Search criteria
ⓘ
Use full-text search for keyword queries.
Combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by dates instead of relevance.
10 vulnerabilities found for Azure Linux by Microsoft
CERTFR-2026-AVI-0389
Vulnerability from certfr_avis - Published: 2026-04-02 - Updated: 2026-04-02
Une vulnérabilité a été découverte dans Microsoft Azure Linux. Elle permet à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Azure Linux | azl3 frr 10.5.0-1 versions antérieures à 10.5.0-2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "azl3 frr 10.5.0-1 versions ant\u00e9rieures \u00e0 10.5.0-2",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-5107",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5107"
}
],
"initial_release_date": "2026-04-02T00:00:00",
"last_revision_date": "2026-04-02T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0389",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Microsoft Azure Linux. Elle permet \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Vuln\u00e9rabilit\u00e9 dans Microsoft Azure Linux",
"vendor_advisories": [
{
"published_at": "2026-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-5107",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-5107"
}
]
}
CERTFR-2026-AVI-0386
Vulnerability from certfr_avis - Published: 2026-04-01 - Updated: 2026-04-01
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | CBL Mariner | cbl2 nodejs18 18.20.3-12 versions antérieures à 18.20.3-12 | ||
| Microsoft | Azure Linux | azl3 telegraf 1.31.0-17 versions antérieures à 1.31.0-17 | ||
| Microsoft | CBL Mariner | cbl2 ocaml 4.13.1-3 versions antérieures à 4.13.1-3 | ||
| Microsoft | Azure Linux | azl3 ocaml 5.1.1-2 versions antérieures à 5.1.1-2 | ||
| Microsoft | Azure Linux | azl3 flannel 0.24.2-26 versions antérieures à 0.24.2-26 | ||
| Microsoft | Azure Linux | azl3 trident 0.21.0-1 versions antérieures à 0.22.0-1 | ||
| Microsoft | Azure Linux | azl3 bind 9.20.18-1 versions antérieures à 9.20.21-1 | ||
| Microsoft | CBL Mariner | cbl2 systemd-bootstrap 250.3-14 versions antérieures à 250.3-14 | ||
| Microsoft | CBL Mariner | cbl2 telegraf 1.29.4-22 versions antérieures à 1.29.4-22 | ||
| Microsoft | Azure Linux | azl3 libssh 0.10.6-6 versions antérieures à 0.10.6-6 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 nodejs18 18.20.3-12 versions ant\u00e9rieures \u00e0 18.20.3-12",
"product": {
"name": "CBL Mariner",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 telegraf 1.31.0-17 versions ant\u00e9rieures \u00e0 1.31.0-17",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 ocaml 4.13.1-3 versions ant\u00e9rieures \u00e0 4.13.1-3",
"product": {
"name": "CBL Mariner",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 ocaml 5.1.1-2 versions ant\u00e9rieures \u00e0 5.1.1-2",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 flannel 0.24.2-26 versions ant\u00e9rieures \u00e0 0.24.2-26",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 trident 0.21.0-1 versions ant\u00e9rieures \u00e0 0.22.0-1",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 bind 9.20.18-1 versions ant\u00e9rieures \u00e0 9.20.21-1",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 systemd-bootstrap 250.3-14 versions ant\u00e9rieures \u00e0 250.3-14",
"product": {
"name": "CBL Mariner",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 telegraf 1.29.4-22 versions ant\u00e9rieures \u00e0 1.29.4-22",
"product": {
"name": "CBL Mariner",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libssh 0.10.6-6 versions ant\u00e9rieures \u00e0 0.10.6-6",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-33542",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33542"
},
{
"name": "CVE-2026-29111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29111"
},
{
"name": "CVE-2026-34353",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34353"
},
{
"name": "CVE-2026-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0966"
},
{
"name": "CVE-2026-3119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3119"
},
{
"name": "CVE-2026-33750",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33750"
},
{
"name": "CVE-2026-33055",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33055"
},
{
"name": "CVE-2026-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0964"
},
{
"name": "CVE-2026-3104",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3104"
},
{
"name": "CVE-2026-33056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33056"
},
{
"name": "CVE-2026-32241",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32241"
},
{
"name": "CVE-2026-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0965"
},
{
"name": "CVE-2026-1519",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1519"
},
{
"name": "CVE-2026-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0967"
},
{
"name": "CVE-2026-3591",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3591"
}
],
"initial_release_date": "2026-04-01T00:00:00",
"last_revision_date": "2026-04-01T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0386",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33056",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33056"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-29111",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-29111"
},
{
"published_at": "2026-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-0964",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0964"
},
{
"published_at": "2026-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-34353",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-34353"
},
{
"published_at": "2026-03-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-3591",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3591"
},
{
"published_at": "2026-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-0966",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0966"
},
{
"published_at": "2026-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-0967",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0967"
},
{
"published_at": "2026-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33750",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33750"
},
{
"published_at": "2026-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-0965",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0965"
},
{
"published_at": "2026-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33542",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33542"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33055",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33055"
},
{
"published_at": "2026-03-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-1519",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-1519"
},
{
"published_at": "2026-03-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-3119",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3119"
},
{
"published_at": "2026-03-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-3104",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-3104"
},
{
"published_at": "2026-03-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32241",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32241"
}
]
}
CERTFR-2026-AVI-0381
