{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Adobe Flash Player versions 11.2.202.235 et ant\u00e9rieures pour les syst\u00e8mes d'exploitation Windows, Macintosh et Linux ;","product":{"name":"N/A","vendor":{"name":"Adobe","scada":false}}},{"description":"Adobe AIR versions 3.2.0.2070 et ant\u00e9rieures pour les syst\u00e8mes d'exploitation Windows, Macintosh et Android.","product":{"name":"N/A","vendor":{"name":"Adobe","scada":false}}},{"description":"Adobe Flash Player versions 11.1.115.8 et ant\u00e9rieures pour les syst\u00e8mes d'exploitation Android 4.x ;","product":{"name":"N/A","vendor":{"name":"Adobe","scada":false}}},{"description":"Adobe Flash Player pour Chrome versions ant\u00e9rieures \u00e0 19.0.1084.56 ;","product":{"name":"N/A","vendor":{"name":"Adobe","scada":false}}},{"description":"Adobe Flash Player versions 11.1.111.9 et ant\u00e9rieures pour les syst\u00e8mes d'exploitation Android 3.x et 2.x ;","product":{"name":"N/A","vendor":{"name":"Adobe","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2012-2035","url":"https://www.cve.org/CVERecord?id=CVE-2012-2035"},{"name":"CVE-2012-2040","url":"https://www.cve.org/CVERecord?id=CVE-2012-2040"},{"name":"CVE-2012-2036","url":"https://www.cve.org/CVERecord?id=CVE-2012-2036"},{"name":"CVE-2012-2038","url":"https://www.cve.org/CVERecord?id=CVE-2012-2038"},{"name":"CVE-2012-2039","url":"https://www.cve.org/CVERecord?id=CVE-2012-2039"},{"name":"CVE-2012-2037","url":"https://www.cve.org/CVERecord?id=CVE-2012-2037"},{"name":"CVE-2012-2034","url":"https://www.cve.org/CVERecord?id=CVE-2012-2034"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Adobe apsb12-14 du 08 juin 2012 :","url":"http://www.adobe.com/support/security/bulletins/apsb12-14.html"},{"title":"Notes de version Google Chrome    du 08 juin 2012 :","url":"http://googlechromereleases.blogspot.fr/2012/06/stable-channel-update_08.html"}],"reference":"CERTA-2012-AVI-312","revisions":[{"description":"version initiale.","revision_date":"2012-06-11T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Adobe Flash Player</span> et <span class=\"textit\">Adobe\nAIR</span>. Celles-ci peuvent \u00eatre exploit\u00e9es par un attaquant pour\neffectuer un d\u00e9ni de service \u00e0 distance ou ex\u00e9cuter du code arbitraire \u00e0\ndistance.\n","title":"Vuln\u00e9rabilit\u00e9s dans Adobe Flash Player et Adobe AIR","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Adobe APSB12-14 du 08 juin 2012","url":null}]}
