{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Microsoft Exchange Server 2013 Cumulative Update 23","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Team Foundation Server 2018 Update 3.2","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Azure DevOps Server 2019.0.1","product":{"name":"Azure","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Visual Studio 2019 version 16.7 (includes 16.0 \u2013 16.6)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Exchange Server 2016 Cumulative Update 19","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Azure DevOps Server 2020","product":{"name":"Azure","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Azure DevOps Server 2019 Update 1","product":{"name":"Azure","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Exchange Server 2019 Cumulative Update 8","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Raw Image Extension","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"VP9 Video Extensions","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Team Foundation Server 2017 Update 3.1","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Visual Studio Code","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft 365 Apps pour Enterprise pour syst\u00e8mes 32 bits","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Visual Studio Code - Maven pour Java Extension","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft 365 Apps pour Enterprise pour 64 bits Systems","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Exchange Server 2016 Cumulative Update 20","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Visual Studio 2015 Update 3","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"@azure/ms-rest-nodeauth","product":{"name":"Azure","vendor":{"name":"Microsoft","scada":false}}},{"description":"Visual Studio Code - GitHub Pull Requests and Issues Extension","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Team Foundation Server 2018 Update 1.2","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Microsoft Exchange Server 2019 Cumulative Update 9","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Azure DevOps Server 2020.0.1","product":{"name":"Azure","vendor":{"name":"Microsoft","scada":false}}},{"description":"Azure Sphere","product":{"name":"Azure","vendor":{"name":"Microsoft","scada":false}}},{"description":"Visual Studio Code - Kubernetes Tools","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}},{"description":"Azure DevOps Server 2019 Update 1.1","product":{"name":"Azure","vendor":{"name":"Microsoft","scada":false}}},{"description":"Team Foundation Server 2015 Update 4.2","product":{"name":"N/A","vendor":{"name":"Microsoft","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2021-28448","url":"https://www.cve.org/CVERecord?id=CVE-2021-28448"},{"name":"CVE-2021-28470","url":"https://www.cve.org/CVERecord?id=CVE-2021-28470"},{"name":"CVE-2021-28453","url":"https://www.cve.org/CVERecord?id=CVE-2021-28453"},{"name":"CVE-2021-28459","url":"https://www.cve.org/CVERecord?id=CVE-2021-28459"},{"name":"CVE-2021-27064","url":"https://www.cve.org/CVERecord?id=CVE-2021-27064"},{"name":"CVE-2021-28483","url":"https://www.cve.org/CVERecord?id=CVE-2021-28483"},{"name":"CVE-2021-28477","url":"https://www.cve.org/CVERecord?id=CVE-2021-28477"},{"name":"CVE-2021-28464","url":"https://www.cve.org/CVERecord?id=CVE-2021-28464"},{"name":"CVE-2021-28322","url":"https://www.cve.org/CVERecord?id=CVE-2021-28322"},{"name":"CVE-2021-27067","url":"https://www.cve.org/CVERecord?id=CVE-2021-27067"},{"name":"CVE-2021-28473","url":"https://www.cve.org/CVERecord?id=CVE-2021-28473"},{"name":"CVE-2021-28458","url":"https://www.cve.org/CVERecord?id=CVE-2021-28458"},{"name":"CVE-2021-28313","url":"https://www.cve.org/CVERecord?id=CVE-2021-28313"},{"name":"CVE-2021-28472","url":"https://www.cve.org/CVERecord?id=CVE-2021-28472"},{"name":"CVE-2021-28466","url":"https://www.cve.org/CVERecord?id=CVE-2021-28466"},{"name":"CVE-2021-28449","url":"https://www.cve.org/CVERecord?id=CVE-2021-28449"},{"name":"CVE-2021-28451","url":"https://www.cve.org/CVERecord?id=CVE-2021-28451"},{"name":"CVE-2021-28475","url":"https://www.cve.org/CVERecord?id=CVE-2021-28475"},{"name":"CVE-2021-28454","url":"https://www.cve.org/CVERecord?id=CVE-2021-28454"},{"name":"CVE-2021-28482","url":"https://www.cve.org/CVERecord?id=CVE-2021-28482"},{"name":"CVE-2021-28468","url":"https://www.cve.org/CVERecord?id=CVE-2021-28468"},{"name":"CVE-2021-28321","url":"https://www.cve.org/CVERecord?id=CVE-2021-28321"},{"name":"CVE-2021-28469","url":"https://www.cve.org/CVERecord?id=CVE-2021-28469"},{"name":"CVE-2021-28481","url":"https://www.cve.org/CVERecord?id=CVE-2021-28481"},{"name":"CVE-2021-28452","url":"https://www.cve.org/CVERecord?id=CVE-2021-28452"},{"name":"CVE-2021-28460","url":"https://www.cve.org/CVERecord?id=CVE-2021-28460"},{"name":"CVE-2021-28480","url":"https://www.cve.org/CVERecord?id=CVE-2021-28480"},{"name":"CVE-2021-28456","url":"https://www.cve.org/CVERecord?id=CVE-2021-28456"},{"name":"CVE-2021-28457","url":"https://www.cve.org/CVERecord?id=CVE-2021-28457"},{"name":"CVE-2021-28471","url":"https://www.cve.org/CVERecord?id=CVE-2021-28471"}],"links":[],"reference":"CERTFR-2021-AVI-262","revisions":[{"description":"Version initiale","revision_date":"2021-04-14T00:00:00.000000"}],"risks":[{"description":"Usurpation d'identit\u00e9"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">les produits Microsoft</span>. Elles permettent \u00e0 un\nattaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es,\nune ex\u00e9cution de code \u00e0 distance, une usurpation d'identit\u00e9 et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Microsoft du 13 avril 2021","url":"https://portal.msrc.microsoft.com/fr-FR/security-guidance"}]}
