DE EN FR
hlukh.ch MàJ : 2026-02-25T18:01:17.263Z · week: 2022-W50

Alertes de sécurité

Sélectionnées à partir d'avis publics. Objectif : visibilité, contexte et export rapide — sans clickbait.

Alertes récentes
CVE-2022-41089
.NET Framework Remote Code Execution Vulnerability
2026‑02‑21 · CVE-2022-41089
MSRC 2026‑02‑21 Élevée
CVE-2022-41886
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-41886
MSRC 2026‑02‑21 Élevée
CVE-2022-41884
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-41884
MSRC 2026‑02‑21 Élevée
CVE-2022-41890
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-41890
MSRC 2026‑02‑21 Élevée
CVE-2022-41891
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-41891
MSRC 2026‑02‑21 Élevée
CVE-2022-41895
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-41895
MSRC 2026‑02‑21 Élevée
CVE-2022-41901
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-41901
MSRC 2026‑02‑21 Élevée
CVE-2022-41907
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-41907
MSRC 2026‑02‑21 Élevée
CVE-2022-41909
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-41909
MSRC 2026‑02‑21 Élevée
CVE-2022-41889
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-41889
MSRC 2026‑02‑21 Élevée
CVE-2022-41888
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-41888
MSRC 2026‑02‑21 Élevée
CVE-2022-41894
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-41894
MSRC 2026‑02‑21 Élevée
CVE-2022-41897
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-41897
MSRC 2026‑02‑21 Élevée
CVE-2022-41899
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-41899
MSRC 2026‑02‑21 Élevée
CVE-2022-41908
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-41908
MSRC 2026‑02‑21 Élevée
CVE-2022-41893
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-41893
MSRC 2026‑02‑21 Élevée
CVE-2022-41911
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-41911
MSRC 2026‑02‑21 Élevée
CVE-2022-41896
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-41896
MSRC 2026‑02‑21 Élevée
CVE-2022-41898
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-41898
MSRC 2026‑02‑21 Élevée
CVE-2022-45939
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-45939
MSRC 2026‑02‑21 Élevée
CVE-2022-45934
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑21 · CVE-2022-45934
MSRC 2026‑02‑21 Élevée
CVE-2022-4515
A flaw was found in Exuberant Ctags in the way it handles the "-o" option. This option specifies the tag filename. A crafted tag filename specified in the command line or in the configuration file results in arbitrary command execution because the externalSortTags() in sort.c calls the system(3) function in an unsafe way.
2026‑02‑21 · CVE-2022-4515
MSRC 2026‑02‑21 Élevée
CVE-2022-43548
A OS Command Injection vulnerability exists in Node.js versions &lt;14.21.1 &lt;16.18.1 &lt;18.12.1 &lt;19.0.1 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.The fix for this issue in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 was incomplete and this new CVE is to complete the fix.
2026‑02‑21 · CVE-2022-43548
MSRC 2026‑02‑21 Élevée
CVE-2022-43551
A vulnerability exists in curl &lt;7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`. Then in a subsequent request it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.
2026‑02‑21 · CVE-2022-43551
MSRC 2026‑02‑21 Élevée
CVE-2022-47941
An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. fs/ksmbd/smb2pdu.c omits a kfree call in certain smb2_handle_negotiate error conditions aka a memory leak.
2026‑02‑21 · CVE-2022-47941
MSRC 2026‑02‑21 Élevée
CVE-2022-47942
An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is a heap-based buffer overflow in set_ntacl_dacl related to use of SMB2_QUERY_INFO_HE after a malformed SMB2_SET_INFO_HE command.
2026‑02‑21 · CVE-2022-47942
MSRC 2026‑02‑21 Élevée
CVE-2022-47943
An issue was discovered in ksmbd in the Linux kernel 5.15 through 5.19 before 5.19.2. There is an out-of-bounds read and OOPS for SMB2_WRITE when there is a large length in the zero DataOffset case.