Vulnerability from certfr_avis - Published: 2026-03-31 - Updated: 2026-03-31
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | CBL Mariner | cbl2 plexus-utils 3.3.0-3 versions antérieures à 3.3.0-4 | ||
| Microsoft | CBL Mariner | cbl2 kernel 5.15.200.1-1 versions antérieures à 5.15.202.1-1 | ||
| Microsoft | Azure Linux | azl3 python-requests 2.31.0-3 versions antérieures à 2.31.0-4 | ||
| Microsoft | CBL Mariner | cbl2 libpng 1.6.55-1 versions antérieures à 1.6.56-1 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 plexus-utils 3.3.0-3 versions ant\u00e9rieures \u00e0 3.3.0-4",
"product": {
"name": "CBL Mariner",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kernel 5.15.200.1-1 versions ant\u00e9rieures \u00e0 5.15.202.1-1",
"product": {
"name": "CBL Mariner",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 python-requests 2.31.0-3 versions ant\u00e9rieures \u00e0 2.31.0-4",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 libpng 1.6.55-1 versions ant\u00e9rieures \u00e0 1.6.56-1",
"product": {
"name": "CBL Mariner",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-25645",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25645"
},
{
"name": "CVE-2025-67030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67030"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2026-33636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33636"
},
{
"name": "CVE-2026-33416",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33416"
}
],
"initial_release_date": "2026-03-31T00:00:00",
"last_revision_date": "2026-03-31T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0381",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-31T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23169",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23169"
},
{
"published_at": "2026-03-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33416",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33416"
},
{
"published_at": "2026-03-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-67030",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-67030"
},
{
"published_at": "2026-03-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-25645",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-25645"
},
{
"published_at": "2026-03-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33636",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33636"
}
]
}
CERTFR-2026-AVI-0376
Vulnerability from certfr_avis - Published: 2026-03-30 - Updated: 2026-03-30
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | CBL Mariner | cbl2 telegraf 1.29.4-21 versions antérieures à 1.29.4-22 | ||
| Microsoft | Azure Linux | azl3 glibc 2.38-18 versions antérieures à 2.38-19 | ||
| Microsoft | Azure Linux | azl3 squid 6.13-3 versions antérieures à 6.13-4 | ||
| Microsoft | Azure Linux | azl3 python-pyasn1 0.4.8-1 versions antérieures à 0.4.8-2 | ||
| Microsoft | Azure Linux | azl3 nginx 1.28.2-1 versions antérieures à 1.28.3-1 | ||
| Microsoft | CBL Mariner | cbl2 ncurses 6.4-3 versions antérieures à 6.4-4 | ||
| Microsoft | Azure Linux | azl3 kernel 6.6.126.1-1 versions antérieures à 6.6.130.1-1 | ||
| Microsoft | Azure Linux | azl3 ncurses 6.4-2 versions antérieures à 6.4-3 | ||
| Microsoft | CBL Mariner | cbl2 terraform 1.3.2-29 versions antérieures à 1.3.2-30 | ||
| Microsoft | Azure Linux | azl3 libsoup 3.4.4-12 versions antérieures à 3.4.4-14 | ||
| Microsoft | Azure Linux | azl3 etcd 3.5.21-1 versions antérieures à 3.5.28-1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 telegraf 1.29.4-21 versions ant\u00e9rieures \u00e0 1.29.4-22",
"product": {
"name": "CBL Mariner",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 glibc 2.38-18 versions ant\u00e9rieures \u00e0 2.38-19",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 squid 6.13-3 versions ant\u00e9rieures \u00e0 6.13-4",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 python-pyasn1 0.4.8-1 versions ant\u00e9rieures \u00e0 0.4.8-2",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 nginx 1.28.2-1 versions ant\u00e9rieures \u00e0 1.28.3-1",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 ncurses 6.4-3 versions ant\u00e9rieures \u00e0 6.4-4",
"product": {
"name": "CBL Mariner",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel 6.6.126.1-1 versions ant\u00e9rieures \u00e0 6.6.130.1-1",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 ncurses 6.4-2 versions ant\u00e9rieures \u00e0 6.4-3",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 terraform 1.3.2-29 versions ant\u00e9rieures \u00e0 1.3.2-30",
"product": {
"name": "CBL Mariner",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libsoup 3.4.4-12 versions ant\u00e9rieures \u00e0 3.4.4-14",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 etcd 3.5.21-1 versions ant\u00e9rieures \u00e0 3.5.28-1",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-23318",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23318"
},
{
"name": "CVE-2026-23368",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23368"
},
{
"name": "CVE-2026-23281",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23281"
},
{
"name": "CVE-2026-32647",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32647"
},
{
"name": "CVE-2026-23269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23269"
},
{
"name": "CVE-2026-23293",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23293"
},
{
"name": "CVE-2026-23290",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23290"
},
{
"name": "CVE-2026-27651",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27651"
},
{
"name": "CVE-2026-23303",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23303"
},
{
"name": "CVE-2026-27654",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27654"
},
{
"name": "CVE-2026-23340",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23340"
},
{
"name": "CVE-2026-23253",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23253"
},
{
"name": "CVE-2026-33343",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33343"
},
{
"name": "CVE-2026-23271",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23271"
},
{
"name": "CVE-2026-23268",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23268"
},
{
"name": "CVE-2026-23285",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23285"
},
{
"name": "CVE-2026-23304",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23304"
},
{
"name": "CVE-2026-23357",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23357"
},
{
"name": "CVE-2026-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4645"
},
{
"name": "CVE-2026-23324",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23324"
},
{
"name": "CVE-2026-23347",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23347"
},
{
"name": "CVE-2026-28755",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28755"
},
{
"name": "CVE-2026-23317",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23317"
},
{
"name": "CVE-2026-23334",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23334"
},
{
"name": "CVE-2026-23391",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23391"
},
{
"name": "CVE-2026-23319",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23319"
},
{
"name": "CVE-2026-23279",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23279"
