Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-4619 (GCVE-0-2016-4619)
Vulnerability from cvelistv5 – Published: 2016-07-22 01:00 – Updated: 2017-06-07 01:57DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-8317. Reason: This candidate is a reservation duplicate of CVE-2015-8317. Notes: All CVE users should reference CVE-2015-8317 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
Show details on NVD website{
"containers": {
"cna": {
"providerMetadata": {
"dateUpdated": "2017-06-07T01:57:01.000Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"rejectedReasons": [
{
"lang": "en",
"value": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-8317. Reason: This candidate is a reservation duplicate of CVE-2015-8317. Notes: All CVE users should reference CVE-2015-8317 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2016-4619",
"datePublished": "2016-07-22T01:00:00.000Z",
"dateRejected": "2017-06-07T01:57:01.000Z",
"dateReserved": "2016-05-11T00:00:00.000Z",
"dateUpdated": "2017-06-07T01:57:01.000Z",
"state": "REJECTED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.0"
}
GSD-2016-4619
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2016-4619",
"description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-8317. Reason: This candidate is a reservation duplicate of CVE-2015-8317. Notes: All CVE users should reference CVE-2015-8317 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"id": "GSD-2016-4619",
"references": [
"https://www.suse.com/security/cve/CVE-2016-4619.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2016-4619"
],
"details": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-8317. Reason: This candidate is a reservation duplicate of CVE-2015-8317. Notes: All CVE users should reference CVE-2015-8317 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"id": "GSD-2016-4619",
"modified": "2023-12-13T01:21:18.278713Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-4619",
"STATE": "REJECT"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-8317. Reason: This candidate is a reservation duplicate of CVE-2015-8317. Notes: All CVE users should reference CVE-2015-8317 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
]
}
}
}
}
CNVD-2016-05744
Vulnerability from cnvd - Published: 2016-08-01用户可参考如下厂商提供的安全公告获取补丁以修复该漏洞: http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
| Name | ['Apple IOS <9.3.3', 'Apple watchOS <2.2.2', 'Apple tvOS <9.2.2', 'Apple OS X <10.11.6', 'Apple iTunes(on Windows) <12.4.2', 'Apple iCloud(on Windows) <5.2.1'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2016-4619"
}
},
"description": "Apple iOS\u662f\u4e3a\u79fb\u52a8\u8bbe\u5907\u6240\u5f00\u53d1\u7684\u4e00\u5957\u64cd\u4f5c\u7cfb\u7edf\uff1bOS X\u662f\u4e3aMac\u8ba1\u7b97\u673a\u6240\u5f00\u53d1\u7684\u4e00\u5957\u4e13\u7528\u64cd\u4f5c\u7cfb\u7edf\uff1btvOS\u662f\u4e00\u5957\u667a\u80fd\u7535\u89c6\u64cd\u4f5c\u7cfb\u7edf\uff1bwatchOS\u662f\u4e00\u5957\u667a\u80fd\u624b\u8868\u64cd\u4f5c\u7cfb\u7edf\u3002libxslt\u662f\u4e00\u4e2a\u4e3aGNOME\u9879\u76ee\u5f00\u53d1\u7684XSLTC\u5e93\u3002\r\n\r\n\u591a\u6b3eApple\u4ea7\u54c1\u4e2d\u7684libxml2\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u63d0\u4ea4\u7279\u6b8a\u8bf7\u6c42\u8fdb\u884c\u62d2\u7edd\u670d\u52a1\u653b\u51fb\u3002",
"discovererName": "Hanno Boeck",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u53d6\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttp://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2016-05744",
"openTime": "2016-08-01",
"patchDescription": "Apple iOS\u662f\u4e3a\u79fb\u52a8\u8bbe\u5907\u6240\u5f00\u53d1\u7684\u4e00\u5957\u64cd\u4f5c\u7cfb\u7edf\uff1bOS X\u662f\u4e3aMac\u8ba1\u7b97\u673a\u6240\u5f00\u53d1\u7684\u4e00\u5957\u4e13\u7528\u64cd\u4f5c\u7cfb\u7edf\uff1btvOS\u662f\u4e00\u5957\u667a\u80fd\u7535\u89c6\u64cd\u4f5c\u7cfb\u7edf\uff1bwatchOS\u662f\u4e00\u5957\u667a\u80fd\u624b\u8868\u64cd\u4f5c\u7cfb\u7edf\u3002libxslt\u662f\u4e00\u4e2a\u4e3aGNOME\u9879\u76ee\u5f00\u53d1\u7684XSLTC\u5e93\u3002\r\n\r\n\u591a\u6b3eApple\u4ea7\u54c1\u4e2d\u7684libxml2\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u63d0\u4ea4\u7279\u6b8a\u8bf7\u6c42\u8fdb\u884c\u62d2\u7edd\u670d\u52a1\u653b\u51fb\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "\u591a\u6b3eApple\u4ea7\u54c1libxml2\u5185\u5b58\u7834\u574f\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Apple IOS \u003c9.3.3",
"Apple watchOS \u003c2.2.2",
"Apple tvOS \u003c9.2.2",
"Apple OS X \u003c10.11.6",
"Apple iTunes(on Windows) \u003c12.4.2",
"Apple iCloud(on Windows) \u003c5.2.1"
]
},
"referenceLink": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4619",
"serverity": "\u9ad8",
"submitTime": "2016-07-28",
"title": "\u591a\u6b3eApple\u4ea7\u54c1libxml2\u5185\u5b58\u7834\u574f\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}
FKIE_CVE-2016-4619
