{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"ChakraCore","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"PowerShell Core 6.0.0","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Exchange Server 2016 Cumulative Update 7","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Exchange Server 2013 Cumulative Update 19","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Exchange Server 2013 Service Pack 1","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Access 2016 (\u00e9dition 32 bits)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Exchange Server 2013 Cumulative Update 18","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Access 2013 Service Pack 1 (\u00e9ditions 32 bits)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Access 2010 Service Pack 2 (\u00e9ditions 64 bits)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Access 2016 (\u00e9dition 64 bits)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 20","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Access 2013 Service Pack 1 (\u00e9ditions 64 bits)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Access 2010 Service Pack 2 (\u00e9ditions 32 bits)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Exchange Server 2016 Cumulative Update 8","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2018-0940","url":"https://www.cve.org/CVERecord?id=CVE-2018-0940"},{"name":"CVE-2018-0875","url":"https://www.cve.org/CVERecord?id=CVE-2018-0875"},{"name":"CVE-2018-0930","url":"https://www.cve.org/CVERecord?id=CVE-2018-0930"},{"name":"CVE-2018-0937","url":"https://www.cve.org/CVERecord?id=CVE-2018-0937"},{"name":"CVE-2018-0924","url":"https://www.cve.org/CVERecord?id=CVE-2018-0924"},{"name":"CVE-2018-0874","url":"https://www.cve.org/CVERecord?id=CVE-2018-0874"},{"name":"CVE-2018-0936","url":"https://www.cve.org/CVERecord?id=CVE-2018-0936"},{"name":"CVE-2018-0903","url":"https://www.cve.org/CVERecord?id=CVE-2018-0903"},{"name":"CVE-2018-0931","url":"https://www.cve.org/CVERecord?id=CVE-2018-0931"},{"name":"CVE-2018-0873","url":"https://www.cve.org/CVERecord?id=CVE-2018-0873"},{"name":"CVE-2018-0941","url":"https://www.cve.org/CVERecord?id=CVE-2018-0941"},{"name":"CVE-2018-0891","url":"https://www.cve.org/CVERecord?id=CVE-2018-0891"},{"name":"CVE-2018-0925","url":"https://www.cve.org/CVERecord?id=CVE-2018-0925"},{"name":"CVE-2018-0933","url":"https://www.cve.org/CVERecord?id=CVE-2018-0933"},{"name":"CVE-2018-0872","url":"https://www.cve.org/CVERecord?id=CVE-2018-0872"},{"name":"CVE-2018-0934","url":"https://www.cve.org/CVERecord?id=CVE-2018-0934"},{"name":"CVE-2018-0939","url":"https://www.cve.org/CVERecord?id=CVE-2018-0939"}],"links":[],"reference":"CERTFR-2018-AVI-133","revisions":[{"description":"Version initiale","revision_date":"2018-03-14T00:00:00.000000"}],"risks":[{"description":"Divulgation d'informations"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"D\u00e9ni de service"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">les produits Microsoft</span>. Elles permettent \u00e0 un\nattaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une divulgation\nd'informations, une ex\u00e9cution de code \u00e0 distance et un d\u00e9ni de service\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Microsoft du 13 mars 2018","url":"https://portal.msrc.microsoft.com/fr-FR/security-guidance/advisory/"}]}
