{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Adobe Acrobat DC Classic versions ant\u00e9rieures \u00e0 15.006.30198 sur Windows et Macintosh","product":{"name":"Acrobat","vendor":{"name":"Adobe","scada":false}}},{"description":"Adobe Acrobat Reader DC versions ant\u00e9rieures \u00e0 15.017.20050 sur Windows et Macintosh","product":{"name":"Acrobat","vendor":{"name":"Adobe","scada":false}}},{"description":"Adobe Acrobat Reader DC Classic versions ant\u00e9rieures \u00e0 15.006.30198 sur Windows et Macintosh","product":{"name":"Acrobat","vendor":{"name":"Adobe","scada":false}}},{"description":"Adobe Acrobat XI versions ant\u00e9rieures \u00e0 11.0.17 sur Windows et Macintosh","product":{"name":"Acrobat","vendor":{"name":"Adobe","scada":false}}},{"description":"Adobe Reader XI versions ant\u00e9rieures \u00e0 11.0.17 sur Windows et Macintosh","product":{"name":"Acrobat","vendor":{"name":"Adobe","scada":false}}},{"description":"Adobe Acrobat DC versions ant\u00e9rieures \u00e0 15.017.20050 sur Windows et Macintosh","product":{"name":"Acrobat","vendor":{"name":"Adobe","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2016-4195","url":"https://www.cve.org/CVERecord?id=CVE-2016-4195"},{"name":"CVE-2016-4255","url":"https://www.cve.org/CVERecord?id=CVE-2016-4255"},{"name":"CVE-2016-4200","url":"https://www.cve.org/CVERecord?id=CVE-2016-4200"},{"name":"CVE-2016-4212","url":"https://www.cve.org/CVERecord?id=CVE-2016-4212"},{"name":"CVE-2016-4215","url":"https://www.cve.org/CVERecord?id=CVE-2016-4215"},{"name":"CVE-2016-4252","url":"https://www.cve.org/CVERecord?id=CVE-2016-4252"},{"name":"CVE-2016-4209","url":"https://www.cve.org/CVERecord?id=CVE-2016-4209"},{"name":"CVE-2016-4251","url":"https://www.cve.org/CVERecord?id=CVE-2016-4251"},{"name":"CVE-2016-4213","url":"https://www.cve.org/CVERecord?id=CVE-2016-4213"},{"name":"CVE-2016-4206","url":"https://www.cve.org/CVERecord?id=CVE-2016-4206"},{"name":"CVE-2016-4198","url":"https://www.cve.org/CVERecord?id=CVE-2016-4198"},{"name":"CVE-2016-4205","url":"https://www.cve.org/CVERecord?id=CVE-2016-4205"},{"name":"CVE-2016-4196","url":"https://www.cve.org/CVERecord?id=CVE-2016-4196"},{"name":"CVE-2016-4211","url":"https://www.cve.org/CVERecord?id=CVE-2016-4211"},{"name":"CVE-2016-4250","url":"https://www.cve.org/CVERecord?id=CVE-2016-4250"},{"name":"CVE-2016-4207","url":"https://www.cve.org/CVERecord?id=CVE-2016-4207"},{"name":"CVE-2016-4214","url":"https://www.cve.org/CVERecord?id=CVE-2016-4214"},{"name":"CVE-2016-4194","url":"https://www.cve.org/CVERecord?id=CVE-2016-4194"},{"name":"CVE-2016-4193","url":"https://www.cve.org/CVERecord?id=CVE-2016-4193"},{"name":"CVE-2016-4197","url":"https://www.cve.org/CVERecord?id=CVE-2016-4197"},{"name":"CVE-2016-4201","url":"https://www.cve.org/CVERecord?id=CVE-2016-4201"},{"name":"CVE-2016-4254","url":"https://www.cve.org/CVERecord?id=CVE-2016-4254"},{"name":"CVE-2016-4208","url":"https://www.cve.org/CVERecord?id=CVE-2016-4208"},{"name":"CVE-2016-4191","url":"https://www.cve.org/CVERecord?id=CVE-2016-4191"},{"name":"CVE-2016-4204","url":"https://www.cve.org/CVERecord?id=CVE-2016-4204"},{"name":"CVE-2016-4199","url":"https://www.cve.org/CVERecord?id=CVE-2016-4199"},{"name":"CVE-2016-4203","url":"https://www.cve.org/CVERecord?id=CVE-2016-4203"},{"name":"CVE-2016-4192","url":"https://www.cve.org/CVERecord?id=CVE-2016-4192"},{"name":"CVE-2016-4210","url":"https://www.cve.org/CVERecord?id=CVE-2016-4210"},{"name":"CVE-2016-4202","url":"https://www.cve.org/CVERecord?id=CVE-2016-4202"}],"links":[],"reference":"CERTFR-2016-AVI-233","revisions":[{"description":"version initiale.","revision_date":"2016-07-13T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Adobe Acrobat et Reader</span>. Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Adobe Acrobat et Reader","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Adobe APSB16-26 du 12 juillet 2016","url":"https://helpx.adobe.com/security/products/acrobat/apsb16-26.html"}]}
