{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Invision Power Board version 3.3 ;","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"Invision Power Board versions 3.2.3 et ant\u00e9rieures.","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nMettre Invision Power Board \u00e0 jour en version 3.3.1 ou en appliquant le\ncorrectif sp\u00e9cifique aux versions 3.2.\n","cves":[{"name":"CVE-2012-2226","url":"https://www.cve.org/CVERecord?id=CVE-2012-2226"}],"links":[],"reference":"CERTA-2012-AVI-214","revisions":[{"description":"version initiale.","revision_date":"2012-04-16T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Invision Power Board</span>. L'exploitation de ces\nfailles par un attaquant distant permet de lire et d'ex\u00e9cuter des\nfichiers locaux.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Invision Power Board","vendor_advisories":[{"published_at":null,"title":"Annonce de la version 3.3.1 d'Invision Power Board","url":"http://community.invisionpower.com/topic/360518-ipboard-331-ipblog-252-ipseo-152-and-updates-for-ipboard-32x-ipgallery-42x-released/"}]}