2026‑02‑21 · CVE-2022-47943
MSRC 2026‑02‑21 Élevée
CVE-2022-47520
An issue was discovered in the Linux kernel before 6.0.11. Missing offset validation in drivers/net/wireless/microchip/wilc1000/hif.c in the WILC1000 wireless driver can trigger an out-of-bounds read when parsing a Robust Security Network (RSN) information element from a Netlink packet.
2026‑02‑21 · CVE-2022-47520
MSRC 2026‑02‑21 Élevée
CVE-2022-47521
An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_CHANNEL_LIST in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when parsing the operating channel attribute from Wi-Fi management frames.
2026‑02‑21 · CVE-2022-47521
MSRC 2026‑02‑21 Élevée
CVE-2022-47519
An issue was discovered in the Linux kernel before 6.0.11. Missing validation of IEEE80211_P2P_ATTR_OPER_CHANNEL in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger an out-of-bounds write when parsing the channel list attribute from Wi-Fi management frames.
2026‑02‑21 · CVE-2022-47519
MSRC 2026‑02‑21 Élevée
CVE-2022-47518
An issue was discovered in the Linux kernel before 6.0.11. Missing validation of the number of channels in drivers/net/wireless/microchip/wilc1000/cfg80211.c in the WILC1000 wireless driver can trigger a heap-based buffer overflow when copying the list of operating channels from Wi-Fi management frames.
2026‑02‑21 · CVE-2022-47518
MSRC 2026‑02‑21 Élevée
CVE-2022-44710
DirectX Graphics Kernel Elevation of Privilege Vulnerability
2026‑02‑21 · CVE-2022-44710
MSRC 2026‑02‑21 Élevée
CVE-2022-3064
Excessive resource consumption in gopkg.in/yaml.v2
2026‑02‑21 · CVE-2022-3064
MSRC 2026‑02‑21 Élevée
CVE-2019-25085
GNOME gvdb gvdb-builder.c gvdb_table_write_contents_async use after free
2026‑02‑21 · CVE-2019-25085
MSRC 2026‑02‑21 Élevée
CVE-2022-23526
Helm contains Denial of service through schema file
2026‑02‑21 · CVE-2022-23526
MSRC 2026‑02‑21 Élevée
CVE-2022-23524
Helm vulnerable to Denial of service through string value parsing
2026‑02‑21 · CVE-2022-23524
MSRC 2026‑02‑21 Élevée
CVE-2022-23525
Helm vulnerable to Denial of service via NULL Pointer Dereference
2026‑02‑21 · CVE-2022-23525
MSRC 2026‑02‑21 Élevée
CVE-2022-41127
Microsoft Dynamics NAV and Microsoft Dynamics 365 Business Central (On Premises) Remote Code Execution Vulnerability
2026‑02‑21 · CVE-2022-41127
MSRC 2026‑02‑21 Élevée
CVE-2022-44708
Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability
2026‑02‑21 · CVE-2022-44708
MSRC 2026‑02‑21 Élevée
CVE-2022-44692
Microsoft Office Graphics Remote Code Execution Vulnerability
2026‑02‑21 · CVE-2022-44692
MSRC 2026‑02‑21 Élevée
CVE-2022-26804
Microsoft Office Graphics Remote Code Execution Vulnerability
2026‑02‑21 · CVE-2022-26804
MSRC 2026‑02‑21 Élevée
CVE-2022-26805
Microsoft Office Graphics Remote Code Execution Vulnerability
2026‑02‑21 · CVE-2022-26805
MSRC 2026‑02‑21 Élevée
CVE-2022-26806
Microsoft Office Graphics Remote Code Execution Vulnerability
2026‑02‑21 · CVE-2022-26806
MSRC 2026‑02‑21 Élevée
CVE-2022-47211
Microsoft Office Graphics Remote Code Execution Vulnerability
2026‑02‑21 · CVE-2022-47211
MSRC 2026‑02‑21 Élevée
CVE-2022-47212
Microsoft Office Graphics Remote Code Execution Vulnerability
2026‑02‑21 · CVE-2022-47212
MSRC 2026‑02‑21 Élevée
CVE-2022-47213
Microsoft Office Graphics Remote Code Execution Vulnerability
2026‑02‑21 · CVE-2022-47213
MSRC 2026‑02‑21 Élevée
CVE-2022-44691
Microsoft Office OneNote Remote Code Execution Vulnerability
2026‑02‑21 · CVE-2022-44691
MSRC 2026‑02‑21 Élevée
CVE-2022-44694
Microsoft Office Visio Remote Code Execution Vulnerability
2026‑02‑21 · CVE-2022-44694
MSRC 2026‑02‑21 Élevée
CVE-2022-44695
Microsoft Office Visio Remote Code Execution Vulnerability
2026‑02‑21 · CVE-2022-44695
MSRC 2026‑02‑21 Élevée
CVE-2022-44696
Microsoft Office Visio Remote Code Execution Vulnerability
2026‑02‑21 · CVE-2022-44696
MSRC 2026‑02‑21 Élevée
Page 1