{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<P><SPAN class=\"textit\">GuppY</SPAN> versions 4.6.0 ant\u00e9rieures \u00e0  4.6.14.</P>","content":"## Description\n\nDeux vuln\u00e9rabilit\u00e9s permettant l'injection de code indirecte \u00e0 distance\nont \u00e9t\u00e9 d\u00e9couvertes dans GuppY. Celles-ci n'ont pas \u00e9t\u00e9 d\u00e9taill\u00e9es par\nl'\u00e9diteur.\n\n## Solution\n\nMettre GuppY \u00e0 jour en version 4.6.14.\n","cves":[],"links":[],"reference":"CERTA-2011-AVI-298","revisions":[{"description":"version initiale.","revision_date":"2011-05-17T00:00:00.000000"},{"description":"modification des sections Risque, R\u00e9sum\u00e9 et Description.","revision_date":"2011-05-18T00:00:00.000000"}],"risks":[{"description":"Injection de code indirecte \u00e0 distance"}],"summary":"Deux vuln\u00e9rabilit\u00e9s dans <span class=\"textit\">GuppY</span> permettent\nl'injection de code indirecte \u00e0 distance.\n","title":"Vuln\u00e9rabilit\u00e9s dans GuppY","vendor_advisories":[{"published_at":null,"title":"Annonce de la version 4.6.14 de GuppY du 15 f\u00e9vrier 2011","url":"http://www.freeguppy.org/thread.php?lng=fr&cat=100&pg=225239&id=1"}]}
