{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Java for Business, SDK 1.4.2_27 et ant\u00e9rieures pour Windows, Solaris et Linux.","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Java SE, SDK version 1.4.2_27 et ant\u00e9rieures pour Solaris ;","product":{"name":"Java SE","vendor":{"name":"Oracle","scada":false}}},{"description":"Java for Business, JDK et JRE 6 mise \u00e0 jour 21 et ant\u00e9rieures pour Windows, Solaris et Linux ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Java for Business, JDK 5.0 mise \u00e0 jour 25 et ant\u00e9rieures pour Solaris ;","product":{"name":"N/A","vendor":{"name":"Oracle","scada":false}}},{"description":"Java SE, JDK et JRE 6 mise \u00e0 jour 21 et ant\u00e9rieure pour Windows, Solaris et Linux ;","product":{"name":"Java SE","vendor":{"name":"Oracle","scada":false}}},{"description":"Java SE, JDK 5.0 mise \u00e0 jour 25 et ant\u00e9rieures pour Solaris ;","product":{"name":"Java SE","vendor":{"name":"Oracle","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identif\u00e9es dans Java SE et Java for\nBusiness. Elles peuvent \u00eatre exploit\u00e9es par un utilisateur distant\nmalintentionn\u00e9 pour ex\u00e9cuter du code arbitraire ou porter atteinte \u00e0 la\nconfidentialit\u00e9 et \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es. Se r\u00e9f\u00e9rer \u00e0 l'avis de\nmise \u00e0 jour critique de Oracle pour une description compl\u00e8te des\nvuln\u00e9rabilit\u00e9s corrig\u00e9es.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2010-1321","url":"https://www.cve.org/CVERecord?id=CVE-2010-1321"},{"name":"CVE-2010-3552","url":"https://www.cve.org/CVERecord?id=CVE-2010-3552"},{"name":"CVE-2010-3541","url":"https://www.cve.org/CVERecord?id=CVE-2010-3541"},{"name":"CVE-2010-3558","url":"https://www.cve.org/CVERecord?id=CVE-2010-3558"},{"name":"CVE-2010-3549","url":"https://www.cve.org/CVERecord?id=CVE-2010-3549"},{"name":"CVE-2010-3573","url":"https://www.cve.org/CVERecord?id=CVE-2010-3573"},{"name":"CVE-2010-3572","url":"https://www.cve.org/CVERecord?id=CVE-2010-3572"},{"name":"CVE-2010-3559","url":"https://www.cve.org/CVERecord?id=CVE-2010-3559"},{"name":"CVE-2010-3571","url":"https://www.cve.org/CVERecord?id=CVE-2010-3571"},{"name":"CVE-2010-3566","url":"https://www.cve.org/CVERecord?id=CVE-2010-3566"},{"name":"CVE-2010-3560","url":"https://www.cve.org/CVERecord?id=CVE-2010-3560"},{"name":"CVE-2010-3570","url":"https://www.cve.org/CVERecord?id=CVE-2010-3570"},{"name":"CVE-2010-3563","url":"https://www.cve.org/CVERecord?id=CVE-2010-3563"},{"name":"CVE-2010-3555","url":"https://www.cve.org/CVERecord?id=CVE-2010-3555"},{"name":"CVE-2010-3556","url":"https://www.cve.org/CVERecord?id=CVE-2010-3556"},{"name":"CVE-2010-3569","url":"https://www.cve.org/CVERecord?id=CVE-2010-3569"},{"name":"CVE-2010-3562","url":"https://www.cve.org/CVERecord?id=CVE-2010-3562"},{"name":"CVE-2010-3568","url":"https://www.cve.org/CVERecord?id=CVE-2010-3568"},{"name":"CVE-2010-3548","url":"https://www.cve.org/CVERecord?id=CVE-2010-3548"},{"name":"CVE-2010-3561","url":"https://www.cve.org/CVERecord?id=CVE-2010-3561"},{"name":"CVE-2010-3567","url":"https://www.cve.org/CVERecord?id=CVE-2010-3567"},{"name":"CVE-2010-3550","url":"https://www.cve.org/CVERecord?id=CVE-2010-3550"},{"name":"CVE-2010-3557","url":"https://www.cve.org/CVERecord?id=CVE-2010-3557"},{"name":"CVE-2010-3565","url":"https://www.cve.org/CVERecord?id=CVE-2010-3565"},{"name":"CVE-2010-3574","url":"https://www.cve.org/CVERecord?id=CVE-2010-3574"},{"name":"CVE-2010-3551","url":"https://www.cve.org/CVERecord?id=CVE-2010-3551"},{"name":"CVE-2010-3554","url":"https://www.cve.org/CVERecord?id=CVE-2010-3554"},{"name":"CVE-2010-3553","url":"https://www.cve.org/CVERecord?id=CVE-2010-3553"}],"links":[{"title":"Avis de mise jour critique pour Oracle Java SE et Java for    Business :","url":"http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html"}],"reference":"CERTA-2010-AVI-500","revisions":[{"description":"version initiale.","revision_date":"2010-10-14T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s dans Java SE et Java for Business peuvent\n\u00eatre exploit\u00e9es par un utilisateur malintentionn\u00e9 pour ex\u00e9cuter du code\narbitraire \u00e0 distance ou porter atteinte \u00e0 la confidentialit\u00e9 et \u00e0\nl'int\u00e9grit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Oracle Java","vendor_advisories":[{"published_at":null,"title":"Avis de mise \u00e0 jour critique Java SE et Java for Business d'octobre 2010","url":null}]}
