ID

VAR-201603-0231


CVE

CVE-2016-1771


TITLE

Apple Safari Service operation interruption in the download function (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2016-001879

DESCRIPTION

The Downloads feature in Apple Safari before 9.1 mishandles file expansion, which allows remote attackers to cause a denial of service via a crafted web site. Supplementary information : CWE Vulnerability type by CWE-19: Data Handling ( Data processing ) Has been identified. http://cwe.mitre.org/data/definitions/19.htmSkillfully crafted by a third party Web Service disruption through the site (DoS) There is a possibility of being put into a state. An attacker can exploit this issue to crash the affected application,denying service to legitimate users. Apple Safari is prone to multiple security vulnerabilities. Attackers can exploit these issues to obtain sensitive information, cause a denial-of-service condition or bypass security restrictions and perform unauthorized actions. Apple Safari is a web browser of Apple (Apple), the default browser included with Mac OS X and iOS operating systems. Safari Downloads is one of the download management plugins. An attacker could use a specially crafted webpage to exploit this vulnerability to cause a denial of service.'OnWindowRemovingFromRootWindow' in content/browser/web_contents/web_contents_view_aura.cc in Google Chrome 32.0.1700.75 and earlier on Windows and Google Chrome 32.0.1700.76 and earlier on Mac OS X and . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2016-03-21-6 Safari 9.1 Safari 9.1 is now available and addresses the following: libxml2 Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: Processing maliciously crafted XML may lead to unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1762 Safari Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: Visiting a malicious website may lead to user interface spoofing Description: An issue existed where the text of a dialog included page-supplied text. This issue was addressed by no longer including that text. CVE-ID CVE-2009-2197 : Alexios Fakos of n.runs AG Safari Downloads Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: Visiting a maliciously crafted webpage may lead to a system denial of service Description: An insufficient input validation issue existed in the handling of certain files. This was addressed through additional checks during file expansion. CVE-ID CVE-2016-1771 : Russ Cox Safari Top Sites Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: A website may be able to track sensitive user information Description: A cookie storage issue existed in the Top Sites page. This issue was addressed through improved state management. CVE-ID CVE-2016-1772 : WoofWagly WebKit Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: A website may be able to track sensitive user information Description: An issue existed in the handling of attachment URLs. This issue was addressed through improved URL handling. CVE-ID CVE-2016-1781 : Devdatta Akhawe of Dropbox, Inc. WebKit Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1778 : 0x1byte working with Trend Micro's Zero Day Initiative (ZDI) CVE-2016-1783 : Mihai Parparita of Google WebKit Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: A malicious website may be able to access restricted ports on arbitrary servers Description: A port redirection issue was addressed through additional port validation. CVE-ID CVE-2016-1782 : Muneaki Nishimura (nishimunea) of Recruit Technologies Co.,Ltd. WebKit Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: Visiting a maliciously crafted website may reveal a user's current location Description: An issue existed in the parsing of geolocation requests. This was addressed through improved validation of the security origin for geolocation requests. CVE-ID CVE-2016-1779 : xisigr of Tencent's Xuanwu Lab (http://www.tencent.com) WebKit History Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: Processing maliciously crafted web content may lead to an unexpected Safari crash Description: A resource exhaustion issue was addressed through improved input validation. CVE-ID CVE-2016-1784 : Moony Li and Jack Tang of TrendMicro and 李普君 of 无声信息技术PKAV Team (PKAV.net) WebKit Page Loading Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: A malicious website may exfiltrate data cross-origin Description: A caching issue existed with character encoding. This was addressed through additional request checking. CVE-ID CVE-2016-1785 : an anonymous researcher WebKit Page Loading Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: Visiting a malicious website may lead to user interface spoofing Description: Redirect responses may have allowed a malicious website to display an arbitrary URL and read cached contents of the destination origin. This issue was addressed through improved URL display logic. CVE-ID CVE-2016-1786 : ma.la of LINE Corporation Installation note: Safari 9.1 may be obtained from the Mac App Store. Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJW8JQMAAoJEBcWfLTuOo7tUYsP/0cwzYXXuSvBOUhCzUd3z//b ZW1j9v2rbLLJB7wRNFhXsdz25MV/5pwX67Bb+rO9X21F/hItY61nHbTSayd+ud2v HTDnPRAWtlEd2Xd9EarGttIRAhUEQyDts3e2KpOcw2XG+zZF38DKrLprvLJrTU8u r8n8KnHP5ipOhPCubihsLQdf8jbCDnwKm2Lt0w7QAYYNOtIAzMKFtfjnsDzfJMm2 pN+laUBUDEeyv3ozmnyqmF6qSG8s43Mb+a+XeNYWEfr3VrwL6+k2YhwgFzl6jq1Z 5nMU2ziMP8OtfuVh7ldmR/+5zjkJzFCc8bbumu4Ipyhv1KOKESIxb/JNy+jCuL+D uD2g2DUhqntt74SKSzYETJTZt0EKXjhQmPoeDa4Q6++Nq9Aw/OxpLZwoi+vUzEfn cn/JGPsvwpjJjfdVFsCbaYVoCLivNy1uIwuKWpqQDjToGIMQGQ07KPepM9h5PPQ9 k1PkpH8HRynOkV5gbrGYvLyMgqJIB8KPeIQaSKARtUbCmn2zS99czD5fRojShmv+ BIZI5TowBRU9Cg4uwe0uRaSz/WiSI8OV8AcKqf0+59xYv6OfLLMIMAKYGIW+ZAdu LvtU5uvVpMekW8pAPz95BlgK/6ullpLGQA6hU6TLDj78KuvdGLBKTdlKf42kV48g ZD4qUKE2vo66y07AMC93 =8yOc -----END PGP SIGNATURE-----

