<?xml version="1.0" encoding="UTF-8"?>
<!-- Ce plan de site a été généré dynamiquement le 23 mai 2026 à 0h39 par All in One SEO v4.8.7 - l’extension SEO originale pour WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://www.polaris-st.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Polaris Secure Technologies</title>
		<link><![CDATA[https://www.polaris-st.com]]></link>
		<description><![CDATA[Polaris Secure Technologies]]></description>
		<lastBuildDate><![CDATA[Wed, 20 May 2026 15:49:58 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://www.polaris-st.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/20/enterpriseclaw-encadre-la-proliferation-dagents-ia/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/20/enterpriseclaw-encadre-la-proliferation-dagents-ia/]]></link>
			<title>EnterpriseClaw encadre la prolifération d&#8217;agents IA</title>
			<pubDate><![CDATA[Wed, 20 May 2026 15:49:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/20/job-connect-ia-tech-recrute-dans-lit-le-15-juin-a-lille/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/20/job-connect-ia-tech-recrute-dans-lit-le-15-juin-a-lille/]]></link>
			<title>Job Connect IA &amp; Tech recrute dans l&#8217;IT le 15 juin à Lille</title>
			<pubDate><![CDATA[Wed, 20 May 2026 14:07:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/20/dell-world-2026-powerstore-elite-plus-dense-et-modulaire/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/20/dell-world-2026-powerstore-elite-plus-dense-et-modulaire/]]></link>
			<title>Dell World 2026 : PowerStore Elite plus dense et modulaire</title>
			<pubDate><![CDATA[Wed, 20 May 2026 11:30:13 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/20/les-dsi-encore-peu-impliques-dans-le-cyber-resilience-act/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/20/les-dsi-encore-peu-impliques-dans-le-cyber-resilience-act/]]></link>
			<title>Les DSI encore peu impliqués dans le Cyber resilience act</title>
			<pubDate><![CDATA[Wed, 20 May 2026 09:27:29 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/20/multiples-vulnerabilites-dans-suricata-20-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/20/multiples-vulnerabilites-dans-suricata-20-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans Suricata (20 mai 2026)</title>
			<pubDate><![CDATA[Wed, 20 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/20/multiples-vulnerabilites-dans-google-chrome-20-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/20/multiples-vulnerabilites-dans-google-chrome-20-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans Google Chrome (20 mai 2026)</title>
			<pubDate><![CDATA[Wed, 20 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/20/multiples-vulnerabilites-dans-microsoft-windows-20-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/20/multiples-vulnerabilites-dans-microsoft-windows-20-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans Microsoft Windows (20 mai 2026)</title>
			<pubDate><![CDATA[Wed, 20 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/20/multiples-vulnerabilites-dans-symfony-20-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/20/multiples-vulnerabilites-dans-symfony-20-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans Symfony (20 mai 2026)</title>
			<pubDate><![CDATA[Wed, 20 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/20/vulnerabilite-dans-wireshark-20-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/20/vulnerabilite-dans-wireshark-20-mai-2026/]]></link>
			<title>Vulnérabilité dans Wireshark (20 mai 2026)</title>
			<pubDate><![CDATA[Wed, 20 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/20/multiples-vulnerabilites-dans-les-produits-microsoft-20-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/20/multiples-vulnerabilites-dans-les-produits-microsoft-20-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans les produits Microsoft (20 mai 2026)</title>
			<pubDate><![CDATA[Wed, 20 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/20/multiples-vulnerabilites-dans-les-produits-mozilla-20-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/20/multiples-vulnerabilites-dans-les-produits-mozilla-20-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans les produits Mozilla (20 mai 2026)</title>
			<pubDate><![CDATA[Wed, 20 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/20/vulnerabilite-dans-f5-nginx-20-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/20/vulnerabilite-dans-f5-nginx-20-mai-2026/]]></link>
