{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Java SE version 5.0u55","product":{"name":"Java SE","vendor":{"name":"Oracle","scada":false}}},{"description":"Java SE version 6u65","product":{"name":"Java SE","vendor":{"name":"Oracle","scada":false}}},{"description":"Java SE version 7u45","product":{"name":"Java SE","vendor":{"name":"Oracle","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2013-5893","url":"https://www.cve.org/CVERecord?id=CVE-2013-5893"},{"name":"CVE-2014-0417","url":"https://www.cve.org/CVERecord?id=CVE-2014-0417"},{"name":"CVE-2013-5910","url":"https://www.cve.org/CVERecord?id=CVE-2013-5910"},{"name":"CVE-2013-5904","url":"https://www.cve.org/CVERecord?id=CVE-2013-5904"},{"name":"CVE-2014-0403","url":"https://www.cve.org/CVERecord?id=CVE-2014-0403"},{"name":"CVE-2014-0385","url":"https://www.cve.org/CVERecord?id=CVE-2014-0385"},{"name":"CVE-2013-5870","url":"https://www.cve.org/CVERecord?id=CVE-2013-5870"},{"name":"CVE-2014-0411","url":"https://www.cve.org/CVERecord?id=CVE-2014-0411"},{"name":"CVE-2014-0424","url":"https://www.cve.org/CVERecord?id=CVE-2014-0424"},{"name":"CVE-2014-0422","url":"https://www.cve.org/CVERecord?id=CVE-2014-0422"},{"name":"CVE-2013-5884","url":"https://www.cve.org/CVERecord?id=CVE-2013-5884"},{"name":"CVE-2013-5907","url":"https://www.cve.org/CVERecord?id=CVE-2013-5907"},{"name":"CVE-2013-5898","url":"https://www.cve.org/CVERecord?id=CVE-2013-5898"},{"name":"CVE-2014-0387","url":"https://www.cve.org/CVERecord?id=CVE-2014-0387"},{"name":"CVE-2014-0423","url":"https://www.cve.org/CVERecord?id=CVE-2014-0423"},{"name":"CVE-2014-0410","url":"https://www.cve.org/CVERecord?id=CVE-2014-0410"},{"name":"CVE-2013-5888","url":"https://www.cve.org/CVERecord?id=CVE-2013-5888"},{"name":"CVE-2013-5895","url":"https://www.cve.org/CVERecord?id=CVE-2013-5895"},{"name":"CVE-2014-0376","url":"https://www.cve.org/CVERecord?id=CVE-2014-0376"},{"name":"CVE-2013-5889","url":"https://www.cve.org/CVERecord?id=CVE-2013-5889"},{"name":"CVE-2014-0416","url":"https://www.cve.org/CVERecord?id=CVE-2014-0416"},{"name":"CVE-2013-5899","url":"https://www.cve.org/CVERecord?id=CVE-2013-5899"},{"name":"CVE-2013-5878","url":"https://www.cve.org/CVERecord?id=CVE-2013-5878"},{"name":"CVE-2013-5906","url":"https://www.cve.org/CVERecord?id=CVE-2013-5906"},{"name":"CVE-2014-0373","url":"https://www.cve.org/CVERecord?id=CVE-2014-0373"},{"name":"CVE-2013-5905","url":"https://www.cve.org/CVERecord?id=CVE-2013-5905"},{"name":"CVE-2014-0382","url":"https://www.cve.org/CVERecord?id=CVE-2014-0382"},{"name":"CVE-2014-0418","url":"https://www.cve.org/CVERecord?id=CVE-2014-0418"},{"name":"CVE-2014-0415","url":"https://www.cve.org/CVERecord?id=CVE-2014-0415"},{"name":"CVE-2014-0428","url":"https://www.cve.org/CVERecord?id=CVE-2014-0428"},{"name":"CVE-2014-0408","url":"https://www.cve.org/CVERecord?id=CVE-2014-0408"},{"name":"CVE-2014-0375","url":"https://www.cve.org/CVERecord?id=CVE-2014-0375"},{"name":"CVE-2014-0368","url":"https://www.cve.org/CVERecord?id=CVE-2014-0368"},{"name":"CVE-2013-5887","url":"https://www.cve.org/CVERecord?id=CVE-2013-5887"},{"name":"CVE-2013-5902","url":"https://www.cve.org/CVERecord?id=CVE-2013-5902"},{"name":"CVE-2013-5896","url":"https://www.cve.org/CVERecord?id=CVE-2013-5896"}],"links":[],"reference":"CERTA-2014-AVI-030","revisions":[{"description":"version initiale.","revision_date":"2014-01-15T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Oracle Java SE</span>. Certaines d'entre elles permettent\n\u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance,\nun d\u00e9ni de service \u00e0 distance et un contournement de la politique de\ns\u00e9curit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Oracle Java SE","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Oracle cpujan2014 du 14 janvier 2014","url":"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"}]}
