{"id":8965,"date":"2008-08-29T00:48:28","date_gmt":"2008-08-28T22:48:28","guid":{"rendered":"https:\/\/destinationcyber.com\/?p=8965"},"modified":"2008-08-29T00:48:28","modified_gmt":"2008-08-28T22:48:28","slug":"une-faille-de-securite-a-ete-decouverte-sur-les-portables-hp-qui-utilisent-le-logiciel-hp-info-center","status":"publish","type":"post","link":"https:\/\/destinationcyber.com\/?p=8965","title":{"rendered":"Une faille de s\u00e9curit\u00e9 a \u00e9t\u00e9 d\u00e9couverte sur les portables HP qui utilisent le logiciel HP Info Center"},"content":{"rendered":"<p>The Register \u00e9crit qu&rsquo;une faille de s\u00e9curit\u00e9 a \u00e9t\u00e9 d\u00e9couverte sur les ordinateurs portables HP qui utilisent le logiciel HP Info Center : \u00abUn des contr\u00f4les ActiveX utilise trois m\u00e9thodes peu s\u00fbres qui peuvent permettre \u00e0 un hacker l&rsquo;ex\u00e9cution de code \u00e0 distance et la manipulation du registre\u00bb.<\/p>\n<p>Sortez des chemins battus et vous pourriez bien \u00eatre hack\u00e9. Il y a des manipulations \u00e0 faire manuellement pour \u00e9viter cela, elles sont d\u00e9taill\u00e9es dans <a href=\"http:\/\/www.theregister.co.uk\/2007\/12\/12\/hp_laptop_vuln\/\">l&#8217;article|l&#8217;article<\/a>, mais il n&#8217;y a pas de correctifs officiels HP.<\/p>\n<p>Fanch<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Register \u00e9crit qu&rsquo;une faille de s\u00e9curit\u00e9 a \u00e9t\u00e9 d\u00e9couverte sur les ordinateurs portables HP qui utilisent le logiciel HP Info Center : \u00abUn des contr\u00f4les ActiveX utilise trois m\u00e9thodes peu s\u00fbres qui peuvent permettre \u00e0 un hacker l&rsquo;ex\u00e9cution de code \u00e0 distance et la manipulation du registre\u00bb. Sortez des chemins battus et vous pourriez [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_citadela_custom_class":"","footnotes":""},"categories":[15],"tags":[],"class_list":["post-8965","post","type-post","status-publish","format-standard","hentry","category-securite"],"_links":{"self":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/8965","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8965"}],"version-history":[{"count":0,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/8965\/revisions"}],"wp:attachment":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8965"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8965"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8965"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}