			<title>Vulnérabilité dans F5 NGINX (20 mai 2026)</title>
			<pubDate><![CDATA[Wed, 20 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/20/multiples-vulnerabilites-dans-docker-20-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/20/multiples-vulnerabilites-dans-docker-20-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans Docker (20 mai 2026)</title>
			<pubDate><![CDATA[Wed, 20 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/20/multiples-vulnerabilites-dans-isc-bind-20-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/20/multiples-vulnerabilites-dans-isc-bind-20-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans ISC BIND (20 mai 2026)</title>
			<pubDate><![CDATA[Wed, 20 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/20/multiples-vulnerabilites-dans-les-produits-atlassian-20-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/20/multiples-vulnerabilites-dans-les-produits-atlassian-20-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans les produits Atlassian (20 mai 2026)</title>
			<pubDate><![CDATA[Wed, 20 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/19/le-dernier-patch-tuesday-bloque-a-cause-dune-partition-efi-trop-petite/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/19/le-dernier-patch-tuesday-bloque-a-cause-dune-partition-efi-trop-petite/]]></link>
			<title>Le dernier patch tuesday bloqué à cause d&#8217;une partition EFI trop petite</title>
			<pubDate><![CDATA[Tue, 19 May 2026 14:44:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/19/en-croissance-cisco-supprime-4-000-emplois/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/19/en-croissance-cisco-supprime-4-000-emplois/]]></link>
			<title>En croissance, Cisco supprime 4 000 emplois</title>
			<pubDate><![CDATA[Tue, 19 May 2026 14:22:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/19/conference-cio-la-dependance-aux-technologies-americaines-bien-tenace/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/19/conference-cio-la-dependance-aux-technologies-americaines-bien-tenace/]]></link>
			<title>Conférence CIO : la dépendance aux technologies américaines bien tenace</title>
			<pubDate><![CDATA[Tue, 19 May 2026 14:19:03 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/21/selector-muscle-la-visibilite-reseau-du-multicloud-de-netops/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/21/selector-muscle-la-visibilite-reseau-du-multicloud-de-netops/]]></link>
			<title>Selector muscle la visibilité réseau du multicloud de NetOps</title>
			<pubDate><![CDATA[Thu, 21 May 2026 17:26:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/21/un-modele-ia-malveillant-piege-les-utilisateurs-sur-hugging-face/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/21/un-modele-ia-malveillant-piege-les-utilisateurs-sur-hugging-face/]]></link>
			<title>Un modèle IA malveillant piége les utilisateurs sur Hugging Face</title>
			<pubDate><![CDATA[Thu, 21 May 2026 16:33:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/21/pas-de-correctif-pour-la-faille-zero-day-yellowkey-contournant-bitlocker/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/21/pas-de-correctif-pour-la-faille-zero-day-yellowkey-contournant-bitlocker/]]></link>
			<title>Pas de correctif pour la faille zero day YellowKey contournant BitLocker</title>
			<pubDate><![CDATA[Thu, 21 May 2026 16:29:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/21/lia-creuse-le-deficit-de-competences-en-cybersecurite/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/21/lia-creuse-le-deficit-de-competences-en-cybersecurite/]]></link>
			<title>L&#8217;IA creuse le déficit de compétences en cybersécurité</title>
			<pubDate><![CDATA[Thu, 21 May 2026 14:27:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/21/riverbed-etend-les-capacites-ia-daternity-experience/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/21/riverbed-etend-les-capacites-ia-daternity-experience/]]></link>
			<title>Riverbed étend les capacités IA d&#8217;Aternity Experience</title>
			<pubDate><![CDATA[Thu, 21 May 2026 12:01:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/21/une-faille-critique-empoisonne-les-administrateurs-drupal/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/21/une-faille-critique-empoisonne-les-administrateurs-drupal/]]></link>
			<title>Une faille critique empoisonne les administrateurs Drupal</title>
