{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"IBM Rational Method Composer version 7.5.2.1","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"IBM Rational Synergy version 7.1","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"IBM Rational Synergy version 7.1.0.4","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"IBM Rational Synergy version 7.1.0.5","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"IBM Rational Synergy version 7.1.0.6","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"IBM Rational Synergy version 7.1.0.1","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"IBM Rational System Architect versions ant\u00e9rieures \u00e0 11.4.2.2","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"IBM Rational Synergy version 7.1.0.2","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}},{"description":"IBM Rational Synergy version 7.1.0.3","product":{"name":"N/A","vendor":{"name":"IBM","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2012-1722","url":"https://www.cve.org/CVERecord?id=CVE-2012-1722"},{"name":"CVE-2012-1719","url":"https://www.cve.org/CVERecord?id=CVE-2012-1719"},{"name":"CVE-2012-3159","url":"https://www.cve.org/CVERecord?id=CVE-2012-3159"},{"name":"CVE-2012-1533","url":"https://www.cve.org/CVERecord?id=CVE-2012-1533"},{"name":"CVE-2012-1531","url":"https://www.cve.org/CVERecord?id=CVE-2012-1531"},{"name":"CVE-2012-3216","url":"https://www.cve.org/CVERecord?id=CVE-2012-3216"},{"name":"CVE-2012-5081","url":"https://www.cve.org/CVERecord?id=CVE-2012-5081"},{"name":"CVE-2012-5083","url":"https://www.cve.org/CVERecord?id=CVE-2012-5083"},{"name":"CVE-2012-1721","url":"https://www.cve.org/CVERecord?id=CVE-2012-1721"},{"name":"CVE-2012-1720","url":"https://www.cve.org/CVERecord?id=CVE-2012-1720"},{"name":"CVE-2012-1718","url":"https://www.cve.org/CVERecord?id=CVE-2012-1718"},{"name":"CVE-2012-5072","url":"https://www.cve.org/CVERecord?id=CVE-2012-5072"},{"name":"CVE-2012-5079","url":"https://www.cve.org/CVERecord?id=CVE-2012-5079"},{"name":"CVE-2012-5075","url":"https://www.cve.org/CVERecord?id=CVE-2012-5075"},{"name":"CVE-2012-5071","url":"https://www.cve.org/CVERecord?id=CVE-2012-5071"},{"name":"CVE-2012-1716","url":"https://www.cve.org/CVERecord?id=CVE-2012-1716"},{"name":"CVE-2012-5073","url":"https://www.cve.org/CVERecord?id=CVE-2012-5073"},{"name":"CVE-2012-5084","url":"https://www.cve.org/CVERecord?id=CVE-2012-5084"},{"name":"CVE-2012-1725","url":"https://www.cve.org/CVERecord?id=CVE-2012-1725"},{"name":"CVE-2012-5089","url":"https://www.cve.org/CVERecord?id=CVE-2012-5089"},{"name":"CVE-2012-3143","url":"https://www.cve.org/CVERecord?id=CVE-2012-3143"},{"name":"CVE-2012-1717","url":"https://www.cve.org/CVERecord?id=CVE-2012-1717"},{"name":"CVE-2012-5069","url":"https://www.cve.org/CVERecord?id=CVE-2012-5069"},{"name":"CVE-2012-5068","url":"https://www.cve.org/CVERecord?id=CVE-2012-5068"},{"name":"CVE-2012-4416","url":"https://www.cve.org/CVERecord?id=CVE-2012-4416"},{"name":"CVE-2012-1532","url":"https://www.cve.org/CVERecord?id=CVE-2012-1532"},{"name":"CVE-2012-0551","url":"https://www.cve.org/CVERecord?id=CVE-2012-0551"},{"name":"CVE-2012-1713","url":"https://www.cve.org/CVERecord?id=CVE-2012-1713"}],"links":[],"reference":"CERTA-2012-AVI-762","revisions":[{"description":"version initiale.","revision_date":"2012-12-26T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits <span\nclass=\"textit\">IBM Rational</span>. Elles concernent le composant <span\nclass=\"textit\">Java</span> et peuvent mener un utilisateur\nmalintentionn\u00e9 \u00e0 ex\u00e9cuter du code arbitraire \u00e0 distance.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM Rational","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 IBM swg21618977 du 20 d\u00e9cembre 2012","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21618977"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 IBM swg21620037","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21620037"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 IBM swg21620862 du 21 d\u00e9cembre 2012","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21620862"}]}