Vulnerability from fkie_nvd - Published: 2016-07-22 02:59 - Updated: 2023-11-07 02:32| URL | Tags |
|---|
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-8317. Reason: This candidate is a reservation duplicate of CVE-2015-8317. Notes: All CVE users should reference CVE-2015-8317 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage"
}
],
"id": "CVE-2016-4619",
"lastModified": "2023-11-07T02:32:42.203",
"metrics": {},
"published": "2016-07-22T02:59:39.883",
"references": [],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Rejected"
}
CERTFR-2016-AVI-239
Vulnerability from certfr_avis - Published: 2016-07-19 - Updated: 2016-07-19
De multiples vulnérabilités ont été corrigées dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | Apple tvOS versions antérieures à 9.2.2 | ||
| Apple | N/A | Apple iTunes pour Windows versions antérieures à 12.4.2 | ||
| Apple | N/A | Apple iCloud pour Windows versions antérieures à 5.2.1 | ||
| Apple | Safari | Apple Safari versions antérieures à 9.1.2 | ||
| Apple | N/A | Apple watchOS versions antérieures à 2.2.2 | ||
| Apple | N/A | Apple OS X El Capitan versions antérieures à 10.11.6 et sans la mise à jour de sécurité 2016-004 | ||
| Apple | N/A | Apple iOS versions antérieures à 9.3.3 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apple tvOS versions ant\u00e9rieures \u00e0 9.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iTunes pour Windows versions ant\u00e9rieures \u00e0 12.4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iCloud pour Windows versions ant\u00e9rieures \u00e0 5.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple Safari versions ant\u00e9rieures \u00e0 9.1.2",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple watchOS versions ant\u00e9rieures \u00e0 2.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple OS X El Capitan versions ant\u00e9rieures \u00e0 10.11.6 et sans la mise \u00e0 jour de s\u00e9curit\u00e9 2016-004",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iOS versions ant\u00e9rieures \u00e0 9.3.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-4650",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4650"
},
{
"name": "CVE-2016-1865",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1865"
},
{
"name": "CVE-2016-4584",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4584"
},
{
"name": "CVE-2016-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4645"
},
{
"name": "CVE-2016-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4609"
},
{
"name": "CVE-2016-4648",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4648"
},
{
"name": "CVE-2016-4629",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4629"
},
{
"name": "CVE-2016-4601",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4601"
},
{
"name": "CVE-2016-4600",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4600"
},
{
"name": "CVE-2016-4646",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4646"
},
{
"name": "CVE-2016-4623",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4623"
},
{
"name": "CVE-2016-4582",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4582"
},
{
"name": "CVE-2016-2105",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2105"
},
{
"name": "CVE-2016-2176",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2176"
},
{
"name": "CVE-2016-4595",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4595"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4614",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4614"
},
{
"name": "CVE-2016-0718",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0718"
},
{
"name": "CVE-2016-4589",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4589"
},
{
"name": "CVE-2016-4627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4627"
},
{
"name": "CVE-2016-1863",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1863"
},
{
"name": "CVE-2016-4631",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4631"
},
{
"name": "CVE-2016-4615",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4615"
},
{
"name": "CVE-2016-4632",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4632"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4598"
},
{
"name": "CVE-2016-2107",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2107"
},
{
"name": "CVE-2016-4649",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4649"
},
{
"name": "CVE-2016-4621",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4621"
},
{
"name": "CVE-2016-4592",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4592"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-4624",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4624"
},
{
"name": "CVE-2016-4634",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4634"
},
{
"name": "CVE-2016-2106",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2106"
},
{
"name": "CVE-2016-4619",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4619"
