{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Oracle MySQL Server versions 5.5.45 et ant\u00e9rieures","product":{"name":"MySQL","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle MySQL Enterprise Monitor versions 3.0.22 et ant\u00e9rieures","product":{"name":"MySQL","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle MySQL Server versions 5.6.26 et ant\u00e9rieures","product":{"name":"MySQL","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle MySQL Enterprise Monitor versions 2.3.20 et ant\u00e9rieures","product":{"name":"MySQL","vendor":{"name":"Oracle","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2015-3153","url":"https://www.cve.org/CVERecord?id=CVE-2015-3153"},{"name":"CVE-2015-4800","url":"https://www.cve.org/CVERecord?id=CVE-2015-4800"},{"name":"CVE-2015-4862","url":"https://www.cve.org/CVERecord?id=CVE-2015-4862"},{"name":"CVE-2015-3236","url":"https://www.cve.org/CVERecord?id=CVE-2015-3236"},{"name":"CVE-2015-4836","url":"https://www.cve.org/CVERecord?id=CVE-2015-4836"},{"name":"CVE-2015-1793","url":"https://www.cve.org/CVERecord?id=CVE-2015-1793"},{"name":"CVE-2015-4905","url":"https://www.cve.org/CVERecord?id=CVE-2015-4905"},{"name":"CVE-2015-0286","url":"https://www.cve.org/CVERecord?id=CVE-2015-0286"},{"name":"CVE-2015-4792","url":"https://www.cve.org/CVERecord?id=CVE-2015-4792"},{"name":"CVE-2015-4864","url":"https://www.cve.org/CVERecord?id=CVE-2015-4864"},{"name":"CVE-2015-4833","url":"https://www.cve.org/CVERecord?id=CVE-2015-4833"},{"name":"CVE-2015-0288","url":"https://www.cve.org/CVERecord?id=CVE-2015-0288"},{"name":"CVE-2015-4866","url":"https://www.cve.org/CVERecord?id=CVE-2015-4866"},{"name":"CVE-2015-4826","url":"https://www.cve.org/CVERecord?id=CVE-2015-4826"},{"name":"CVE-2015-1789","url":"https://www.cve.org/CVERecord?id=CVE-2015-1789"},{"name":"CVE-2014-8150","url":"https://www.cve.org/CVERecord?id=CVE-2014-8150"},{"name":"CVE-2014-3707","url":"https://www.cve.org/CVERecord?id=CVE-2014-3707"},{"name":"CVE-2015-4858","url":"https://www.cve.org/CVERecord?id=CVE-2015-4858"},{"name":"CVE-2015-4802","url":"https://www.cve.org/CVERecord?id=CVE-2015-4802"},{"name":"CVE-2015-4861","url":"https://www.cve.org/CVERecord?id=CVE-2015-4861"},{"name":"CVE-2015-4730","url":"https://www.cve.org/CVERecord?id=CVE-2015-4730"},{"name":"CVE-2015-3144","url":"https://www.cve.org/CVERecord?id=CVE-2015-3144"},{"name":"CVE-2015-4895","url":"https://www.cve.org/CVERecord?id=CVE-2015-4895"},{"name":"CVE-2015-4870","url":"https://www.cve.org/CVERecord?id=CVE-2015-4870"},{"name":"CVE-2015-4910","url":"https://www.cve.org/CVERecord?id=CVE-2015-4910"},{"name":"CVE-2015-4830","url":"https://www.cve.org/CVERecord?id=CVE-2015-4830"},{"name":"CVE-2015-4879","url":"https://www.cve.org/CVERecord?id=CVE-2015-4879"},{"name":"CVE-2015-4815","url":"https://www.cve.org/CVERecord?id=CVE-2015-4815"},{"name":"CVE-2015-4890","url":"https://www.cve.org/CVERecord?id=CVE-2015-4890"},{"name":"CVE-2015-4791","url":"https://www.cve.org/CVERecord?id=CVE-2015-4791"},{"name":"CVE-2015-4807","url":"https://www.cve.org/CVERecord?id=CVE-2015-4807"},{"name":"CVE-2015-4904","url":"https://www.cve.org/CVERecord?id=CVE-2015-4904"},{"name":"CVE-2015-4766","url":"https://www.cve.org/CVERecord?id=CVE-2015-4766"},{"name":"CVE-2015-4816","url":"https://www.cve.org/CVERecord?id=CVE-2015-4816"},{"name":"CVE-2015-4819","url":"https://www.cve.org/CVERecord?id=CVE-2015-4819"},{"name":"CVE-2015-4913","url":"https://www.cve.org/CVERecord?id=CVE-2015-4913"}],"links":[],"reference":"CERTFR-2015-AVI-438","revisions":[{"description":"version initiale.","revision_date":"2015-10-21T00:00:00.000000"}],"risks":[{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Oracle MySQL</span>. Elles permettent \u00e0 un attaquant de\nprovoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l'\u00e9diteur.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Oracle du 20 octobre 2015","url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"}]}
