{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<P>HP XP P9000 Performance Advisor Software versions 5.4.1 et  ant\u00e9rieures</P>","content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2011-5062","url":"https://www.cve.org/CVERecord?id=CVE-2011-5062"},{"name":"CVE-2011-2729","url":"https://www.cve.org/CVERecord?id=CVE-2011-2729"},{"name":"CVE-2010-4172","url":"https://www.cve.org/CVERecord?id=CVE-2010-4172"},{"name":"CVE-2011-3190","url":"https://www.cve.org/CVERecord?id=CVE-2011-3190"},{"name":"CVE-2011-0534","url":"https://www.cve.org/CVERecord?id=CVE-2011-0534"},{"name":"CVE-2008-0002","url":"https://www.cve.org/CVERecord?id=CVE-2008-0002"},{"name":"CVE-2009-2901","url":"https://www.cve.org/CVERecord?id=CVE-2009-2901"},{"name":"CVE-2011-0013","url":"https://www.cve.org/CVERecord?id=CVE-2011-0013"},{"name":"CVE-2013-0366","url":"https://www.cve.org/CVERecord?id=CVE-2013-0366"},{"name":"CVE-2013-0381","url":"https://www.cve.org/CVERecord?id=CVE-2013-0381"},{"name":"CVE-2009-2693","url":"https://www.cve.org/CVERecord?id=CVE-2009-2693"},{"name":"CVE-2011-5063","url":"https://www.cve.org/CVERecord?id=CVE-2011-5063"},{"name":"CVE-2009-2902","url":"https://www.cve.org/CVERecord?id=CVE-2009-2902"},{"name":"CVE-2012-4431","url":"https://www.cve.org/CVERecord?id=CVE-2012-4431"},{"name":"CVE-2013-0354","url":"https://www.cve.org/CVERecord?id=CVE-2013-0354"},{"name":"CVE-2007-5461","url":"https://www.cve.org/CVERecord?id=CVE-2007-5461"},{"name":"CVE-2010-2227","url":"https://www.cve.org/CVERecord?id=CVE-2010-2227"},{"name":"CVE-2008-1232","url":"https://www.cve.org/CVERecord?id=CVE-2008-1232"},{"name":"CVE-2011-1184","url":"https://www.cve.org/CVERecord?id=CVE-2011-1184"},{"name":"CVE-2013-0372","url":"https://www.cve.org/CVERecord?id=CVE-2013-0372"},{"name":"CVE-2011-2526","url":"https://www.cve.org/CVERecord?id=CVE-2011-2526"},{"name":"CVE-2013-0363","url":"https://www.cve.org/CVERecord?id=CVE-2013-0363"},{"name":"CVE-2009-3548","url":"https://www.cve.org/CVERecord?id=CVE-2009-3548"},{"name":"CVE-2008-2370","url":"https://www.cve.org/CVERecord?id=CVE-2008-2370"},{"name":"CVE-2013-0364","url":"https://www.cve.org/CVERecord?id=CVE-2013-0364"},{"name":"CVE-2012-3546","url":"https://www.cve.org/CVERecord?id=CVE-2012-3546"},{"name":"CVE-2007-5333","url":"https://www.cve.org/CVERecord?id=CVE-2007-5333"},{"name":"CVE-2012-3219","url":"https://www.cve.org/CVERecord?id=CVE-2012-3219"},{"name":"CVE-2008-1947","url":"https://www.cve.org/CVERecord?id=CVE-2008-1947"},{"name":"CVE-2012-4534","url":"https://www.cve.org/CVERecord?id=CVE-2012-4534"},{"name":"CVE-2013-0352","url":"https://www.cve.org/CVERecord?id=CVE-2013-0352"},{"name":"CVE-2013-0397","url":"https://www.cve.org/CVERecord?id=CVE-2013-0397"},{"name":"CVE-2007-6286","url":"https://www.cve.org/CVERecord?id=CVE-2007-6286"},{"name":"CVE-2013-0361","url":"https://www.cve.org/CVERecord?id=CVE-2013-0361"},{"name":"CVE-2011-5064","url":"https://www.cve.org/CVERecord?id=CVE-2011-5064"},{"name":"CVE-2010-3718","url":"https://www.cve.org/CVERecord?id=CVE-2010-3718"},{"name":"CVE-2007-5342","url":"https://www.cve.org/CVERecord?id=CVE-2007-5342"},{"name":"CVE-2012-3190","url":"https://www.cve.org/CVERecord?id=CVE-2012-3190"},{"name":"CVE-2011-2481","url":"https://www.cve.org/CVERecord?id=CVE-2011-2481"},{"name":"CVE-2011-5035","url":"https://www.cve.org/CVERecord?id=CVE-2011-5035"},{"name":"CVE-2011-2204","url":"https://www.cve.org/CVERecord?id=CVE-2011-2204"},{"name":"CVE-2010-1157","url":"https://www.cve.org/CVERecord?id=CVE-2010-1157"},{"name":"CVE-2012-2733","url":"https://www.cve.org/CVERecord?id=CVE-2012-2733"}],"links":[],"reference":"CERTFR-2014-AVI-089","revisions":[{"description":"version initiale.","revision_date":"2014-02-25T00:00:00.000000"}],"risks":[{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Ex\u00e9cution de code arbitraire"},{"description":"Injection de code indirecte \u00e0 distance"},{"description":"D\u00e9ni de service"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">HP XP P9000 Performance Advisor Software</span>.\nCertaines d'entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et un contournement de\nla politique de s\u00e9curit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans HP XP P9000 Performance Advisor Software","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 HP c04047415 du 25 f\u00e9vrier 2014","url":"http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docDisplay/?docId=emr_na-c04047415-1"}]}
