Alertes récentes
| CVE-2022-41089 |
.NET Framework Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41886 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41884 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41890 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41891 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41895 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41901 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41907 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41909 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41889 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41888 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41894 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41897 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41899 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41908 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41893 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41911 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41896 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41898 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-45939 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-45934 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-4515 |
A flaw was found in Exuberant Ctags in the way it handles the "-o" option. This option specifies the tag filename. A crafted tag filename specified in the command line or in the configuration file results in arbitrary command execution because the externalSortTags() in sort.c calls the system(3) function in an unsafe way.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-43548 |
A OS Command Injection vulnerability exists in Node.js versions <14.21.1 <16.18.1 <18.12.1 <19.0.1 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.The fix for this issue in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 was incomplete and this new CVE is to complete the fix.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-43551 |
A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`. Then in a subsequent request it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-47941 |
An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2pdu.c omits a kfree call in certain smb2_handle_negotiate error conditions aka a memory leak.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-47942 |
An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is a heap-based buffer overflow in set_ntacl_dacl related to use of SMB2_QUERY_INFO_HE after a malformed SMB2_SET_INFO_HE command.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-47943 |
An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is an out-of-bounds read and OOPS for SMB2_WRITE when there is a large length in the zero DataOffset case.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-47520 |
An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-47521 |
An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_CHANNEL_LIST in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when parsing the operating channel attribute from Wi-Fi management frames.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-47519 |
An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_OPER_CHANNEL in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger an out-of-bounds write when parsing the channel list attribute from Wi-Fi management frames.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-47518 |
An issue was discovered in the Linux kernel before 6.0.11. Missing validation of the number of channels in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when copying the list of operating channels from Wi-Fi management frames.
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-44710 |
DirectX Graphics Kernel Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-3064 |
Excessive resource consumption in gopkg.in/yaml.v2
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2019-25085 |
GNOME gvdb gvdb-builder.c gvdb_table_write_contents_async use after free
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-23526 |
Helm contains Denial of service through schema file
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-23524 |
Helm vulnerable to Denial of service through string value parsing
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-23525 |
Helm vulnerable to Denial of service via NULL Pointer Dereference
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-41127 |
Microsoft Dynamics NAV and Microsoft Dynamics 365 Business Central (On Premises) Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-44708 |
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-44692 |
Microsoft Office Graphics Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-26804 |
Microsoft Office Graphics Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-26805 |
Microsoft Office Graphics Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-26806 |
Microsoft Office Graphics Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-47211 |
Microsoft Office Graphics Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-47212 |
Microsoft Office Graphics Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-47213 |
Microsoft Office Graphics Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-44691 |
Microsoft Office OneNote Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-44694 |
Microsoft Office Visio Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-44695 |
Microsoft Office Visio Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
| CVE-2022-44696 |
Microsoft Office Visio Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑21 | Élevée |
Page 1