{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Oracle Collaboration Suite 10g, version 10.1.2.4 ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"PeopleSoft Enterprise PeopleTools, versions 8.49 et 8.50 ;","product":{"name":"PeopleSoft","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle E-Business Suite Release 12, versions 12.0.4, 12.0.5, 12.0.6, 12.1.1 et 12.1.2 ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Agile - Engineering Data Management, version 6.1.1.0 ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Thesaurus Management System 4.5.2, 4.6, 4.6.1 ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Sun Product Suite.","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Database 10g, version 10.1.0.5 ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Communications Unified Inventory Management version 7.1 ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Retail Markdown Optimization version 13.1 ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Clinical Remote Data Capture Option 4.5.3, 4.6 ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Identity Management 10g, version 10.1.4.0.1 et 10.1.4.3 ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Database 11g Release 1, version 11.1.0.7 ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Transportation Manager, versions: 5.5.05.07, 5.5.06.00, 6.0.03 ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Database 10g Release 2, versions 10.2.0.3, 10.2.0.4 ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Application Server 10gR2, version 10.1.2.3.0 ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Database 11g Release 2, version 11.2.0.1 ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Database 9i Release 2, versions 9.2.0.8, 9.2.0.8DV ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle E-Business Suite Release 11i, versions 11.5.10, 11.5.10.2 ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Retail Place In-Season version 12.2 ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Retail Plan In-Season version 12.2 ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nDe nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans des produits Oracle,\npermettant entre autre, l'ex\u00e9cution de code arbitraire \u00e0 distance. Ce\nbulletin couvre aussi les produits Oracle Sun, tels que Solaris ou Sun\nJAVA.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2010-0851","url":"https://www.cve.org/CVERecord?id=CVE-2010-0851"},{"name":"CVE-2010-0852","url":"https://www.cve.org/CVERecord?id=CVE-2010-0852"},{"name":"CVE-2010-0870","url":"https://www.cve.org/CVERecord?id=CVE-2010-0870"},{"name":"CVE-2010-0894","url":"https://www.cve.org/CVERecord?id=CVE-2010-0894"},{"name":"CVE-2010-0858","url":"https://www.cve.org/CVERecord?id=CVE-2010-0858"},{"name":"CVE-2010-0877","url":"https://www.cve.org/CVERecord?id=CVE-2010-0877"},{"name":"CVE-2010-0869","url":"https://www.cve.org/CVERecord?id=CVE-2010-0869"},{"name":"CVE-2010-0897","url":"https://www.cve.org/CVERecord?id=CVE-2010-0897"},{"name":"CVE-2010-0893","url":"https://www.cve.org/CVERecord?id=CVE-2010-0893"},{"name":"CVE-2010-0878","url":"https://www.cve.org/CVERecord?id=CVE-2010-0878"},{"name":"CVE-2010-0879","url":"https://www.cve.org/CVERecord?id=CVE-2010-0879"},{"name":"CVE-2010-0862","url":"https://www.cve.org/CVERecord?id=CVE-2010-0862"},{"name":"CVE-2010-0875","url":"https://www.cve.org/CVERecord?id=CVE-2010-0875"},{"name":