ID

VAR-201603-0232


CVE

CVE-2016-1772


TITLE

Apple Safari of Top Sites User-tracked vulnerability in functionality

Trust: 0.8

sources: JVNDB: JVNDB-2016-001880

DESCRIPTION

The Top Sites feature in Apple Safari before 9.1 mishandles cookie storage, which makes it easier for remote web servers to track users via unspecified vectors. Apple Safari is prone to multiple security vulnerabilities. Attackers can exploit these issues to obtain sensitive information, cause a denial-of-service condition or bypass security restrictions and perform unauthorized actions. Apple Safari is a web browser developed by Apple (Apple), and is the default browser included with Mac OS X and iOS operating systems. Safari Top Sites is one of the components that automatically tracks viewed web pages and places them in the home view based on frequency of use. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2016-03-21-6 Safari 9.1 Safari 9.1 is now available and addresses the following: libxml2 Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: Processing maliciously crafted XML may lead to unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1762 Safari Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: Visiting a malicious website may lead to user interface spoofing Description: An issue existed where the text of a dialog included page-supplied text. This issue was addressed by no longer including that text. CVE-ID CVE-2009-2197 : Alexios Fakos of n.runs AG Safari Downloads Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: Visiting a maliciously crafted webpage may lead to a system denial of service Description: An insufficient input validation issue existed in the handling of certain files. This was addressed through additional checks during file expansion. CVE-ID CVE-2016-1771 : Russ Cox Safari Top Sites Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: A website may be able to track sensitive user information Description: A cookie storage issue existed in the Top Sites page. This issue was addressed through improved state management. CVE-ID CVE-2016-1772 : WoofWagly WebKit Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: A website may be able to track sensitive user information Description: An issue existed in the handling of attachment URLs. This issue was addressed through improved URL handling. CVE-ID CVE-2016-1781 : Devdatta Akhawe of Dropbox, Inc. WebKit Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-ID CVE-2016-1778 : 0x1byte working with Trend Micro's Zero Day Initiative (ZDI) CVE-2016-1783 : Mihai Parparita of Google WebKit Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: A malicious website may be able to access restricted ports on arbitrary servers Description: A port redirection issue was addressed through additional port validation. CVE-ID CVE-2016-1782 : Muneaki Nishimura (nishimunea) of Recruit Technologies Co.,Ltd. WebKit Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: Visiting a maliciously crafted website may reveal a user's current location Description: An issue existed in the parsing of geolocation requests. This was addressed through improved validation of the security origin for geolocation requests. CVE-ID CVE-2016-1779 : xisigr of Tencent's Xuanwu Lab (http://www.tencent.com) WebKit History Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: Processing maliciously crafted web content may lead to an unexpected Safari crash Description: A resource exhaustion issue was addressed through improved input validation. CVE-ID CVE-2016-1784 : Moony Li and Jack Tang of TrendMicro and 李普君 of 无声信息技术PKAV Team (PKAV.net) WebKit Page Loading Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: A malicious website may exfiltrate data cross-origin Description: A caching issue existed with character encoding. This was addressed through additional request checking. CVE-ID CVE-2016-1785 : an anonymous researcher WebKit Page Loading Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.3 Impact: Visiting a malicious website may lead to user interface spoofing Description: Redirect responses may have allowed a malicious website to display an arbitrary URL and read cached contents of the destination origin. This issue was addressed through improved URL display logic. CVE-ID CVE-2016-1786 : ma.la of LINE Corporation Installation note: Safari 9.1 may be obtained from the Mac App Store. Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJW8JQMAAoJEBcWfLTuOo7tUYsP/0cwzYXXuSvBOUhCzUd3z//b ZW1j9v2rbLLJB7wRNFhXsdz25MV/5pwX67Bb+rO9X21F/hItY61nHbTSayd+ud2v HTDnPRAWtlEd2Xd9EarGttIRAhUEQyDts3e2KpOcw2XG+zZF38DKrLprvLJrTU8u r8n8KnHP5ipOhPCubihsLQdf8jbCDnwKm2Lt0w7QAYYNOtIAzMKFtfjnsDzfJMm2 pN+laUBUDEeyv3ozmnyqmF6qSG8s43Mb+a+XeNYWEfr3VrwL6+k2YhwgFzl6jq1Z 5nMU2ziMP8OtfuVh7ldmR/+5zjkJzFCc8bbumu4Ipyhv1KOKESIxb/JNy+jCuL+D uD2g2DUhqntt74SKSzYETJTZt0EKXjhQmPoeDa4Q6++Nq9Aw/OxpLZwoi+vUzEfn cn/JGPsvwpjJjfdVFsCbaYVoCLivNy1uIwuKWpqQDjToGIMQGQ07KPepM9h5PPQ9 k1PkpH8HRynOkV5gbrGYvLyMgqJIB8KPeIQaSKARtUbCmn2zS99czD5fRojShmv+ BIZI5TowBRU9Cg4uwe0uRaSz/WiSI8OV8AcKqf0+59xYv6OfLLMIMAKYGIW+ZAdu LvtU5uvVpMekW8pAPz95BlgK/6ullpLGQA6hU6TLDj78KuvdGLBKTdlKf42kV48g ZD4qUKE2vo66y07AMC93 =8yOc -----END PGP SIGNATURE-----

