Alertes récentes
| CVE-2023-23918 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-27320 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2022-0934 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-0461 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2021-20305 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2021-1252 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2021-28875 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2021-28878 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2021-23133 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2021-28965 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2021-3682 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2022-2196 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-25173 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2022-48338 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-23919 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2016-9795 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2021-29154 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2021-1386 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2021-1404 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2021-1405 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2020-36317 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2020-36323 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2021-28877 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2021-3506 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2021-3713 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2022-48339 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-24807 |
<vuln:Note Title="Mariner" Type="Tag" Ordinal="20">Mariner
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-1118 |
A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-0664 |
A flaw was found in the QEMU Guest Agent service for Windows. A local unprivileged user may be able to manipulate the QEMU Guest Agent's Windows installer via repair custom actions to elevate their privileges on the system.
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-28450 |
An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020.
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-27522 |
Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-26769 |
Buffer Overflow vulnerability found in Liblouis Lou_Trace v.3.24.0 allows a remote attacker to cause a denial of service via the resolveSubtable function at compileTranslationTabel.c.
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-26768 |
Buffer Overflow vulnerability found in Liblouis v.3.24.0 allows a remote attacker to cause a denial of service via the compileTranslationTable.c and lou_setDataPath functions.
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-26767 |
Buffer Overflow vulnerability found in Liblouis v.3.24.0 allows a remote attacker to cause a denial of service via the lou_logFile function at logginc.c endpoint.
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-1017 |
CERT/CC: CVE-2023-1017 TPM2.0 Module Library Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-1018 |
CERT/CC: CVE-2023-1018 TPM2.0 Module Library Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-1127 |
Divide By Zero in vim/vim
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-27986 |
emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to Emacs Lisp code injections through a crafted mailto: URI with unescaped double-quote characters. It is fixed in 29.0.90.
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-27985 |
emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to shell command injections through a crafted mailto: URI. This is related to lack of compliance with the Desktop Entry Specification. It is fixed in 29.0.90
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-28464 |
hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation.
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2022-48434 |
libavcodec/pthread_frame.c in FFmpeg before 5.1.2, as used in VLC and other products, leaves stale hwaccel state in worker threads, which allows attackers to trigger a use-after-free and execute arbitrary code in some circumstances (e.g., hardware re-initialization upon a mid-video SPS change when Direct3D11 is used).
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-24892 |
Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-23399 |
Microsoft Excel Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-23398 |
Microsoft Excel Spoofing Vulnerability
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-24930 |
Microsoft OneDrive for MacOS Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-24864 |
Microsoft PostScript and PCL6 Class Printer Driver Elevation of Privilege Vulnerability
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-24856 |
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-24858 |
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-23403 |
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑20 | Élevée |
| CVE-2023-23406 |
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
|
MSRC | 2026‑02‑20 | Élevée |
Page 1