{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Oracle Java SE version 6u141","product":{"name":"Java SE","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle JRockit version R28.3.13","product":{"name":"Java SE","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Java SE Embedded version 8u121","product":{"name":"Java SE","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Java SE version 8u121","product":{"name":"Java SE","vendor":{"name":"Oracle","scada":false}}},{"description":"Oracle Java SE version 7u131","product":{"name":"Java SE","vendor":{"name":"Oracle","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2017-3533","url":"https://www.cve.org/CVERecord?id=CVE-2017-3533"},{"name":"CVE-2017-3509","url":"https://www.cve.org/CVERecord?id=CVE-2017-3509"},{"name":"CVE-2017-3526","url":"https://www.cve.org/CVERecord?id=CVE-2017-3526"},{"name":"CVE-2017-3512","url":"https://www.cve.org/CVERecord?id=CVE-2017-3512"},{"name":"CVE-2017-3539","url":"https://www.cve.org/CVERecord?id=CVE-2017-3539"},{"name":"CVE-2017-3544","url":"https://www.cve.org/CVERecord?id=CVE-2017-3544"},{"name":"CVE-2017-3514","url":"https://www.cve.org/CVERecord?id=CVE-2017-3514"},{"name":"CVE-2017-3511","url":"https://www.cve.org/CVERecord?id=CVE-2017-3511"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2017-3236618 du 18 avril    2017","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html"},{"title":"Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2017verbose-3236619 du 18    avril 2017","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2017verbose-3236619.html#JAVA"}],"reference":"CERTFR-2017-AVI-119","revisions":[{"description":"version initiale.","revision_date":"2017-04-19T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">Oracle Java SE</span>. Certaines d'entre elles permettent\n\u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance,\nun d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Oracle Java SE","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2017verbose-3236619 du 18 avril 2017","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Oracle cpuapr2017-3236618 du 18 avril 2017","url":null}]}
