{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Apple iOS versions ant\u00e9rieures \u00e0 8.3","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}},{"description":"Apple TV versions ant\u00e9rieures \u00e0 7.2","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}},{"description":"Apple Xcode versions ant\u00e9rieures \u00e0 6.3","product":{"name":"N/A","vendor":{"name":"Apple","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2015-1076","url":"https://www.cve.org/CVERecord?id=CVE-2015-1076"},{"name":"CVE-2015-1126","url":"https://www.cve.org/CVERecord?id=CVE-2015-1126"},{"name":"CVE-2015-1073","url":"https://www.cve.org/CVERecord?id=CVE-2015-1073"},{"name":"CVE-2015-1095","url":"https://www.cve.org/CVERecord?id=CVE-2015-1095"},{"name":"CVE-2015-1098","url":"https://www.cve.org/CVERecord?id=CVE-2015-1098"},{"name":"CVE-2015-1125","url":"https://www.cve.org/CVERecord?id=CVE-2015-1125"},{"name":"CVE-2015-1115","url":"https://www.cve.org/CVERecord?id=CVE-2015-1115"},{"name":"CVE-2015-1084","url":"https://www.cve.org/CVERecord?id=CVE-2015-1084"},{"name":"CVE-2015-1092","url":"https://www.cve.org/CVERecord?id=CVE-2015-1092"},{"name":"CVE-2015-1107","url":"https://www.cve.org/CVERecord?id=CVE-2015-1107"},{"name":"CVE-2015-1122","url":"https://www.cve.org/CVERecord?id=CVE-2015-1122"},{"name":"CVE-2015-1117","url":"https://www.cve.org/CVERecord?id=CVE-2015-1117"},{"name":"CVE-2015-1078","url":"https://www.cve.org/CVERecord?id=CVE-2015-1078"},{"name":"CVE-2015-1096","url":"https://www.cve.org/CVERecord?id=CVE-2015-1096"},{"name":"CVE-2015-1104","url":"https://www.cve.org/CVERecord?id=CVE-2015-1104"},{"name":"CVE-2015-1105","url":"https://www.cve.org/CVERecord?id=CVE-2015-1105"},{"name":"CVE-2015-1103","url":"https://www.cve.org/CVERecord?id=CVE-2015-1103"},{"name":"CVE-2015-1106","url":"https://www.cve.org/CVERecord?id=CVE-2015-1106"},{"name":"CVE-2015-1074","url":"https://www.cve.org/CVERecord?id=CVE-2015-1074"},{"name":"CVE-2015-1070","url":"https://www.cve.org/CVERecord?id=CVE-2015-1070"},{"name":"CVE-2015-1113","url":"https://www.cve.org/CVERecord?id=CVE-2015-1113"},{"name":"CVE-2015-1077","url":"https://www.cve.org/CVERecord?id=CVE-2015-1077"},{"name":"CVE-2015-1093","url":"https://www.cve.org/CVERecord?id=CVE-2015-1093"},{"name":"CVE-2015-1102","url":"https://www.cve.org/CVERecord?id=CVE-2015-1102"},{"name":"CVE-2015-1118","url":"https://www.cve.org/CVERecord?id=CVE-2015-1118"},{"name":"CVE-2015-1085","url":"https://www.cve.org/CVERecord?id=CVE-2015-1085"},{"name":"CVE-2015-1081","url":"https://www.cve.org/CVERecord?id=CVE-2015-1081"},{"name":"CVE-2015-1079","url":"https://www.cve.org/CVERecord?id=CVE-2015-1079"},{"name":"CVE-2015-1091","url":"https://www.cve.org/CVERecord?id=CVE-2015-1091"},{"name":"CVE-2015-1068","url":"https://www.cve.org/CVERecord?id=CVE-2015-1068"},{"name":"CVE-2015-1120","url":"https://www.cve.org/CVERecord?id=CVE-2015-1120"},{"name":"CVE-2015-1082","url":"https://www.cve.org/CVERecord?id=CVE-2015-1082"},{"name":"CVE-2015-1