{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<P>Versions ant\u00e9rieures \u00e0 Safari 6.1</P>","content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2013-5129","url":"https://www.cve.org/CVERecord?id=CVE-2013-5129"},{"name":"CVE-2013-1045","url":"https://www.cve.org/CVERecord?id=CVE-2013-1045"},{"name":"CVE-2013-1040","url":"https://www.cve.org/CVERecord?id=CVE-2013-1040"},{"name":"CVE-2013-2848","url":"https://www.cve.org/CVERecord?id=CVE-2013-2848"},{"name":"CVE-2013-1047","url":"https://www.cve.org/CVERecord?id=CVE-2013-1047"},{"name":"CVE-2013-1042","url":"https://www.cve.org/CVERecord?id=CVE-2013-1042"},{"name":"CVE-2013-1043","url":"https://www.cve.org/CVERecord?id=CVE-2013-1043"},{"name":"CVE-2013-1037","url":"https://www.cve.org/CVERecord?id=CVE-2013-1037"},{"name":"CVE-2013-1036","url":"https://www.cve.org/CVERecord?id=CVE-2013-1036"},{"name":"CVE-2013-5125","url":"https://www.cve.org/CVERecord?id=CVE-2013-5125"},{"name":"CVE-2013-1044","url":"https://www.cve.org/CVERecord?id=CVE-2013-1044"},{"name":"CVE-2013-5128","url":"https://www.cve.org/CVERecord?id=CVE-2013-5128"},{"name":"CVE-2013-2842","url":"https://www.cve.org/CVERecord?id=CVE-2013-2842"},{"name":"CVE-2013-5126","url":"https://www.cve.org/CVERecord?id=CVE-2013-5126"},{"name":"CVE-2013-1039","url":"https://www.cve.org/CVERecord?id=CVE-2013-1039"},{"name":"CVE-2013-5131","url":"https://www.cve.org/CVERecord?id=CVE-2013-5131"},{"name":"CVE-2013-1038","url":"https://www.cve.org/CVERecord?id=CVE-2013-1038"},{"name":"CVE-2013-5130","url":"https://www.cve.org/CVERecord?id=CVE-2013-5130"},{"name":"CVE-2013-1046","url":"https://www.cve.org/CVERecord?id=CVE-2013-1046"},{"name":"CVE-2013-5127","url":"https://www.cve.org/CVERecord?id=CVE-2013-5127"},{"name":"CVE-2013-1041","url":"https://www.cve.org/CVERecord?id=CVE-2013-1041"}],"links":[],"reference":"CERTA-2013-AVI-600","revisions":[{"description":"version initiale.","revision_date":"2013-10-24T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Injection de code indirecte \u00e0 distance"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Apple Safari</span>. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et une injection de code indirecte \u00e0 distance (XSS).\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Apple Safari","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT6000 du 22 octobre 2013","url":"http://support.apple.com/kb/HT6000"}]}
