{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Sophos web protection","product":{"name":"N/A","vendor":{"name":"Sophos","scada":false}}},{"description":"Sophos web control Layered Service Provider (LSP)","product":{"name":"N/A","vendor":{"name":"Sophos","scada":false}}},{"description":"Sophos anti-virus","product":{"name":"N/A","vendor":{"name":"Sophos","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[],"links":[],"reference":"CERTA-2012-AVI-627","revisions":[{"description":"version initiale.","revision_date":"2012-11-05T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Injection de code indirecte \u00e0 distance"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans diff\u00e9rents produits\n<span class=\"textit\">Sophos</span>. Plusieurs d'entre elles permettent\nd'ex\u00e9cuter du code arbitraire \u00e0 distance au moyen de fichiers\nsp\u00e9cialement con\u00e7us.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Sophos","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Sophos du 05 novembre 2012","url":"http://nakedsecurity.sophos.com/2012/11/05/tavis-ormandy-sophos/"}]}