"CVE-2010-0890","url":"https://www.cve.org/CVERecord?id=CVE-2010-0890"},{"name":"CVE-2010-0895","url":"https://www.cve.org/CVERecord?id=CVE-2010-0895"},{"name":"CVE-2010-0896","url":"https://www.cve.org/CVERecord?id=CVE-2010-0896"},{"name":"CVE-2009-2404","url":"https://www.cve.org/CVERecord?id=CVE-2009-2404"},{"name":"CVE-2010-0857","url":"https://www.cve.org/CVERecord?id=CVE-2010-0857"},{"name":"CVE-2010-0882","url":"https://www.cve.org/CVERecord?id=CVE-2010-0882"},{"name":"CVE-2010-0868","url":"https://www.cve.org/CVERecord?id=CVE-2010-0868"},{"name":"CVE-2010-0865","url":"https://www.cve.org/CVERecord?id=CVE-2010-0865"},{"name":"CVE-2010-0888","url":"https://www.cve.org/CVERecord?id=CVE-2010-0888"},{"name":"CVE-2010-0871","url":"https://www.cve.org/CVERecord?id=CVE-2010-0871"},{"name":"CVE-2010-0086","url":"https://www.cve.org/CVERecord?id=CVE-2010-0086"},{"name":"CVE-2010-0884","url":"https://www.cve.org/CVERecord?id=CVE-2010-0884"},{"name":"CVE-2010-0855","url":"https://www.cve.org/CVERecord?id=CVE-2010-0855"},{"name":"CVE-2010-0856","url":"https://www.cve.org/CVERecord?id=CVE-2010-0856"},{"name":"CVE-2010-0885","url":"https://www.cve.org/CVERecord?id=CVE-2010-0885"},{"name":"CVE-2010-0866","url":"https://www.cve.org/CVERecord?id=CVE-2010-0866"},{"name":"CVE-2010-0860","url":"https://www.cve.org/CVERecord?id=CVE-2010-0860"},{"name":"CVE-2010-0073","url":"https://www.cve.org/CVERecord?id=CVE-2010-0073"},{"name":"CVE-2010-0867","url":"https://www.cve.org/CVERecord?id=CVE-2010-0867"},{"name":"CVE-2010-0874","url":"https://www.cve.org/CVERecord?id=CVE-2010-0874"},{"name":"CVE-2010-0863","url":"https://www.cve.org/CVERecord?id=CVE-2010-0863"},{"name":"CVE-2010-0854","url":"https://www.cve.org/CVERecord?id=CVE-2010-0854"},{"name":"CVE-2010-0876","url":"https://www.cve.org/CVERecord?id=CVE-2010-0876"},{"name":"CVE-2010-0880","url":"https://www.cve.org/CVERecord?id=CVE-2010-0880"},{"name":"CVE-2010-0453","url":"https://www.cve.org/CVERecord?id=CVE-2010-0453"},{"name":"CVE-2010-0872","url":"https://www.cve.org/CVERecord?id=CVE-2010-0872"},{"name":"CVE-2010-0883","url":"https://www.cve.org/CVERecord?id=CVE-2010-0883"},{"name":"CVE-2010-0864","url":"https://www.cve.org/CVERecord?id=CVE-2010-0864"},{"name":"CVE-2009-0688","url":"https://www.cve.org/CVERecord?id=CVE-2009-0688"},{"name":"CVE-2010-0853","url":"https://www.cve.org/CVERecord?id=CVE-2010-0853"},{"name":"CVE-2010-0881","url":"https://www.cve.org/CVERecord?id=CVE-2010-0881"},{"name":"CVE-2010-0859","url":"https://www.cve.org/CVERecord?id=CVE-2010-0859"},{"name":"CVE-2010-0861","url":"https://www.cve.org/CVERecord?id=CVE-2010-0861"},{"name":"CVE-2010-0889","url":"https://www.cve.org/CVERecord?id=CVE-2010-0889"},{"name":"CVE-2010-0891","url":"https://www.cve.org/CVERecord?id=CVE-2010-0891"}],"links":[{"title":"Bulltin de s\u00e9curit\u00e9 de Oracle du 13 avril 2010 :","url":"http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpuapr2010.html"}],"reference":"CERTA-2010-AVI-179","revisions":[{"description":"version initiale.","revision_date":"2010-04-14T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits Oracle.\nL'exploitation de ces vuln\u00e9rabilit\u00e9s permet de r\u00e9aliser diverses actions\nmalveillantes, dont l'ex\u00e9cution de code arbitraire \u00e0 distance.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Oracle","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Oracle du 13 avril 2010","url":null}]}
