{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Adobe Flash Player versions ant\u00e9rieures \u00e0 11.2.202.616 sur Linux","product":{"name":"N/A","vendor":{"name":"Adobe","scada":false}}},{"description":"Adobe Flash Player pour Google Chrome versions ant\u00e9rieures \u00e0 21.0.0.213 sur Windows, Macintosh, Linux et ChromeOS","product":{"name":"N/A","vendor":{"name":"Adobe","scada":false}}},{"description":"Adobe AIR SDK & Compiler versions ant\u00e9rieures \u00e0 21.0.0.198 sur Windows, Macintosh, Android et iOS","product":{"name":"N/A","vendor":{"name":"Adobe","scada":false}}},{"description":"Adobe AIR Desktop Runtime versions ant\u00e9rieures \u00e0 21.0.0.198 sur Windows et Macintosh","product":{"name":"N/A","vendor":{"name":"Adobe","scada":false}}},{"description":"Adobe Flash Player ESR versions ant\u00e9rieures \u00e0 18.0.0.343 sur Windows et Macintosh","product":{"name":"N/A","vendor":{"name":"Adobe","scada":false}}},{"description":"Adobe Flash Player pour Internet Explorer 11 versions ant\u00e9rieures \u00e0 21.0.0.213 sur Windows 8.1","product":{"name":"N/A","vendor":{"name":"Adobe","scada":false}}},{"description":"Adobe Flash Player Desktop Runtime versions ant\u00e9rieures \u00e0 21.0.0.213 sur Windows et Macintosh","product":{"name":"N/A","vendor":{"name":"Adobe","scada":false}}},{"description":"Adobe AIR SDK versions ant\u00e9rieures \u00e0 21.0.0.198 sur Windows, Macintosh, Android et iOS","product":{"name":"N/A","vendor":{"name":"Adobe","scada":false}}},{"description":"Adobe Flash Player pour Microsoft Edge et Internet Explorer 11 versions ant\u00e9rieures \u00e0 21.0.0.213 sur Windows 10","product":{"name":"N/A","vendor":{"name":"Adobe","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2016-1025","url":"https://www.cve.org/CVERecord?id=CVE-2016-1025"},{"name":"CVE-2016-1019","url":"https://www.cve.org/CVERecord?id=CVE-2016-1019"},{"name":"CVE-2016-1032","url":"https://www.cve.org/CVERecord?id=CVE-2016-1032"},{"name":"CVE-2016-1017","url":"https://www.cve.org/CVERecord?id=CVE-2016-1017"},{"name":"CVE-2016-1022","url":"https://www.cve.org/CVERecord?id=CVE-2016-1022"},{"name":"CVE-2016-1021","url":"https://www.cve.org/CVERecord?id=CVE-2016-1021"},{"name":"CVE-2016-1026","url":"https://www.cve.org/CVERecord?id=CVE-2016-1026"},{"name":"CVE-2016-1015","url":"https://www.cve.org/CVERecord?id=CVE-2016-1015"},{"name":"CVE-2016-1031","url":"https://www.cve.org/CVERecord?id=CVE-2016-1031"},{"name":"CVE-2016-1028","url":"https://www.cve.org/CVERecord?id=CVE-2016-1028"},{"name":"CVE-2016-1018","url":"https://www.cve.org/CVERecord?id=CVE-2016-1018"},{"name":"CVE-2016-1006","url":"https://www.cve.org/CVERecord?id=CVE-2016-1006"},{"name":"CVE-2016-1027","url":"https://www.cve.org/CVERecord?id=CVE-2016-1027"},{"name":"CVE-2016-1029","url":"https://www.cve.org/CVERecord?id=CVE-2016-1029"},{"name":"CVE-2016-1012","url":"https://www.cve.org/CVERecord?id=CVE-2016-1012"},{"name":"CVE-2016-1020","url":"https://www.cve.org/CVERecord?id=CVE-2016-1020"},{"name":"CVE-2016-1030","url":"https://www.cve.org/CVERecord?id=CVE-2016-1030"},{"name":"CVE-2016-1033","url":"https://www.cve.org/CVERecord?id=CVE-2016-1033"},{"name":"CVE-2016-1014","url":"https://www.cve.org/CVERecord?id=CVE-2016-1014"},{"name":"CVE-2016-1024","url":"https://www.cve.org/CVERecord?id=CVE-2016-1024"},{"name":"CVE-2016-1023","url":"https://www.cve.org/CVERecord?id=CVE-2016-1023"},{"name":"CVE-2016-1016","url":"https://www.cve.org/CVERecord?id=CVE-2016-1016"},{"name":"CVE-2016-1013","url":"https://www.cve.org/CVERecord?id=CVE-2016-1013"},{"name":"CVE-2016-1011","url":"https://www.cve.org/CVERecord?id=CVE-2016-1011"}],"links":[],"reference":"CERTFR-2016-AVI-116","revisions":[{"description":"version initiale.","revision_date":"2016-04-08T00:00:00.000000"},{"description":"ajout des versions AIR aux Syst\u00e8mes affect\u00e9s suite \u00e0 la mise \u00e0 jour de l'avis de s\u00e9curit\u00e9 d'Adobe en date du 12 avril 2016","revision_date":"2016-04-13T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Adobe Flash Player</span>. Elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Adobe Flash Player","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Adobe APSB16-10 du 07 avril 2016","url":"https://helpx.adobe.com/security/products/flash-player/apsb16-10.html"}]}
