{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"IBM Tivoli Workload Scheduler 8.x","product":{"name":"Tivoli","vendor":{"name":"IBM","scada":false}}},{"description":"MegaRAID Storage Management 13.x","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"IBM Content Collector 3.x","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"IBM C\u00faram Social Program Management 6.x","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"IBM Cloud Manager with OpenStack 4.x","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"IBM MessageSight 1.x","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"IBM Tivoli Storage Manager Client 6.x","product":{"name":"Tivoli","vendor":{"name":"IBM","scada":false}}},{"description":"IBM Business Process Manager 7.x","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"IBM Tivoli Storage Manager Client 7.x","product":{"name":"Tivoli","vendor":{"name":"IBM","scada":false}}},{"description":"IBM WebSphere Transformation Extender 8.x","product":{"name":"WebSphere","vendor":{"name":"IBM","scada":false}}},{"description":"IBM Content Collector for Email 4.x","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"IBM Tivoli Storage Manager Client 5.x","product":{"name":"Tivoli","vendor":{"name":"IBM","scada":false}}},{"description":"IBM Content Collector 4.x","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"IBM Tivoli Workload Scheduler 9.x","product":{"name":"Tivoli","vendor":{"name":"IBM","scada":false}}},{"description":"IBM System x Integrated Management Module 2 (IMM2) 4.x","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}}],"affected_systems_content":null,"content":"## Contournement provisoire\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2015-0101","url":"https://www.cve.org/CVERecord?id=CVE-2015-0101"},{"name":"CVE-2014-6512","url":"https://www.cve.org/CVERecord?id=CVE-2014-6512"},{"name":"CVE-2014-7144","url":"https://www.cve.org/CVERecord?id=CVE-2014-7144"},{"name":"CVE-2014-7230","url":"https://www.cve.org/CVERecord?id=CVE-2014-7230"},{"name":"CVE-2014-4803","url":"https://www.cve.org/CVERecord?id=CVE-2014-4803"},{"name":"CVE-2014-3509","url":"https://www.cve.org/CVERecord?id=CVE-2014-3509"},{"name":"CVE-2014-3567","url":"https://www.cve.org/CVERecord?id=CVE-2014-3567"},{"name":"CVE-2015-0146","url":"https://www.cve.org/CVERecord?id=CVE-2015-0146"},{"name":"CVE-2014-3505","url":"https://www.cve.org/CVERecord?id=CVE-2014-3505"},{"name":"CVE-2014-0221","url":"https://www.cve.org/CVERecord?id=CVE-2014-0221"},{"name":"CVE-2014-0195","url":"https://www.cve.org/CVERecord?id=CVE-2014-0195"},{"name":"CVE-2014-3641","url":"https://www.cve.org/CVERecord?id=CVE-2014-3641"},{"name":"CVE-2014-6468","url":"https://www.cve.org/CVERecord?id=CVE-2014-6468"},{"name":"CVE-2014-3513","url":"https://www.cve.org/CVERecord?id=CVE-2014-3513"},{"name":"CVE-2014-0224","url":"https://www.cve.org/CVERecord?id=CVE-2014-0224"},{"name":"CVE-2014-4263","url":"https://www.cve.org/CVERecord?id=CVE-2014-4263"},{"name":"CVE-2014-0139","url":"https://www.cve.org/CVERecord?id=CVE-2014-0139"},{"name":"CVE-2014-2532","url":"https://www.cve.org/CVERecord?id=CVE-2014-2532"},{"name":"CVE-2014-0138","url":"https://www.cve.org/CVERecord?id=CVE-2014-0138"},{"name":"CVE-2014-3511","url":"https://www.cve.org/CVERecord?id=CVE-2014-3511"},{"name":"CVE-2014-3568","url":"https://www.cve.org/CVERecord?id=CVE-2014-3568"},{"name":"CVE-2014-3470","url":"https://www.cve.org/CVERecord?id=CVE-2014-3470"},{"name":"CVE-2014-3507","url":"https://www.cve.org/CVERecord?id=CVE-2014-3507"},{"name":"CVE-2014-3608","url":"https://www.cve.org/CVERecord?id=CVE-2014-3608"},{"name":"CVE-2014-6414","url":"https://www.cve.org/CVERecord?id=CVE-2014-6414"},{"name":"CVE-2014-3621","url":"https://www.cve.org/CVERecord?id=CVE-2014-3621"},{"name":"CVE-2014-3510","url":"https://www.cve.org/CVERecord?id=CVE-2014-3510"},{"name":"CVE-2015-0235","url":"https://www.cve.org/CVERecord?id=CVE-2015-0235"},{"name":"CVE-2013-2174","url":"https://www.cve.org/CVERecord?id=CVE-2013-2174"},{"name":"CVE-2014-3508","url":"https://www.cve.org/CVERecord?id=CVE-2014-3508"},{"name":"CVE-2014-8373","url":"https://www.cve.org/CVERecord?id=CVE-2014-8373"},{"name":"CVE-2014-4813","url":"https://www.cve.org/CVERecord?id=CVE-2014-4813"},{"name":"CVE-2014-0015","url":"https://www.cve.org/CVERecord?id=CVE-2014-0015"},{"name":"CVE-2014-0198","url":"https://www.cve.org/CVERecord?id=CVE-2014-0198"},{"name":"CVE-2014-3506","url":"https://www.cve.org/CVERecord?id=CVE-2014-3506"},{"name":"CVE-2014-7231","url":"https://www.cve.org/CVERecord?id=CVE-2014-7231"},{"name":"CVE-2014-8917","url":"https://www.cve.org/CVERecord?id=CVE-2014-8917"},{"name":"CVE-2014-5356","url":"https://www.cve.org/CVERecord?id=CVE-2014-5356"}],"links":[],"reference":"CERTFR-2015-AVI-072","revisions":[{"description":"version initiale.","revision_date":"2015-02-16T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">les produits IBM</span>. Elles permettent \u00e0 un attaquant\nde provoquer un d\u00e9ni de service \u00e0 distance, un contournement de la\npolitique de s\u00e9curit\u00e9 et une \u00e9l\u00e9vation de privil\u00e8ges.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 IBM du 16 f\u00e9vrier 2015","url":"http://www.ibm.com/support/docview.wss?uid=swg21693134"}]}
