DE EN FR
hlukh.ch MàJ : 2026-02-25T15:01:21.749Z · week: 2023-W11

Alertes de sécurité

Sélectionnées à partir d'avis publics. Objectif : visibilité, contexte et export rapide — sans clickbait.

Alertes récentes
CVE-2023-23918
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2023-23918
MSRC 2026‑02‑20 Élevée
CVE-2023-27320
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2023-27320
MSRC 2026‑02‑20 Élevée
CVE-2022-0934
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2022-0934
MSRC 2026‑02‑20 Élevée
CVE-2023-0461
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2023-0461
MSRC 2026‑02‑20 Élevée
CVE-2021-20305
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2021-20305
MSRC 2026‑02‑20 Élevée
CVE-2021-1252
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2021-1252
MSRC 2026‑02‑20 Élevée
CVE-2021-28875
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2021-28875
MSRC 2026‑02‑20 Élevée
CVE-2021-28878
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2021-28878
MSRC 2026‑02‑20 Élevée
CVE-2021-23133
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2021-23133
MSRC 2026‑02‑20 Élevée
CVE-2021-28965
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2021-28965
MSRC 2026‑02‑20 Élevée
CVE-2021-3682
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2021-3682
MSRC 2026‑02‑20 Élevée
CVE-2022-2196
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2022-2196
MSRC 2026‑02‑20 Élevée
CVE-2023-25173
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2023-25173
MSRC 2026‑02‑20 Élevée
CVE-2022-48338
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2022-48338
MSRC 2026‑02‑20 Élevée
CVE-2023-23919
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2023-23919
MSRC 2026‑02‑20 Élevée
CVE-2016-9795
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2016-9795
MSRC 2026‑02‑20 Élevée
CVE-2021-29154
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2021-29154
MSRC 2026‑02‑20 Élevée
CVE-2021-1386
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2021-1386
MSRC 2026‑02‑20 Élevée
CVE-2021-1404
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2021-1404
MSRC 2026‑02‑20 Élevée
CVE-2021-1405
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2021-1405
MSRC 2026‑02‑20 Élevée
CVE-2020-36317
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2020-36317
MSRC 2026‑02‑20 Élevée
CVE-2020-36323
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2020-36323
MSRC 2026‑02‑20 Élevée
CVE-2021-28877
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2021-28877
MSRC 2026‑02‑20 Élevée
CVE-2021-3506
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2021-3506
MSRC 2026‑02‑20 Élevée
CVE-2021-3713
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2021-3713
MSRC 2026‑02‑20 Élevée
CVE-2022-48339
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2022-48339
MSRC 2026‑02‑20 Élevée
CVE-2023-24807
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
2026‑02‑20 · CVE-2023-24807
MSRC 2026‑02‑20 Élevée
CVE-2023-1118
A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
2026‑02‑20 · CVE-2023-1118
MSRC 2026‑02‑20 Élevée
CVE-2023-0664
A flaw was found in the QEMU Guest Agent service for Windows. A local unprivileged user may be able to manipulate the QEMU Guest Agent's Windows installer via repair custom actions to elevate their privileges on the system.
2026‑02‑20 · CVE-2023-0664
MSRC 2026‑02‑20 Élevée
CVE-2023-28450
An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.
2026‑02‑20 · CVE-2023-28450
MSRC 2026‑02‑20 Élevée
CVE-2023-27522
Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting
2026‑02‑20 · CVE-2023-27522
MSRC 2026‑02‑20 Élevée
CVE-2023-26769
Buffer Overflow vulnerability found in Liblouis Lou_Trace v.3.24.0 allows a remote attacker to cause a denial of service via the resolveSubtable function at compileTranslationTabel.c.
2026‑02‑20 · CVE-2023-26769
MSRC 2026‑02‑20 Élevée
CVE-2023-26768
Buffer Overflow vulnerability found in Liblouis v.3.24.0 allows a remote attacker to cause a denial of service via the compileTranslationTable.c and lou_setDataPath functions.
2026‑02‑20 · CVE-2023-26768
MSRC 2026‑02‑20 Élevée
CVE-2023-26767
Buffer Overflow vulnerability found in Liblouis v.3.24.0 allows a remote attacker to cause a denial of service via the lou_logFile function at logginc.c endpoint.
2026‑02‑20 · CVE-2023-26767
MSRC 2026‑02‑20 Élevée
CVE-2023-1017
CERT/CC: CVE-2023-1017 TPM2.0 Module Library Elevation of Privilege Vulnerability
2026‑02‑20 · CVE-2023-1017
MSRC 2026‑02‑20 Élevée
CVE-2023-1018
CERT/CC: CVE-2023-1018 TPM2.0 Module Library Elevation of Privilege Vulnerability
2026‑02‑20 · CVE-2023-1018
MSRC 2026‑02‑20 Élevée
CVE-2023-1127
Divide By Zero in vim/vim
2026‑02‑20 · CVE-2023-1127
MSRC 2026‑02‑20 Élevée
CVE-2023-27986
emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to Emacs Lisp code injections through a crafted mailto: URI with unescaped double-quote characters. It is fixed in 29.0.90.
2026‑02‑20 · CVE-2023-27986
MSRC 2026‑02‑20 Élevée
CVE-2023-27985
emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to shell command injections through a crafted mailto: URI. This is related to lack of compliance with the Desktop Entry Specification. It is fixed in 29.0.90
2026‑02‑20 · CVE-2023-27985
MSRC 2026‑02‑20 Élevée
CVE-2023-28464
hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.
2026‑02‑20 · CVE-2023-28464
MSRC 2026‑02‑20 Élevée
CVE-2022-48434
libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and other products, leaves stale hwaccel state in worker threads, which allows attackers to trigger a use-after-free and execute arbitrary code in some circumstances (e.g., hardware re-initialization upon a mid-video SPS change when Direct3D11 is used).
2026‑02‑20 · CVE-2022-48434
MSRC 2026‑02‑20 Élevée
CVE-2023-24892
Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability
2026‑02‑20 · CVE-2023-24892
MSRC 2026‑02‑20 Élevée
CVE-2023-23399
Microsoft Excel Remote Code Execution Vulnerability
2026‑02‑20 · CVE-2023-23399
MSRC 2026‑02‑20 Élevée
CVE-2023-23398
Microsoft Excel Spoofing Vulnerability
2026‑02‑20 · CVE-2023-23398
MSRC 2026‑02‑20 Élevée
CVE-2023-24930
Microsoft OneDrive for MacOS Elevation of Privilege Vulnerability
2026‑02‑20 · CVE-2023-24930
MSRC 2026‑02‑20 Élevée
CVE-2023-24864
Microsoft PostScript and PCL6 Class Printer Driver Elevation of Privilege Vulnerability
2026‑02‑20 · CVE-2023-24864
MSRC 2026‑02‑20 Élevée
CVE-2023-24856
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
2026‑02‑20 · CVE-2023-24856
MSRC 2026‑02‑20 Élevée
CVE-2023-24858
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
2026‑02‑20 · CVE-2023-24858
MSRC 2026‑02‑20 Élevée
CVE-2023-23403
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
2026‑02‑20 · CVE-2023-23403
MSRC 2026‑02‑20 Élevée
CVE-2023-23406
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
2026‑02‑20 · CVE-2023-23406
MSRC 2026‑02‑20 Élevée
Page 1