},
{
"name": "CVE-2026-23244",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23244"
},
{
"name": "CVE-2026-23246",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23246"
},
{
"name": "CVE-2026-30922",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-30922"
},
{
"name": "CVE-2026-23286",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23286"
},
{
"name": "CVE-2026-23359",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23359"
},
{
"name": "CVE-2026-23298",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23298"
},
{
"name": "CVE-2026-23296",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23296"
},
{
"name": "CVE-2026-23396",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23396"
},
{
"name": "CVE-2026-23370",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23370"
},
{
"name": "CVE-2026-23315",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23315"
},
{
"name": "CVE-2026-23352",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23352"
},
{
"name": "CVE-2026-23367",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23367"
},
{
"name": "CVE-2026-32748",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32748"
},
{
"name": "CVE-2026-23300",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23300"
},
{
"name": "CVE-2026-23379",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23379"
},
{
"name": "CVE-2026-23381",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23381"
},
{
"name": "CVE-2026-23392",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23392"
},
{
"name": "CVE-2026-23245",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23245"
},
{
"name": "CVE-2026-4438",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4438"
},
{
"name": "CVE-2026-23364",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23364"
},
{
"name": "CVE-2026-23274",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23274"
},
{
"name": "CVE-2026-23284",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23284"
},
{
"name": "CVE-2026-23397",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23397"
},
{
"name": "CVE-2026-23343",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23343"
},
{
"name": "CVE-2026-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23336"
},
{
"name": "CVE-2025-69720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69720"
},
{
"name": "CVE-2026-23289",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23289"
},
{
"name": "CVE-2026-23292",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23292"
},
{
"name": "CVE-2026-23277",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23277"
},
{
"name": "CVE-2026-4437",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4437"
},
{
"name": "CVE-2026-27784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27784"
},
{
"name": "CVE-2026-23388",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23388"
},
{
"name": "CVE-2026-28753",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28753"
},
{
"name": "CVE-2026-33526",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33526"
},
{
"name": "CVE-2026-23310",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23310"
},
{
"name": "CVE-2026-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2369"
},
{
"name": "CVE-2026-33515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33515"
},
{
"name": "CVE-2026-23395",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23395"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2026-23306",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23306"
},
{
"name": "CVE-2026-33413",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33413"
},
{
"name": "CVE-2026-23291",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23291"
},
{
"name": "CVE-2026-23382",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23382"
},
{
"name": "CVE-2026-23312",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23312"
},
{
"name": "CVE-2026-23365",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23365"
},
{
"name": "CVE-2026-23356",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23356"
},
{
"name": "CVE-2026-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23307"
},
{
"name": "CVE-2026-23398",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23398"
},
{
"name": "CVE-2026-23351",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23351"
},
{
"name": "CVE-2026-23390",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23390"
}
],
"initial_release_date": "2026-03-30T00:00:00",
"last_revision_date": "2026-03-30T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0376",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32748",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32748"
},
{
"published_at": "2026-03-22",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-4438",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4438"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23347",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23347"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23268",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23268"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23392",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23392"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23319",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23319"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23253",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23253"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23296",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23296"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23364",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23364"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23368",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23368"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-27654",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27654"
},
{
"published_at": "2026-03-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-30922",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-30922"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23286",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23286"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23396",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23396"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23340",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23340"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23324",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23324"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33515",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33515"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23318",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23318"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23379",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23379"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23317",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23317"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-27784",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27784"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23359",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23359"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23245",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23245"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23269",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23269"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23298",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23298"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23304",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23304"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23370",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23370"
