{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<p>IBM Datacap Taskmaster Capture 8.x.</p>","content":"## Description\n\nUne vuln\u00e9rabilit\u00e9 est pr\u00e9sente dans IBM Datacap Taskmaster Capture. Elle\npermet \u00e0 un utilisateur malintentionn\u00e9 d'injecter du code SQL via des\nrequ\u00eates sp\u00e9cialement con\u00e7ues.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 IBM swg27021511 du 12 mai 2011 :","url":"http://www-01.ibm.com/support/docview.wss?uid=swg27021511"}],"reference":"CERTA-2011-AVI-293","revisions":[{"description":"version initiale.","revision_date":"2011-05-16T00:00:00.000000"}],"risks":[{"description":"Injection SQL"}],"summary":"Une vuln\u00e9rabilit\u00e9 de type injection SQL a \u00e9t\u00e9 d\u00e9couverte dans <span\nclass=\"textit\">IBM Datacap Taskmaster Capture</span>.\n","title":"Vuln\u00e9rabilit\u00e9 dans IBM Datacap Taskmaster Capture","vendor_advisories":[{"published_at":null,"title":"Note de mise \u00e0 jour IBM du 12 mai 2011","url":null}]}