Trust: 2.34

sources: NVD: CVE-2016-1772 // JVNDB: JVNDB-2016-001880 // BID: 85762 // BID: 85055 // VULHUB: VHN-90591 // PACKETSTORM: 136347

AFFECTED PRODUCTS

vendor:applemodel:safariscope:lteversion:9.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:9.0.3

Trust: 0.9

vendor:applemodel:safariscope:ltversion:9.1 (os x el capitan v10.11.4)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:9.1 (os x mavericks v10.9.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:9.1 (os x yosemite v10.10.5)

Trust: 0.8

vendor:applemodel:safariscope:eqversion:5.0.6

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4.0.5

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4.0.4

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:3.2.3

Trust: 0.6

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 0.6

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 0.6

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 0.6

vendor:applemodel:safariscope:eqversion:2.0.2

Trust: 0.6

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.3.2

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.3

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.2

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.0

Trust: 0.6

vendor:applemodel:safariscope:eqversion:5.1.7

Trust: 0.6

vendor:applemodel:safariscope:eqversion:5.1.4

Trust: 0.6

vendor:applemodel:safariscope:eqversion:5.1.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:5.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:5.0.5

Trust: 0.6

vendor:applemodel:safariscope:eqversion:5.0.4

Trust: 0.6

vendor:applemodel:safariscope:eqversion:5.0.3

Trust: 0.6

vendor:applemodel:safariscope:eqversion:5.0.2

Trust: 0.6

vendor:applemodel:safariscope:eqversion:5.0.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:5.0

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4.1.3

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4.1.2

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4.1.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4.0

Trust: 0.6

vendor:applemodel:safariscope:eqversion:4

Trust: 0.6

vendor:applemodel:safariscope:eqversion:3.2

Trust: 0.6

vendor:applemodel:safariscope:eqversion:3.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:3

Trust: 0.6

vendor:applemodel:safariscope:eqversion:7.1.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:8.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:8.0.7

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.1.8

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.31

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:safariscope:neversion:9.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.1.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:8.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:8.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.9.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.0.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:9

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.34

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:8.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:8.0.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.52

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.31

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.28

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.1.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.7

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.33

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.8

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.30

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.10

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:8.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.1.7

Trust: 0.3

vendor:applemodel:safariscope:eqversion:8.0.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:8.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:9.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.5

Trust: 0.3

sources: BID: 85762 // BID: 85055 // JVNDB: JVNDB-2016-001880 // CNNVD: CNNVD-201603-317 // NVD: CVE-2016-1772

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1772
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-1772
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201603-317
value: MEDIUM

Trust: 0.6

VULHUB: VHN-90591
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-1772
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-90591
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1772
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-90591 // JVNDB: JVNDB-2016-001880 // CNNVD: CNNVD-201603-317 // NVD: CVE-2016-1772