},
{
"published_at": "2026-03-22",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23100",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23100"
},
{
"published_at": "2026-03-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23271",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23271"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23352",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23352"
},
{
"published_at": "2026-03-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33343",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33343"
},
{
"published_at": "2026-03-22",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-4437",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4437"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23343",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23343"
},
{
"published_at": "2026-03-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33413",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33413"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23246",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23246"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23279",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23279"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23244",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23244"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23367",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23367"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23307",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23307"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23398",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23398"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-69720",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69720"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-28755",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28755"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23300",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23300"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23381",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23381"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23356",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23356"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23351",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23351"
},
{
"published_at": "2026-03-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23277",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23277"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23315",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23315"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-4645",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4645"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33526",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33526"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23382",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23382"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23310",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23310"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23306",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23306"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23336",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23336"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-2369",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2369"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23391",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23391"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23290",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23290"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23312",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23312"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23388",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23388"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23390",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23390"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23303",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23303"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23289",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23289"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23293",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23293"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-27651",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27651"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23291",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23291"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-28753",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28753"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23334",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23334"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32647",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32647"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23397",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23397"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23281",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23281"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23365",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23365"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23285",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23285"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23292",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23292"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23284",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23284"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23395",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23395"
},
{
"published_at": "2026-03-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23274",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23274"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23357",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23357"
}
]
}
CERTFR-2026-AVI-0237
Vulnerability from certfr_avis - Published: 2026-03-05 - Updated: 2026-03-05
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Azure Linux | azl3 vitess 19.0.4-7 versions antérieures à 19.0.4-8 | ||
| Microsoft | CBL Mariner | cbl2 kernel 5.15.186.1-1 versions antérieures à 5.15.200.1-1 | ||
