{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"SPIP versions 2.0 ant\u00e9rieures \u00e0 2.0.21.","product":{"name":"SPIP","vendor":{"name":"SPIP","scada":false}}},{"description":"SPIP versions 3.0 ant\u00e9rieures \u00e0 3.0.3 ;","product":{"name":"SPIP","vendor":{"name":"SPIP","scada":false}}},{"description":"SPIP versions 2.1 ant\u00e9rieures \u00e0 2.1.16 ;","product":{"name":"SPIP","vendor":{"name":"SPIP","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nMettre SPIP \u00e0 jour en version 3.0.3, 2.1.16 ou 2.0.21. L'\u00e9cran de\ns\u00e9curit\u00e9 a \u00e9galement \u00e9t\u00e9 mis \u00e0 jour en version 1.1.3.\n","cves":[],"links":[],"reference":"CERTA-2012-AVI-366","revisions":[{"description":"version initiale.","revision_date":"2012-07-04T00:00:00.000000"}],"risks":[{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"}],"summary":"Une faille a \u00e9t\u00e9 corrig\u00e9e dans <span class=\"textit\">SPIP</span>. La\nvuln\u00e9rabilit\u00e9 n'est pas d\u00e9crite par l'\u00e9diteur, mais elle est jug\u00e9e\ncritique.\n","title":"Vuln\u00e9rabilit\u00e9 dans SPIP","vendor_advisories":[{"published_at":null,"title":"Annonce de la version 3.0.3 de SPIP du 03 juillet 2012","url":"http://www.spip-contrib.net/SPIP-3-0-3-2-1-16-et-2-0-21-a-l-etape-303-epate-la"}]}
