{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Oracle Java SE version 6u113","product":{"name":"Java SE","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Java SE version 8u77","product":{"name":"Java SE","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Java SE version 7u99","product":{"name":"Java SE","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle JRockit version R28.3.9","product":{"name":"Java SE","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Java SE Embedded version 8u77","product":{"name":"Java SE","vendor":{"name":"Oracle","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2016-0687","url":"https://www.cve.org/CVERecord?id=CVE-2016-0687"},{"name":"CVE-2016-0695","url":"https://www.cve.org/CVERecord?id=CVE-2016-0695"},{"name":"CVE-2016-3427","url":"https://www.cve.org/CVERecord?id=CVE-2016-3427"},{"name":"CVE-2016-0686","url":"https://www.cve.org/CVERecord?id=CVE-2016-0686"},{"name":"CVE-2016-3426","url":"https://www.cve.org/CVERecord?id=CVE-2016-3426"},{"name":"CVE-2016-3449","url":"https://www.cve.org/CVERecord?id=CVE-2016-3449"},{"name":"CVE-2016-3425","url":"https://www.cve.org/CVERecord?id=CVE-2016-3425"},{"name":"CVE-2016-3443","url":"https://www.cve.org/CVERecord?id=CVE-2016-3443"},{"name":"CVE-2016-3422","url":"https://www.cve.org/CVERecord?id=CVE-2016-3422"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2016v3verbose du 19 avril    2016","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016verbose-2881709.html#JAVA"}],"reference":"CERTFR-2016-AVI-135","revisions":[{"description":"version initiale.","revision_date":"2016-04-20T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Oracle Java SE</span>. Certaines d'entre elles permettent\n\u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, un\ncontournement de la politique de s\u00e9curit\u00e9 et une atteinte \u00e0 l'int\u00e9grit\u00e9\ndes donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Oracle Java SE","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2016v3 du 19 avril 2016","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html#AppendixJAVA"}]}
