{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Visual Studio Code - Java Extension Pack","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Azure Spring Cloud","product":{"name":"Azure","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Visio 2010 Service Pack 2 (\u00e9ditions 64 bits)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Azure Kubernetes Service","product":{"name":"Azure","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Visio 2013 Service Pack 1 (\u00e9ditions 32 bits)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Visual Studio 2019 version 16.7 (includes 16.0 \u2013 16.6)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Quantum Development Kit pour Visual Studio Code","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Visual Studio Code ESLint extension","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Business Productivity Servers 2010 Service Pack 2","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"HEVC Video Extensions","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Azure Service Fabric","product":{"name":"Azure","vendor":{"name":"Microsoft","scada":false}}},{"description":"Power BI Report Server version 15.0.1103.234","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Visio 2016 (\u00e9dition 64 bits)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Visual Studio Code","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft 365 Apps pour Enterprise pour syst\u00e8mes 32 bits","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft 365 Apps pour Enterprise pour 64 bits Systems","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Visio 2016 (\u00e9dition 32 bits)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Power BI Report Server version 15.0.1104.300","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Visual Studio Code Remote - Containers Extension","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Visio 2010 Service Pack 2 (\u00e9ditions 32 bits)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Azure Sphere","product":{"name":"Azure","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Visio 2013 Service Pack 1 (\u00e9ditions 64 bits)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Azure Container Instance","product":{"name":"Azure","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Visual Studio 2019 version 16.8 (includes 16.0 - 16.7)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2021-27060","url":"https://www.cve.org/CVERecord?id=CVE-2021-27060"},{"name":"CVE-2021-27048","url":"https://www.cve.org/CVERecord?id=CVE-2021-27048"},{"name":"CVE-2021-27075","url":"https://www.cve.org/CVERecord?id=CVE-2021-27075"},{"name":"CVE-2021-27061","url":"https://www.cve.org/CVERecord?id=CVE-2021-27061"},{"name":"CVE-2021-27053","url":"https://www.cve.org/CVERecord?id=CVE-2021-27053"},{"name":"CVE-2021-27055","url":"https://www.cve.org/CVERecord?id=CVE-2021-27055"},{"name":"CVE-2021-27050","url":"https://www.cve.org/CVERecord?id=CVE-2021-27050"},{"name":"CVE-2021-27081","url":"https://www.cve.org/CVERecord?id=CVE-2021-27081"},{"name":"CVE-2021-26859","url":"https://www.cve.org/CVERecord?id=CVE-2021-26859"},{"name":"CVE-2021-27082","url":"https://www.cve.org/CVERecord?id=CVE-2021-27082"},{"name":"CVE-2021-27076","url":"https://www.cve.org/CVERecord?id=CVE-2021-27076"},{"name":"CVE-2021-27049","url":"https://www.cve.org/CVERecord?id=CVE-2021-27049"},{"name":"CVE-2021-27056","url":"https://www.cve.org/CVERecord?id=CVE-2021-27056"},{"name":"CVE-2021-27084","url":"https://www.cve.org/CVERecord?id=CVE-2021-27084"},{"name":"CVE-2021-27051","url":"https://www.cve.org/CVERecord?id=CVE-2021-27051"},{"name":"CVE-2021-21300","url":"https://www.cve.org/CVERecord?id=CVE-2021-21300"},{"name":"CVE-2021-27083","url":"https://www.cve.org/CVERecord?id=CVE-2021-27083"},{"name":"CVE-2021-27047","url":"https://www.cve.org/CVERecord?id=CVE-2021-27047"},{"name":"CVE-2021-27057","url":"https://www.cve.org/CVERecord?id=CVE-2021-27057"},{"name":"CVE-2021-27054","url":"https://www.cve.org/CVERecord?id=CVE-2021-27054"},{"name":"CVE-2021-24110","url":"https://www.cve.org/CVERecord?id=CVE-2021-24110"},{"name":"CVE-2021-27062","url":"https://www.cve.org/CVERecord?id=CVE-2021-27062"},{"name":"CVE-2021-26902","url":"https://www.cve.org/CVERecord?id=CVE-2021-26902"},{"name":"CVE-2021-27074","url":"https://www.cve.org/CVERecord?id=CVE-2021-27074"},{"name":"CVE-2021-24089","url":"https://www.cve.org/CVERecord?id=CVE-2021-24089"},{"name":"CVE-2021-27058","url":"https://www.cve.org/CVERecord?id=CVE-2021-27058"},{"name":"CVE-2021-27080","url":"https://www.cve.org/CVERecord?id=CVE-2021-27080"},{"name":"CVE-2021-24108","url":"https://www.cve.org/CVERecord?id=CVE-2021-24108"}],"links":[],"reference":"CERTFR-2021-AVI-182","revisions":[{"description":"Version initiale","revision_date":"2021-03-10T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">les produits Microsoft</span>. Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code \u00e0 distance, un\ncontournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9 et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Microsoft du 09 mars 2021","url":"https://portal.msrc.microsoft.com/fr-FR/security-guidance"}]}
