{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<p>IBM Java 5.0 versions ant\u00e9rieures \u00e0  Service Refresh 11 Fix Pack 1</p>","content":"## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM Java. Certaines\nfont r\u00e9f\u00e9rences aux vuln\u00e9rabilit\u00e9s d\u00e9crites dans l'avis du CERTA indiqu\u00e9\ndans la documentation ci-dessous.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2010-0092","url":"https://www.cve.org/CVERecord?id=CVE-2010-0092"},{"name":"CVE-2010-0085","url":"https://www.cve.org/CVERecord?id=CVE-2010-0085"},{"name":"CVE-2010-0095","url":"https://www.cve.org/CVERecord?id=CVE-2010-0095"},{"name":"CVE-2010-0091","url":"https://www.cve.org/CVERecord?id=CVE-2010-0091"},{"name":"CVE-2010-0084","url":"https://www.cve.org/CVERecord?id=CVE-2010-0084"},{"name":"CVE-2010-0088","url":"https://www.cve.org/CVERecord?id=CVE-2010-0088"},{"name":"CVE-2010-0837","url":"https://www.cve.org/CVERecord?id=CVE-2010-0837"},{"name":"CVE-2010-0094","url":"https://www.cve.org/CVERecord?id=CVE-2010-0094"},{"name":"CVE-2010-0838","url":"https://www.cve.org/CVERecord?id=CVE-2010-0838"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 IBM swg21420576 du 03 mars 2010 :","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21420576"},{"title":"Avis CERTA CERTA-2010-AVI-152 :","url":"http://www.certa.ssi.gouv.fr/site/CERTA-2010-AVI-152/index.html"}],"reference":"CERTA-2010-AVI-192","revisions":[{"description":"version initiale.","revision_date":"2010-04-22T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans IBM Java peuvent \u00eatre\nexploit\u00e9es par un utilisateur malintentionn\u00e9 afin de compromettre le\nsyst\u00e8me ou d'entraver son bon fonctionnement.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans IBM Java","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 IBM swg21420576 du 02 mars 2010","url":null}]}