},
{
"name": "CVE-2016-4596",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4596"
},
{
"name": "CVE-2016-4588",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4588"
},
{
"name": "CVE-2016-4610",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4610"
},
{
"name": "CVE-2016-4637",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4637"
},
{
"name": "CVE-2016-4597",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4597"
},
{
"name": "CVE-2016-4599",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4599"
},
{
"name": "CVE-2016-4633",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4633"
},
{
"name": "CVE-2016-4612",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4612"
},
{
"name": "CVE-2016-4605",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4605"
},
{
"name": "CVE-2016-4587",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4587"
},
{
"name": "CVE-2016-4602",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4602"
},
{
"name": "CVE-2016-4652",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4652"
},
{
"name": "CVE-2016-4586",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4586"
},
{
"name": "CVE-2016-4607",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4607"
},
{
"name": "CVE-2016-4594",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4594"
},
{
"name": "CVE-2016-1864",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1864"
},
{
"name": "CVE-2016-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4641"
},
{
"name": "CVE-2016-4647",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4647"
},
{
"name": "CVE-2016-4583",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4583"
},
{
"name": "CVE-2014-9862",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9862"
},
{
"name": "CVE-2016-4625",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4625"
},
{
"name": "CVE-2016-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4616"
},
{
"name": "CVE-2016-4590",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4590"
},
{
"name": "CVE-2016-4640",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4640"
},
{
"name": "CVE-2016-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4603"
},
{
"name": "CVE-2016-4585",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4585"
},
{
"name": "CVE-2016-4593",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4593"
},
{
"name": "CVE-2016-4635",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4635"
},
{
"name": "CVE-2016-4608",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4608"
},
{
"name": "CVE-2016-4638",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4638"
},
{
"name": "CVE-2016-4639",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4639"
},
{
"name": "CVE-2016-4591",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4591"
},
{
"name": "CVE-2016-4630",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4630"
},
{
"name": "CVE-2016-4604",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4604"
},
{
"name": "CVE-2016-2109",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2109"
},
{
"name": "CVE-2016-2108",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2108"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-4622",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4622"
},
{
"name": "CVE-2016-4628",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4628"
},
{
"name": "CVE-2016-4626",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4626"
},
{
"name": "CVE-2016-4651",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4651"
},
{
"name": "CVE-2016-4483",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4483"
}
],
"initial_release_date": "2016-07-19T00:00:00",
"last_revision_date": "2016-07-19T00:00:00",
"links": [],
"reference": "CERTFR-2016-AVI-239",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2016-07-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Apple\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT206902 du 18 juillet 2016",
"url": "https://support.apple.com/en-us/HT206902"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT206905 du 18 juillet 2016",
"url": "https://support.apple.com/en-us/HT206905"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT206903 du 18 juillet 2016",
"url": "https://support.apple.com/en-us/HT206903"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT206901 du 18 juillet 2016",
"url": "https://support.apple.com/en-us/HT206901"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT206904 du 18 juillet 2016",
"url": "https://support.apple.com/en-us/HT206904"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT206899 du 18 juillet 2016",
"url": "https://support.apple.com/en-us/HT206899"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT206900 du 18 juillet 2016",
"url": "https://support.apple.com/en-us/HT206900"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.