{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Microsoft Exchange Server 2019","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"ChakraCore","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Team Foundation Server 2018 Update 3.2","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Exchange Server 2013 Cumulative Update 22","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Azure DevOps Server 2019","product":{"name":"Azure","vendor":{"name":"Microsoft","scada":false}}},{"description":"Team Foundation Server 2017 Update 3.1","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Exchange Server 2019 Cumulative Update 1","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Exchange Server 2010 Service Pack 3","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Team Foundation Server 2018 Updated 1.2","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Open Enclave SDK","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Exchange Server 2016 Cumulative Update 12","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Azure Linux Guest Agent","product":{"name":"Azure","vendor":{"name":"Microsoft","scada":false}}},{"description":"Team Foundation Server 2015 Update 4.2","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Exchange Server 2016 Cumulative Update 11","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2019-0829","url":"https://www.cve.org/CVERecord?id=CVE-2019-0829"},{"name":"CVE-2019-0858","url":"https://www.cve.org/CVERecord?id=CVE-2019-0858"},{"name":"CVE-2019-0874","url":"https://www.cve.org/CVERecord?id=CVE-2019-0874"},{"name":"CVE-2019-0867","url":"https://www.cve.org/CVERecord?id=CVE-2019-0867"},{"name":"CVE-2019-0806","url":"https://www.cve.org/CVERecord?id=CVE-2019-0806"},{"name":"CVE-2019-0810","url":"https://www.cve.org/CVERecord?id=CVE-2019-0810"},{"name":"CVE-2019-0817","url":"https://www.cve.org/CVERecord?id=CVE-2019-0817"},{"name":"CVE-2019-0861","url":"https://www.cve.org/CVERecord?id=CVE-2019-0861"},{"name":"CVE-2019-0866","url":"https://www.cve.org/CVERecord?id=CVE-2019-0866"},{"name":"CVE-2019-0868","url":"https://www.cve.org/CVERecord?id=CVE-2019-0868"},{"name":"CVE-2019-0876","url":"https://www.cve.org/CVERecord?id=CVE-2019-0876"},{"name":"CVE-2019-0804","url":"https://www.cve.org/CVERecord?id=CVE-2019-0804"},{"name":"CVE-2019-0739","url":"https://www.cve.org/CVERecord?id=CVE-2019-0739"},{"name":"CVE-2019-0870","url":"https://www.cve.org/CVERecord?id=CVE-2019-0870"},{"name":"CVE-2019-0875","url":"https://www.cve.org/CVERecord?id=CVE-2019-0875"},{"name":"CVE-2019-0869","url":"https://www.cve.org/CVERecord?id=CVE-2019-0869"},{"name":"CVE-2019-0857","url":"https://www.cve.org/CVERecord?id=CVE-2019-0857"},{"name":"CVE-2019-0871","url":"https://www.cve.org/CVERecord?id=CVE-2019-0871"},{"name":"CVE-2019-0860","url":"https://www.cve.org/CVERecord?id=CVE-2019-0860"},{"name":"CVE-2019-0812","url":"https://www.cve.org/CVERecord?id=CVE-2019-0812"}],"links":[],"reference":"CERTFR-2019-AVI-160","revisions":[{"description":"Version initiale","revision_date":"2019-04-10T00:00:00.000000"}],"risks":[{"description":"Usurpation d'identit\u00e9"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">les produits Microsoft</span>. Elles permettent \u00e0 un\nattaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es, une ex\u00e9cution de code \u00e0 distance et une\nusurpation d'identit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Microsoft du 09 avril 2019","url":"https://portal.msrc.microsoft.com/fr-FR/security-guidance"}]}