| Microsoft | Azure Linux | azl3 kernel 6.6.121.1-1 versions antérieures à 6.6.126.1-1 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "azl3 vitess 19.0.4-7 versions ant\u00e9rieures \u00e0 19.0.4-8",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kernel 5.15.186.1-1 versions ant\u00e9rieures \u00e0 5.15.200.1-1",
"product": {
"name": "CBL Mariner",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel 6.6.121.1-1 versions ant\u00e9rieures \u00e0 6.6.126.1-1",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-27965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27965"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2026-27969",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27969"
}
],
"initial_release_date": "2026-03-05T00:00:00",
"last_revision_date": "2026-03-05T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0237",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-22982",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22982"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-22998",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22998"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-22991",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22991"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-22997",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22997"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-54207",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-54207"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-22976",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22976"
},
{
"published_at": "2026-02-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-27965",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27965"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-71163",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-71163"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-22984",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22984"
},
{
"published_at": "2026-02-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-27969",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27969"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-22980",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22980"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-22978",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22978"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-22992",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22992"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-22999",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22999"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-22990",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22990"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-71154",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-71154"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-22977",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22977"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-71147",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-71147"
}
]
}
CERTFR-2026-AVI-0232
Vulnerability from certfr_avis - Published: 2026-03-03 - Updated: 2026-03-03
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Azure Linux | azl3 vim 9.1.1616-1 versions antérieures à 9.2.0088-1 | ||
| Microsoft | Azure Linux | azl3 erlang 26.2.5.15-1 versions antérieures à 26.2.5.17-1 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "azl3 vim 9.1.1616-1 versions ant\u00e9rieures \u00e0 9.2.0088-1",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 erlang 26.2.5.15-1 versions ant\u00e9rieures \u00e0 26.2.5.17-1",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-28422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28422"
},
{
"name": "CVE-2026-28420",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28420"
},
{
"name": "CVE-2026-28421",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28421"
},
{
"name": "CVE-2026-28417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28417"
},
{
"name": "CVE-2026-28418",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28418"
},
{
"name": "CVE-2026-28419",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28419"
}
],
"initial_release_date": "2026-03-03T00:00:00",
"last_revision_date": "2026-03-03T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0232",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-03T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2026-03-01",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-28417",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28417"
},
{
"published_at": "2026-03-01",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-28421",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28421"
},
{
"published_at": "2026-03-01",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-28419",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28419"
},
{
"published_at": "2026-03-01",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-28422",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28422"
},
{
"published_at": "2026-03-01",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-28420",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28420"
},
{
"published_at": "2026-03-01",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-28418",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28418"
}
]
}
CERTFR-2026-AVI-0228
Vulnerability from certfr_avis - Published: 2026-03-02 - Updated: 2026-03-02
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | CBL Mariner | cbl2 telegraf 1.29.4-18 versions antérieures à 1.29.4-19 | ||
| Microsoft | Azure Linux | azl3 tensorflow 2.16.1-10 versions antérieures à 2.16.1-11 | ||
| Microsoft | Azure Linux | azl3 kernel 6.6.121.1-1 versions antérieures à 6.6.126.1-1 | ||
| Microsoft | Azure Linux | azl3 telegraf 1.31.0-12 versions antérieures à 1.31.0-13 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 telegraf 1.29.4-18 versions ant\u00e9rieures \u00e0 1.29.4-19",
"product": {
"name": "CBL Mariner",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 tensorflow 2.16.1-10 versions ant\u00e9rieures \u00e0 2.16.1-11",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel 6.6.121.1-1 versions ant\u00e9rieures \u00e0 6.6.126.1-1",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 telegraf 1.31.0-12 versions ant\u00e9rieures \u00e0 1.31.0-13",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-23220",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23220"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2026-23212",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23212"
},
{
"name": "CVE-2026-23228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23228"
},
{
"name": "CVE-2026-23216",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23216"
},
{
"name": "CVE-2026-2492",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2492"
},
{
"name": "CVE-2025-71237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71237"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2026-27571",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27571"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
}
],
"initial_release_date": "2026-03-02T00:00:00",
"last_revision_date": "2026-03-02T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0228",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2026-02-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-71232",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-71232"