			<pubDate><![CDATA[Thu, 21 May 2026 11:28:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/21/la-clinique-de-garmisch-partenkirchen-isole-ses-donnees-patient/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/21/la-clinique-de-garmisch-partenkirchen-isole-ses-donnees-patient/]]></link>
			<title>La clinique de Garmisch-Partenkirchen isole ses données patient</title>
			<pubDate><![CDATA[Thu, 21 May 2026 08:39:36 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/21/dell-world-2026-les-futurs-serveurs-poweredge-se-devoilent/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/21/dell-world-2026-les-futurs-serveurs-poweredge-se-devoilent/]]></link>
			<title>Dell World 2026 : les futurs serveurs PowerEdge se dévoilent</title>
			<pubDate><![CDATA[Thu, 21 May 2026 08:25:04 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/21/vulnerabilite-dans-drupal-21-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/21/vulnerabilite-dans-drupal-21-mai-2026/]]></link>
			<title>Vulnérabilité dans Drupal (21 mai 2026)</title>
			<pubDate><![CDATA[Thu, 21 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/21/multiples-vulnerabilites-dans-progress-moveit-automation-21-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/21/multiples-vulnerabilites-dans-progress-moveit-automation-21-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans Progress MOVEit Automation (21 mai 2026)</title>
			<pubDate><![CDATA[Thu, 21 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/21/multiples-vulnerabilites-dans-les-produits-apereo-21-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/21/multiples-vulnerabilites-dans-les-produits-apereo-21-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans les produits Apereo (21 mai 2026)</title>
			<pubDate><![CDATA[Thu, 21 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/21/vulnerabilite-dans-cisco-secure-workload-21-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/21/vulnerabilite-dans-cisco-secure-workload-21-mai-2026/]]></link>
			<title>Vulnérabilité dans Cisco Secure Workload (21 mai 2026)</title>
			<pubDate><![CDATA[Thu, 21 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/21/multiples-vulnerabilites-dans-les-produits-splunk-21-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/21/multiples-vulnerabilites-dans-les-produits-splunk-21-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans les produits Splunk (21 mai 2026)</title>
			<pubDate><![CDATA[Thu, 21 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/21/multiples-vulnerabilites-dans-isc-bind-21-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/21/multiples-vulnerabilites-dans-isc-bind-21-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans ISC BIND (21 mai 2026)</title>
			<pubDate><![CDATA[Thu, 21 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/boutique/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/boutique/]]></link>
			<title>Boutique</title>
			<pubDate><![CDATA[Thu, 17 Aug 2023 10:41:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/]]></link>
			<title>Accueil</title>
			<pubDate><![CDATA[Mon, 13 Oct 2025 13:34:17 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/22/zscaler-rachete-symmetry-systems-pour-gerer-les-identites-des-agents-ia/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/22/zscaler-rachete-symmetry-systems-pour-gerer-les-identites-des-agents-ia/]]></link>
			<title>Zscaler rachète Symmetry Systems pour gérer les identités des agents IA</title>
			<pubDate><![CDATA[Fri, 22 May 2026 17:40:07 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/22/cisco-secure-workload-touche-par-une-faille-critique-cvss-10-0/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/22/cisco-secure-workload-touche-par-une-faille-critique-cvss-10-0/]]></link>
			<title>Cisco Secure Workload touché par une faille critique CVSS 10.0</title>
			<pubDate><![CDATA[Fri, 22 May 2026 11:33:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/22/securite-quantique-des-satellites-leurope-doit-etre-plus-stricte/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/22/securite-quantique-des-satellites-leurope-doit-etre-plus-stricte/]]></link>
			<title>Sécurité quantique des satellites : l&#8217;Europe doit être plus stricte</title>
			<pubDate><![CDATA[Fri, 22 May 2026 09:19:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/22/github-rapetisse-son-bug-bounty/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/22/github-rapetisse-son-bug-bounty/]]></link>
