{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"PostgreSQL versions ant\u00e9rieures \u00e0 8.4.20","product":{"name":"PostgreSQL","vendor":{"name":"PostgreSQL","scada":false}}},{"description":"PostgreSQL versions ant\u00e9rieures \u00e0 9.2.7","product":{"name":"PostgreSQL","vendor":{"name":"PostgreSQL","scada":false}}},{"description":"PostgreSQL versions ant\u00e9rieures \u00e0 9.3.3","product":{"name":"PostgreSQL","vendor":{"name":"PostgreSQL","scada":false}}},{"description":"PostgreSQL versions ant\u00e9rieures \u00e0 9.0.16","product":{"name":"PostgreSQL","vendor":{"name":"PostgreSQL","scada":false}}},{"description":"PostgreSQL versions ant\u00e9rieures \u00e0 9.1.12","product":{"name":"PostgreSQL","vendor":{"name":"PostgreSQL","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2014-0063","url":"https://www.cve.org/CVERecord?id=CVE-2014-0063"},{"name":"CVE-2014-0061","url":"https://www.cve.org/CVERecord?id=CVE-2014-0061"},{"name":"CVE-2014-0067","url":"https://www.cve.org/CVERecord?id=CVE-2014-0067"},{"name":"CVE-2014-0064","url":"https://www.cve.org/CVERecord?id=CVE-2014-0064"},{"name":"CVE-2014-0065","url":"https://www.cve.org/CVERecord?id=CVE-2014-0065"},{"name":"CVE-2014-0062","url":"https://www.cve.org/CVERecord?id=CVE-2014-0062"},{"name":"CVE-2014-0060","url":"https://www.cve.org/CVERecord?id=CVE-2014-0060"},{"name":"CVE-2014-0066","url":"https://www.cve.org/CVERecord?id=CVE-2014-0066"}],"links":[],"reference":"CERTFR-2014-AVI-080","revisions":[{"description":"version initiale.","revision_date":"2014-02-21T00:00:00.000000"}],"risks":[{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">PostgreSQL</span>. Elles permettent \u00e0 un attaquant de\nprovoquer un contournement de la politique de s\u00e9curit\u00e9 et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans PostgreSQL","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 PostgreSQL du 20 f\u00e9vrier 2014","url":"http://www.postgresql.org/about/news/1506/"}]}