},
{
"published_at": "2026-02-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23222",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23222"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-22998",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-22998"
},
{
"published_at": "2026-02-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23212",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23212"
},
{
"published_at": "2026-02-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-71235",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-71235"
},
{
"published_at": "2026-02-23",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-2492",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2492"
},
{
"published_at": "2026-02-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23220",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23220"
},
{
"published_at": "2026-02-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23228",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23228"
},
{
"published_at": "2026-02-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-27571",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27571"
},
{
"published_at": "2026-02-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40082",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40082"
},
{
"published_at": "2026-02-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23216",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23216"
},
{
"published_at": "2026-02-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-71229",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-71229"
},
{
"published_at": "2026-02-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-71237",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-71237"
}
]
}
CERTFR-2026-AVI-0223
Vulnerability from certfr_avis - Published: 2026-02-27 - Updated: 2026-02-27
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | CBL Mariner | cbl2 libtiff 4.6.0-11 versions antérieures à 4.6.0-12 | ||
| Microsoft | Azure Linux | azl3 cloud-hypervisor 48.0.246-1 versions antérieures à 48.0.246-2 | ||
| Microsoft | Azure Linux | azl3 valkey 8.0.6-1 versions antérieures à 8.0.7-1 | ||
| Microsoft | Azure Linux | azl3 libtiff 4.6.0-11 versions antérieures à 4.6.0-12 | ||
| Microsoft | Azure Linux | azl3 erlang 26.2.5.15-1 versions antérieures à 26.2.5.17-1 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 libtiff 4.6.0-11 versions ant\u00e9rieures \u00e0 4.6.0-12",
"product": {
"name": "CBL Mariner",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 cloud-hypervisor 48.0.246-1 versions ant\u00e9rieures \u00e0 48.0.246-2",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 valkey 8.0.6-1 versions ant\u00e9rieures \u00e0 8.0.7-1",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libtiff 4.6.0-11 versions ant\u00e9rieures \u00e0 4.6.0-12",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 erlang 26.2.5.15-1 versions ant\u00e9rieures \u00e0 26.2.5.17-1",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21863"
},
{
"name": "CVE-2025-61144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61144"
},
{
"name": "CVE-2026-21620",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21620"
},
{
"name": "CVE-2025-61143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61143"
},
{
"name": "CVE-2025-67733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67733"
},
{
"name": "CVE-2026-27211",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27211"
}
],
"initial_release_date": "2026-02-27T00:00:00",
"last_revision_date": "2026-02-27T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0223",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61143",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61143"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-21620",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21620"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-21863",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21863"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-67733",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-67733"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61144",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61144"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-27211",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27211"
}
]
}
CERTFR-2026-AVI-0215
Vulnerability from certfr_avis - Published: 2026-02-26 - Updated: 2026-02-26
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Azure Linux | azl3 kernel 6.6.121.1-1 versions antérieures à 6.6.121.1-2 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "azl3 kernel 6.6.121.1-1 versions ant\u00e9rieures \u00e0 6.6.121.1-2",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-71230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71230"
},
{
"name": "CVE-2026-23225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23225"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2026-23223",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23223"
},
{
"name": "CVE-2026-23224",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23224"
}
],
"initial_release_date": "2026-02-26T00:00:00",
"last_revision_date": "2026-02-26T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0215",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2026-02-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23223",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23223"
},
{
"published_at": "2026-02-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23229",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23229"
},
{
"published_at": "2026-02-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23225",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23225"
},
{
"published_at": "2026-02-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23224",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23224"
},
{
"published_at": "2026-02-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-71230",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-71230"
}
]
}
CERTFR-2026-AVI-0203
Vulnerability from certfr_avis - Published: 2026-02-24 - Updated: 2026-02-24
Une vulnérabilité a été découverte dans Microsoft Azure Linux. Elle permet à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Azure Linux | azl3 zlib 1.3.1-1 versions antérieures à 1.3.2-1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "azl3 zlib 1.3.1-1 versions ant\u00e9rieures \u00e0 1.3.2-1",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-27171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27171"
}
],
"initial_release_date": "2026-02-24T00:00:00",
"last_revision_date": "2026-02-24T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0203",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Microsoft Azure Linux. Elle permet \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Vuln\u00e9rabilit\u00e9 dans Microsoft Azure Linux",
"vendor_advisories": [
{
"published_at": "2026-02-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-27171",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27171"
}
]
}