{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Apple OS X Mountain Lion versions ant\u00e9rieures \u00e0 10.8.5","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}},{"description":"Apple OS X Lion Server versions ant\u00e9rieures \u00e0 10.7.5","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}},{"description":"Apple OS X Mavericks versions ant\u00e9rieures \u00e0 10.9.2","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}},{"description":"Apple OS X Lion versions ant\u00e9rieures \u00e0 10.7.5","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2014-1256","url":"https://www.cve.org/CVERecord?id=CVE-2014-1256"},{"name":"CVE-2013-4073","url":"https://www.cve.org/CVERecord?id=CVE-2013-4073"},{"name":"CVE-2014-1263","url":"https://www.cve.org/CVERecord?id=CVE-2014-1263"},{"name":"CVE-2014-1252","url":"https://www.cve.org/CVERecord?id=CVE-2014-1252"},{"name":"CVE-2014-1258","url":"https://www.cve.org/CVERecord?id=CVE-2014-1258"},{"name":"CVE-2013-6420","url":"https://www.cve.org/CVERecord?id=CVE-2013-6420"},{"name":"CVE-2014-1264","url":"https://www.cve.org/CVERecord?id=CVE-2014-1264"},{"name":"CVE-2014-1261","url":"https://www.cve.org/CVERecord?id=CVE-2014-1261"},{"name":"CVE-2013-5986","url":"https://www.cve.org/CVERecord?id=CVE-2013-5986"},{"name":"CVE-2014-1266","url":"https://www.cve.org/CVERecord?id=CVE-2014-1266"},{"name":"CVE-2014-1255","url":"https://www.cve.org/CVERecord?id=CVE-2014-1255"},{"name":"CVE-2014-1246","url":"https://www.cve.org/CVERecord?id=CVE-2014-1246"},{"name":"CVE-2014-1245","url":"https://www.cve.org/CVERecord?id=CVE-2014-1245"},{"name":"CVE-2013-4248","url":"https://www.cve.org/CVERecord?id=CVE-2013-4248"},{"name":"CVE-2013-6629","url":"https://www.cve.org/CVERecord?id=CVE-2013-6629"},{"name":"CVE-2014-1254","url":"https://www.cve.org/CVERecord?id=CVE-2014-1254"},{"name":"CVE-2013-5987","url":"https://www.cve.org/CVERecord?id=CVE-2013-5987"},{"name":"CVE-2013-1862","url":"https://www.cve.org/CVERecord?id=CVE-2013-1862"},{"name":"CVE-2013-5139","url":"https://www.cve.org/CVERecord?id=CVE-2013-5139"},{"name":"CVE-2014-1259","url":"https://www.cve.org/CVERecord?id=CVE-2014-1259"},{"name":"CVE-2014-1250","url":"https://www.cve.org/CVERecord?id=CVE-2014-1250"},{"name":"CVE-2013-4113","url":"https://www.cve.org/CVERecord?id=CVE-2013-4113"},{"name":"CVE-2014-1265","url":"https://www.cve.org/CVERecord?id=CVE-2014-1265"},{"name":"CVE-2014-1247","url":"https://www.cve.org/CVERecord?id=CVE-2014-1247"},{"name":"CVE-2014-1260","url":"https://www.cve.org/CVERecord?id=CVE-2014-1260"},{"name":"CVE-2014-1262","url":"https://www.cve.org/CVERecord?id=CVE-2014-1262"},{"name":"CVE-2014-1249","url":"https://www.cve.org/CVERecord?id=CVE-2014-1249"},{"name":"CVE-2013-5179","url":"https://www.cve.org/CVERecord?id=CVE-2013-5179"},{"name":"CVE-2013-1896","url":"https://www.cve.org/CVERecord?id=CVE-2013-1896"},{"name":"CVE-2014-1248","url":"https://www.cve.org/CVERecord?id=CVE-2014-1248"},{"name":"CVE-2011-3389","url":"https://www.cve.org/CVERecord?id=CVE-2011-3389"},{"name":"CVE-2014-1257","url":"https://www.cve.org/CVERecord?id=CVE-2014-1257"},{"name":"CVE-2013-5178","url":"https://www.cve.org/CVERecord?id=CVE-2013-5178"}],"links":[],"reference":"CERTFR-2014-AVI-095","revisions":[{"description":"version initiale.","revision_date":"2014-02-28T00:00:00.000000"}],"risks":[{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Ex\u00e9cution de code arbitraire"},{"description":"Injection de code indirecte \u00e0 distance"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Apple OS X Maverick</span>. Certaines d'entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire,\nun contournement de la politique de s\u00e9curit\u00e9 et une atteinte \u00e0\nl'int\u00e9grit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Apple OS X","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT6150 du 25 f\u00e9vrier 2014","url":"http://support.apple.com/kb/HT6150"}]}
