{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<P>Cacti 0.8.7e. D'autres versions peuvent \u00eatre affect\u00e9es.</P>","content":"## Solution\n\nUne mise \u00e0 jour est disponible sur le site de l'\u00e9diteur (cf. section\nDocumentation).\n","cves":[],"links":[],"reference":"CERTA-2009-AVI-519","revisions":[{"description":"version initiale.","revision_date":"2009-11-26T00:00:00.000000"}],"risks":[{"description":"Injection de code indirecte"}],"summary":"Plusieurs vuln\u00e9rabilit\u00e9s permettant l'injection de code indirecte (<span\nclass=\"textit\">cross-site scripting</span>) ont \u00e9t\u00e9 corrig\u00e9es dans\nCacti.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Cacti","vendor_advisories":[{"published_at":null,"title":"Mise \u00e0 jour de Cacti du 21 novembre 2009","url":"http://www.cacti.net/downloads/patches/0.8.7e/cross_site_fix.patch"}]}
