{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Traps versions ant\u00e9rieures \u00e0 5.0.5","product":{"name":"N/A","vendor":{"name":"N/A","scada":false}}},{"description":"PAN-OS versions 8.0.x ant\u00e9rieures \u00e0 8.0.19","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions ant\u00e9rieures \u00e0 7.1.24","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 8.1.x ant\u00e9rieures \u00e0 8.1.8-h5","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"PAN-OS versions 9.0.x ant\u00e9rieures \u00e0 9.0.2-h4","product":{"name":"PAN-OS","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"MineMeld versions ant\u00e9rieures \u00e0 0.9.62","product":{"name":"N/A","vendor":{"name":"Palo Alto Networks","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2019-1577","url":"https://www.cve.org/CVERecord?id=CVE-2019-1577"},{"name":"CVE-2019-11478","url":"https://www.cve.org/CVERecord?id=CVE-2019-11478"},{"name":"CVE-2019-5599","url":"https://www.cve.org/CVERecord?id=CVE-2019-5599"},{"name":"CVE-2019-1578","url":"https://www.cve.org/CVERecord?id=CVE-2019-1578"},{"name":"CVE-2019-11479","url":"https://www.cve.org/CVERecord?id=CVE-2019-11479"},{"name":"CVE-2019-11477","url":"https://www.cve.org/CVERecord?id=CVE-2019-11477"}],"links":[],"reference":"CERTFR-2019-AVI-298","revisions":[{"description":"Version initiale","revision_date":"2019-06-28T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Injection de code indirecte \u00e0 distance (XSS)"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Palo\nAlto. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une injection de\ncode indirecte \u00e0 distance (XSS).\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Palo Alto","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Palo Alto 153 du 27 juin 2019","url":"https://securityadvisories.paloaltonetworks.com/Home/Detail/153"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Palo Alto 151 du 27 juin 2019","url":"https://securityadvisories.paloaltonetworks.com/Home/Detail/151"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Palo Alto 152 du 27 juin 2019","url":"https://securityadvisories.paloaltonetworks.com/Home/Detail/152"}]}