			<title>GitHub rapetisse son bug bounty</title>
			<pubDate><![CDATA[Fri, 22 May 2026 08:41:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/22/multiples-vulnerabilites-dans-tenable-sensor-proxy-22-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/22/multiples-vulnerabilites-dans-tenable-sensor-proxy-22-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans Tenable Sensor Proxy (22 mai 2026)</title>
			<pubDate><![CDATA[Fri, 22 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/22/vulnerabilite-dans-spip-22-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/22/vulnerabilite-dans-spip-22-mai-2026/]]></link>
			<title>Vulnérabilité dans SPIP (22 mai 2026)</title>
			<pubDate><![CDATA[Fri, 22 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/22/multiples-vulnerabilites-dans-les-produits-ibm-22-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/22/multiples-vulnerabilites-dans-les-produits-ibm-22-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans les produits IBM (22 mai 2026)</title>
			<pubDate><![CDATA[Fri, 22 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/22/vulnerabilite-dans-stormshield-network-security-22-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/22/vulnerabilite-dans-stormshield-network-security-22-mai-2026/]]></link>
			<title>Vulnérabilité dans Stormshield Network Security (22 mai 2026)</title>
			<pubDate><![CDATA[Fri, 22 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/22/multiples-vulnerabilites-dans-microsoft-edge-22-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/22/multiples-vulnerabilites-dans-microsoft-edge-22-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans Microsoft Edge (22 mai 2026)</title>
			<pubDate><![CDATA[Fri, 22 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/22/multiples-vulnerabilites-dans-le-noyau-linux-dubuntu-22-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/22/multiples-vulnerabilites-dans-le-noyau-linux-dubuntu-22-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans le noyau Linux d&#8217;Ubuntu (22 mai 2026)</title>
			<pubDate><![CDATA[Fri, 22 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/22/multiples-vulnerabilites-dans-le-noyau-linux-de-suse-22-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/22/multiples-vulnerabilites-dans-le-noyau-linux-de-suse-22-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans le noyau Linux de SUSE (22 mai 2026)</title>
			<pubDate><![CDATA[Fri, 22 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/22/vulnerabilite-dans-les-produits-microsoft-22-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/22/vulnerabilite-dans-les-produits-microsoft-22-mai-2026/]]></link>
			<title>Vulnérabilité dans les produits Microsoft (22 mai 2026)</title>
			<pubDate><![CDATA[Fri, 22 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/22/multiples-vulnerabilites-dans-les-produits-mattermost-22-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/22/multiples-vulnerabilites-dans-les-produits-mattermost-22-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans les produits Mattermost (22 mai 2026)</title>
			<pubDate><![CDATA[Fri, 22 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/22/multiples-vulnerabilites-dans-le-noyau-linux-de-red-hat-22-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/22/multiples-vulnerabilites-dans-le-noyau-linux-de-red-hat-22-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans le noyau Linux de Red Hat (22 mai 2026)</title>
			<pubDate><![CDATA[Fri, 22 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/22/multiples-vulnerabilites-dans-le-noyau-linux-de-debian-22-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/22/multiples-vulnerabilites-dans-le-noyau-linux-de-debian-22-mai-2026/]]></link>
			<title>Multiples vulnérabilités dans le noyau Linux de Debian (22 mai 2026)</title>
			<pubDate><![CDATA[Fri, 22 May 2026 00:00:00 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://www.polaris-st.com/2026/05/22/vulnerabilite-dans-le-noyau-linux-de-debian-lts-22-mai-2026/]]></guid>
			<link><![CDATA[https://www.polaris-st.com/2026/05/22/vulnerabilite-dans-le-noyau-linux-de-debian-lts-22-mai-2026/]]></link>
			<title>Vulnérabilité dans le noyau Linux de Debian LTS (22 mai 2026)</title>
			<pubDate><![CDATA[Fri, 22 May 2026 00:00:00 +0000]]></pubDate>
		</item>
				</channel>
</rss>
