{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"IBM Spectrum Protect Plus versions 10.1.x sans le dernier correctif ifx2 (10.1.7.2)","product":{"name":"Spectrum","vendor":{"name":"IBM","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2020-36181","url":"https://www.cve.org/CVERecord?id=CVE-2020-36181"},{"name":"CVE-2020-36182","url":"https://www.cve.org/CVERecord?id=CVE-2020-36182"},{"name":"CVE-2020-36185","url":"https://www.cve.org/CVERecord?id=CVE-2020-36185"},{"name":"CVE-2020-7778","url":"https://www.cve.org/CVERecord?id=CVE-2020-7778"},{"name":"CVE-2020-36179","url":"https://www.cve.org/CVERecord?id=CVE-2020-36179"},{"name":"CVE-2020-36186","url":"https://www.cve.org/CVERecord?id=CVE-2020-36186"},{"name":"CVE-2020-36189","url":"https://www.cve.org/CVERecord?id=CVE-2020-36189"},{"name":"CVE-2021-20190","url":"https://www.cve.org/CVERecord?id=CVE-2021-20190"},{"name":"CVE-2020-36187","url":"https://www.cve.org/CVERecord?id=CVE-2020-36187"},{"name":"CVE-2020-8277","url":"https://www.cve.org/CVERecord?id=CVE-2020-8277"},{"name":"CVE-2020-36183","url":"https://www.cve.org/CVERecord?id=CVE-2020-36183"},{"name":"CVE-2020-36184","url":"https://www.cve.org/CVERecord?id=CVE-2020-36184"},{"name":"CVE-2020-36180","url":"https://www.cve.org/CVERecord?id=CVE-2020-36180"},{"name":"CVE-2020-26274","url":"https://www.cve.org/CVERecord?id=CVE-2020-26274"},{"name":"CVE-2020-25649","url":"https://www.cve.org/CVERecord?id=CVE-2020-25649"},{"name":"CVE-2020-36188","url":"https://www.cve.org/CVERecord?id=CVE-2020-36188"}],"links":[],"reference":"CERTFR-2021-AVI-101","revisions":[{"description":"Version initiale","revision_date":"2021-02-10T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM Spectrum\nProtect Plus. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution\nde code arbitraire \u00e0 distance et une atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans IBM Spectrum Protect Plus","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 IBM 6410882 du 09 f\u00e9vrier 2021","url":"https://www.ibm.com/support/pages/node/6410882"}]}