100","url":"https://www.cve.org/CVERecord?id=CVE-2015-1100"},{"name":"CVE-2015-1097","url":"https://www.cve.org/CVERecord?id=CVE-2015-1097"},{"name":"CVE-2015-1087","url":"https://www.cve.org/CVERecord?id=CVE-2015-1087"},{"name":"CVE-2015-1088","url":"https://www.cve.org/CVERecord?id=CVE-2015-1088"},{"name":"CVE-2015-1094","url":"https://www.cve.org/CVERecord?id=CVE-2015-1094"},{"name":"CVE-2015-1071","url":"https://www.cve.org/CVERecord?id=CVE-2015-1071"},{"name":"CVE-2015-1099","url":"https://www.cve.org/CVERecord?id=CVE-2015-1099"},{"name":"CVE-2015-1072","url":"https://www.cve.org/CVERecord?id=CVE-2015-1072"},{"name":"CVE-2015-1101","url":"https://www.cve.org/CVERecord?id=CVE-2015-1101"},{"name":"CVE-2015-1090","url":"https://www.cve.org/CVERecord?id=CVE-2015-1090"},{"name":"CVE-2015-1089","url":"https://www.cve.org/CVERecord?id=CVE-2015-1089"},{"name":"CVE-2015-1080","url":"https://www.cve.org/CVERecord?id=CVE-2015-1080"},{"name":"CVE-2015-1112","url":"https://www.cve.org/CVERecord?id=CVE-2015-1112"},{"name":"CVE-2015-1119","url":"https://www.cve.org/CVERecord?id=CVE-2015-1119"},{"name":"CVE-2015-1110","url":"https://www.cve.org/CVERecord?id=CVE-2015-1110"},{"name":"CVE-2015-1111","url":"https://www.cve.org/CVERecord?id=CVE-2015-1111"},{"name":"CVE-2015-1124","url":"https://www.cve.org/CVERecord?id=CVE-2015-1124"},{"name":"CVE-2015-1086","url":"https://www.cve.org/CVERecord?id=CVE-2015-1086"},{"name":"CVE-2015-1121","url":"https://www.cve.org/CVERecord?id=CVE-2015-1121"},{"name":"CVE-2015-1108","url":"https://www.cve.org/CVERecord?id=CVE-2015-1108"},{"name":"CVE-2015-1123","url":"https://www.cve.org/CVERecord?id=CVE-2015-1123"},{"name":"CVE-2015-1149","url":"https://www.cve.org/CVERecord?id=CVE-2015-1149"},{"name":"CVE-2015-1116","url":"https://www.cve.org/CVERecord?id=CVE-2015-1116"},{"name":"CVE-2015-1083","url":"https://www.cve.org/CVERecord?id=CVE-2015-1083"},{"name":"CVE-2015-1109","url":"https://www.cve.org/CVERecord?id=CVE-2015-1109"},{"name":"CVE-2015-1114","url":"https://www.cve.org/CVERecord?id=CVE-2015-1114"},{"name":"CVE-2015-1069","url":"https://www.cve.org/CVERecord?id=CVE-2015-1069"}],"links":[],"reference":"CERTFR-2015-AVI-147","revisions":[{"description":"version initiale.","revision_date":"2015-04-13T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Ex\u00e9cution de code arbitraire"},{"description":"D\u00e9ni de service"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits <span\nclass=\"textit\">Apple</span>. Certaines d'entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une\nex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0 distance.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT204662 du 08 avril 2015","url":"https://support.apple.com/en-us/HT204662"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT204661 du 08 avril 2015","url":"https://support.apple.com/en-us/HT204661"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Apple HT204663 du 08 avril 2015","url":"https://support.apple.com/en-us/HT204663"}]}
