{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<p></p>","content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2016-5829","url":"https://www.cve.org/CVERecord?id=CVE-2016-5829"},{"name":"CVE-2015-5600","url":"https://www.cve.org/CVERecord?id=CVE-2015-5600"},{"name":"CVE-2015-6563","url":"https://www.cve.org/CVERecord?id=CVE-2015-6563"},{"name":"CVE-2015-6564","url":"https://www.cve.org/CVERecord?id=CVE-2015-6564"},{"name":"CVE-2016-1583","url":"https://www.cve.org/CVERecord?id=CVE-2016-1583"},{"name":"CVE-2015-2925","url":"https://www.cve.org/CVERecord?id=CVE-2015-2925"},{"name":"CVE-2016-4565","url":"https://www.cve.org/CVERecord?id=CVE-2016-4565"},{"name":"CVE-2016-1834","url":"https://www.cve.org/CVERecord?id=CVE-2016-1834"},{"name":"CVE-2016-3115","url":"https://www.cve.org/CVERecord?id=CVE-2016-3115"},{"name":"CVE-2016-5387","url":"https://www.cve.org/CVERecord?id=CVE-2016-5387"},{"name":"CVE-2016-0773","url":"https://www.cve.org/CVERecord?id=CVE-2016-0773"},{"name":"CVE-2016-1833","url":"https://www.cve.org/CVERecord?id=CVE-2016-1833"},{"name":"CVE-2015-5352","url":"https://www.cve.org/CVERecord?id=CVE-2015-5352"},{"name":"CVE-2015-5157","url":"https://www.cve.org/CVERecord?id=CVE-2015-5157"},{"name":"CVE-2015-5288","url":"https://www.cve.org/CVERecord?id=CVE-2015-5288"},{"name":"CVE-2016-5195","url":"https://www.cve.org/CVERecord?id=CVE-2016-5195"},{"name":"CVE-2015-7547","url":"https://www.cve.org/CVERecord?id=CVE-2015-7547"}],"links":[],"reference":"CERTFR-2017-AVI-022","revisions":[{"description":"version initiale.","revision_date":"2017-01-18T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"D\u00e9ni de service"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Juniper Network and Security Manager</span>. Certaines\nd'entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et un d\u00e9ni de\nservice.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Juniper Network and Security Manager","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Juniper JSA10774 du 17 janvier 2017","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774&cat=SIRT_1&actp=LIST"}]}