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-90591 // JVNDB: JVNDB-2016-001880 // NVD: CVE-2016-1772

THREAT TYPE

network

Trust: 0.6

sources: BID: 85762 // BID: 85055

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201603-317

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-001880

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:APPLE-SA-2016-03-21-6 Safari 9.1url:http://lists.apple.com/archives/security-announce/2016/Mar/msg00005.html

Trust: 0.8

title:HT206171url:https://support.apple.com/en-us/HT206171

Trust: 0.8

title:HT206171url:https://support.apple.com/ja-jp/HT206171

Trust: 0.8

title:Apple Safari Safari Top Sites Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60643

Trust: 0.6

sources: JVNDB: JVNDB-2016-001880 // CNNVD: CNNVD-201603-317

EXTERNAL IDS

db:NVDid:CVE-2016-1772

Trust: 3.2

db:BIDid:85055

Trust: 2.0

db:SECTRACKid:1035354

Trust: 1.1

db:JVNid:JVNVU97668313

Trust: 0.8

db:JVNDBid:JVNDB-2016-001880

Trust: 0.8

db:CNNVDid:CNNVD-201603-317

Trust: 0.7

db:BIDid:85762

Trust: 0.4

db:VULHUBid:VHN-90591

Trust: 0.1

db:PACKETSTORMid:136347

Trust: 0.1

sources: VULHUB: VHN-90591 // BID: 85762 // BID: 85055 // JVNDB: JVNDB-2016-001880 // PACKETSTORM: 136347 // CNNVD: CNNVD-201603-317 // NVD: CVE-2016-1772

REFERENCES

url:http://www.securityfocus.com/bid/85055

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2016/mar/msg00005.html

Trust: 1.1

url:https://support.apple.com/ht206171

Trust: 1.1

url:http://www.securitytracker.com/id/1035354

Trust: 1.1

url:http://www.apple.com/safari/

Trust: 0.9

url:http://www.apple.com/macosx/

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1772

Trust: 0.8

url:http://jvn.jp/vu/jvnvu97668313/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1772

Trust: 0.8

url:http://www.apple.com/safari/download/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-1771

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1781

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1782

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1784

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1783

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1772

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1779

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1786

Trust: 0.1

url:https://gpgtools.org

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1778

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1785

Trust: 0.1

url:http://www.tencent.com)

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2197

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1762

Trust: 0.1

sources: VULHUB: VHN-90591 // BID: 85762 // BID: 85055 // JVNDB: JVNDB-2016-001880 // PACKETSTORM: 136347 // CNNVD: CNNVD-201603-317 // NVD: CVE-2016-1772

CREDITS

WoofWagly,Russ Cox, Alexios Fakos of n.runs AG

Trust: 0.6

sources: CNNVD: CNNVD-201603-317

SOURCES

db:VULHUBid:VHN-90591
db:BIDid:85762
db:BIDid:85055
db:JVNDBid:JVNDB-2016-001880
db:PACKETSTORMid:136347
db:CNNVDid:CNNVD-201603-317
db:NVDid:CVE-2016-1772

LAST UPDATE DATE

2025-04-13T22:59:59.619000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-90591date:2017-03-24T00:00:00
db:BIDid:85762date:2016-03-21T00:00:00
db:BIDid:85055date:2019-04-12T21:00:00
db:JVNDBid:JVNDB-2016-001880date:2016-06-27T00:00:00
db:CNNVDid:CNNVD-201603-317date:2019-04-15T00:00:00
db:NVDid:CVE-2016-1772date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-90591date:2016-03-24T00:00:00
db:BIDid:85762date:2016-03-21T00:00:00
db:BIDid:85055date:2016-03-21T00:00:00
db:JVNDBid:JVNDB-2016-001880date:2016-03-28T00:00:00
db:PACKETSTORMid:136347date:2016-03-22T15:20:32
db:CNNVDid:CNNVD-201603-317date:2016-03-23T00:00:00
db:NVDid:CVE-2016-1772date:2016-03-24T01:59:40.187