{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Oracle WebLogic Server 10gR3 (10.3.0) ;","product":{"name":"Weblogic","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle WebLogic Server 11gR1 (10.3.1 et 10.3.2) ;","product":{"name":"Weblogic","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle WebLogic Server 7.0 jusqu'\u00e0 SP7.","product":{"name":"Weblogic","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle WebLogic Server 9.0, 9.1 et 9.2 jusqu'\u00e0 MP3 ;","product":{"name":"Weblogic","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle WebLogic Server 8.1 jusqu'\u00e0 SP6 ;","product":{"name":"Weblogic","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle WebLogic Server 10.0 jusqu'\u00e0 MP2 ;","product":{"name":"Weblogic","vendor":{"name":"Oracle","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nUne vuln\u00e9rabilit\u00e9 dans le composant Node Manager de Oracle WebLogic\nServer permet \u00e0 une personne malintentionn\u00e9e, non authentifi\u00e9e\nd'ex\u00e9cuter du code arbitraire sur le syst\u00e8me vuln\u00e9rable.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2010-0073","url":"https://www.cve.org/CVERecord?id=CVE-2010-0073"}],"links":[],"reference":"CERTA-2010-AVI-074","revisions":[{"description":"version initiale.","revision_date":"2010-02-10T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"Une vuln\u00e9rabilit\u00e9 dans Oracle WebLogic Server permet l'ex\u00e9cution de code\narbitraire \u00e0 distance.\n","title":"Vuln\u00e9rabilit\u00e9 dans Oracle WebLogic Server","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Oracle du 4 f\u00e9vrier 2010","url":"http://www.oracle.com/technology/deploy/security/alerts/alert-cve-2010-0073.html"}]}