Trust: 2.34

sources: NVD: CVE-2016-1771 // JVNDB: JVNDB-2016-001879 // BID: 85764 // BID: 85055 // VULHUB: VHN-90590 // PACKETSTORM: 136347

AFFECTED PRODUCTS

vendor:applemodel:safariscope:lteversion:9.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:9.0.3

Trust: 0.9

vendor:applemodel:safariscope:ltversion:9.1 (os x el capitan v10.11.4)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:9.1 (os x mavericks v10.9.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:9.1 (os x yosemite v10.10.5)

Trust: 0.8

vendor:applemodel:safariscope:eqversion:5.0.6

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4.0.5

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4.0.4

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:3.2.3

Trust: 0.6

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 0.6

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 0.6

vendor:applemodel:safariscope:eqversion:2.0.2

Trust: 0.6

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.3.2

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.3

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.2

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.0

Trust: 0.6

vendor:applemodel:safariscope:eqversion:5.1.7

Trust: 0.6

vendor:applemodel:safariscope:eqversion:5.1.4

Trust: 0.6

vendor:applemodel:safariscope:eqversion:5.1.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:5.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:5.0.5

Trust: 0.6

vendor:applemodel:safariscope:eqversion:5.0.4

Trust: 0.6

vendor:applemodel:safariscope:eqversion:5.0.3

Trust: 0.6

vendor:applemodel:safariscope:eqversion:5.0.2

Trust: 0.6

vendor:applemodel:safariscope:eqversion:5.0.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:5.0

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4.1.3

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4.1.2

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4.1.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4.0

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4

Trust: 0.6

vendor:applemodel:safariscope:eqversion:3.2

Trust: 0.6

vendor:applemodel:safariscope:eqversion:3.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:3

Trust: 0.6

vendor:applemodel:safariscope:eqversion:7.1.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:8.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:8.0.7

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.1.8

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.31

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:safariscope:neversion:9.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.1.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:8.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:8.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.9.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.0.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:9

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.34

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:8.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:8.0.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.52

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.31

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.28

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.1.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.7

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.33

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.8

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.30

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.10

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:8.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.1.7

Trust: 0.3

vendor:applemodel:safariscope:eqversion:8.0.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:8.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:9.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.5

Trust: 0.3

sources: BID: 85764 // BID: 85055 // JVNDB: JVNDB-2016-001879 // CNNVD: CNNVD-201603-316 // NVD: CVE-2016-1771

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1771
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-1771
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201603-316
value: HIGH

Trust: 0.6

VULHUB: VHN-90590
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-1771
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-90590
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1771
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-90590 // JVNDB: JVNDB-2016-001879 // CNNVD: CNNVD-201603-316 // NVD: CVE-2016-1771

