{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"CA Internet Security Suite (ISS) 2010.","product":{"name":"Internet Security","vendor":{"name":"ESET","scada":false}}},{"description":"CA Host-Based Intrusion Prevention System (HIPS) version r8.1 ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans le contr\u00f4le ActiveX XMLSecDB\nutilis\u00e9 par CA HIPS. L'exploitation de cette vuln\u00e9rabilit\u00e9, par le biais\nd'une page Web ou d'un fichier sp\u00e9cifique, permet l'ex\u00e9cution de code\narbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour la correction de\ncette vuln\u00e9rabilit\u00e9 (cf. section Documentation).\n","cves":[{"name":"CVE-2011-1036","url":"https://www.cve.org/CVERecord?id=CVE-2011-1036"}],"links":[],"reference":"CERTA-2011-AVI-106","revisions":[{"description":"version initiale.","revision_date":"2011-02-24T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"Une vuln\u00e9rabilit\u00e9 dans <span class=\"textit\">CA HIPS</span> permet\nl'ex\u00e9cution de code arbitraire \u00e0 distance.\n","title":"Vuln\u00e9rabilit\u00e9 dans CA HIPS","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 CA20110223-01 du 23 f\u00e9vrier 2011","url":"https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID={53A608DF-BFDB-4AB3-A98F-E4BB6BC7A2F4}"}]}
