3110 |
An issue was discovered in the Linux kernel through 5.16-rc6. _rtw_init_xmit_priv in drivers/staging/r8188eu/core/rtw_xmit.c lacks check of the return value of rtw_alloc_hwxmits() and will cause the null pointer dereference.
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2022-3112 |
An issue was discovered in the Linux kernel through 5.16-rc6. amvdec_set_canvases in drivers/staging/media/meson/vdec/vdec_helpers.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2022-3106 |
An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2022-3111 |
An issue was discovered in the Linux kernel through 5.16-rc6. free_charger_irq() in drivers/power/supply/wm8350_power.c lacks free of WM8350_IRQ_CHG_FAST_RDY which is registered in wm8350_init_charger().
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2022-3114 |
An issue was discovered in the Linux kernel through 5.16-rc6. imx_register_uart_clocks in drivers/clk/imx/clk.c lacks check of the return value of kcalloc() and will cause the null pointer dereference.
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2022-3108 |
An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2022-3104 |
An issue was discovered in the Linux kernel through 5.16-rc6. lkdtm_ARRAY_BOUNDS in drivers/misc/lkdtm/bugs.c lacks check of the return value of kmalloc() and will cause the null pointer dereference.
|
MSRC | 2026‑02‑21 | Moyenne |
| CVE-2022-3115 |
An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.
|
MSRC | 2026‑02‑21 | Moyenne |
Page 1