PROBLEMTYPE DATA

problemtype:CWE-19

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-90590 // JVNDB: JVNDB-2016-001879 // NVD: CVE-2016-1771

THREAT TYPE

network

Trust: 0.6

sources: BID: 85764 // BID: 85055

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201603-316

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-001879

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:APPLE-SA-2016-03-21-6 Safari 9.1url:http://lists.apple.com/archives/security-announce/2016/Mar/msg00005.html

Trust: 0.8

title:HT206171url:https://support.apple.com/en-us/HT206171

Trust: 0.8

title:HT206171url:https://support.apple.com/ja-jp/HT206171

Trust: 0.8

title:Apple Safari Safari Downloads Remediation measures for denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60642

Trust: 0.6

sources: JVNDB: JVNDB-2016-001879 // CNNVD: CNNVD-201603-316

EXTERNAL IDS

db:NVDid:CVE-2016-1771

Trust: 3.2

db:BIDid:85055

Trust: 2.0

db:SECTRACKid:1035354

Trust: 1.1

db:JVNid:JVNVU97668313

Trust: 0.8

db:JVNDBid:JVNDB-2016-001879

Trust: 0.8

db:CNNVDid:CNNVD-201603-316

Trust: 0.7

db:BIDid:85764

Trust: 0.4

db:VULHUBid:VHN-90590

Trust: 0.1

db:PACKETSTORMid:136347

Trust: 0.1

sources: VULHUB: VHN-90590 // BID: 85764 // BID: 85055 // JVNDB: JVNDB-2016-001879 // PACKETSTORM: 136347 // CNNVD: CNNVD-201603-316 // NVD: CVE-2016-1771

REFERENCES

url:http://www.securityfocus.com/bid/85055

Trust: 1.7

url:http://www.apple.com/macosx/

Trust: 1.2

url:http://www.apple.com/safari/

Trust: 1.2

url:http://lists.apple.com/archives/security-announce/2016/mar/msg00005.html

Trust: 1.1

url:https://support.apple.com/ht206171

Trust: 1.1

url:http://www.securitytracker.com/id/1035354

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1771

Trust: 0.8

url:http://jvn.jp/vu/jvnvu97668313/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1771

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2016-1771

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1781

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1782

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1784

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1783

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1772

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1779

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1786

Trust: 0.1

url:https://gpgtools.org

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1778

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1785

Trust: 0.1

url:http://www.tencent.com)

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2197

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1762

Trust: 0.1

sources: VULHUB: VHN-90590 // BID: 85764 // BID: 85055 // JVNDB: JVNDB-2016-001879 // PACKETSTORM: 136347 // CNNVD: CNNVD-201603-316 // NVD: CVE-2016-1771

CREDITS

WoofWagly,Russ Cox, Alexios Fakos of n.runs AG

Trust: 0.6

sources: CNNVD: CNNVD-201603-316

SOURCES

db:VULHUBid:VHN-90590
db:BIDid:85764
db:BIDid:85055
db:JVNDBid:JVNDB-2016-001879
db:PACKETSTORMid:136347
db:CNNVDid:CNNVD-201603-316
db:NVDid:CVE-2016-1771

LAST UPDATE DATE

2025-04-13T20:02:06.423000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-90590date:2017-03-24T00:00:00
db:BIDid:85764date:2016-03-21T00:00:00
db:BIDid:85055date:2019-04-12T21:00:00
db:JVNDBid:JVNDB-2016-001879date:2016-06-27T00:00:00
db:CNNVDid:CNNVD-201603-316date:2019-04-15T00:00:00
db:NVDid:CVE-2016-1771date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-90590date:2016-03-24T00:00:00
db:BIDid:85764date:2016-03-21T00:00:00
db:BIDid:85055date:2016-03-21T00:00:00
db:JVNDBid:JVNDB-2016-001879date:2016-03-28T00:00:00
db:PACKETSTORMid:136347date:2016-03-22T15:20:32
db:CNNVDid:CNNVD-201603-316date:2016-03-23T00:00:00
db:NVDid:CVE-2016-1771date:2016-03-24T01:59:39.187