Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-1004 (GCVE-0-2016-1004)
Vulnerability from cvelistv5
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none
Show details on NVD website{
"containers": {
"cna": {
"providerMetadata": {
"dateUpdated": "2016-12-31T01:57:01",
"orgId": "078d4453-3bcd-4900-85e6-15281da43538",
"shortName": "adobe"
},
"rejectedReasons": [
{
"lang": "en",
"value": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
"assignerShortName": "adobe",
"cveId": "CVE-2016-1004",
"datePublished": "2016-12-31T02:00:00",
"dateRejected": "2016-12-31T01:57:01",
"dateReserved": "2015-12-22T00:00:00",
"dateUpdated": "2016-12-31T01:57:01",
"state": "REJECTED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.0",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2016-1004\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2016-12-31T02:59:36.987\",\"lastModified\":\"2023-11-07T02:29:50.710\",\"vulnStatus\":\"Rejected\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none\"}],\"metrics\":{},\"references\":[]}}"
}
}
fkie_cve-2016-1004
Vulnerability from fkie_nvd
| URL | Tags |
|---|
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none"
}
],
"id": "CVE-2016-1004",
"lastModified": "2023-11-07T02:29:50.710",
"metrics": {},
"published": "2016-12-31T02:59:36.987",
"references": [],
"sourceIdentifier": "psirt@adobe.com",
"vulnStatus": "Rejected"
}
gsd-2016-1004
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2016-1004",
"description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none.",
"id": "GSD-2016-1004"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2016-1004"
],
"details": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none.",
"id": "GSD-2016-1004",
"modified": "2023-12-13T01:21:25.009280Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-1004",
"STATE": "REJECT"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2016. Notes: none."
}
]
}
}
}
}
CERTFR-2017-AVI-040
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Google Android (Nexus). Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Google Android (Nexus) toutes versions n'intégrant pas le correctif de sécurité du 6 février 2017
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eGoogle Android (Nexus) toutes versions n\u0027int\u00e9grant pas le correctif de s\u00e9curit\u00e9 du 6 f\u00e9vrier 2017\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-0413",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0413"
},
{
"name": "CVE-2017-0431",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0431"
},
{
"name": "CVE-2017-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0438"
},
{
"name": "CVE-2017-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0436"
},
{
"name": "CVE-2017-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0450"
},
{
"name": "CVE-2017-0422",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0422"
},
{
"name": "CVE-2017-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0441"
},
{
"name": "CVE-2016-8421",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8421"
},
{
"name": "CVE-2017-0426",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0426"
},
{
"name": "CVE-2017-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0439"
},
{
"name": "CVE-2017-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0419"
},
{
"name": "CVE-2017-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0445"
},
{
"name": "CVE-2017-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0408"
},
{
"name": "CVE-2017-0410",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0410"
},
{
"name": "CVE-2016-5552",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5552"
},
{
"name": "CVE-2017-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0427"
},
{
"name": "CVE-2017-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0437"
},
{
"name": "CVE-2017-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0406"
},
{
"name": "CVE-2017-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0429"
},
{
"name": "CVE-2017-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0444"
},
{
"name": "CVE-2017-0432",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0432"
},
{
"name": "CVE-2017-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0440"
},
{
"name": "CVE-2017-0412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0412"
},
{
"name": "CVE-2016-8481",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8481"
},
{
"name": "CVE-2017-0420",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0420"
},
{
"name": "CVE-2017-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0448"
},
{
"name": "CVE-2017-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0411"
},
{
"name": "CVE-2016-8418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8418"
},
{
"name": "CVE-2016-8480",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8480"
},
{
"name": "CVE-2017-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0443"
},
{
"name": "CVE-2017-0409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0409"
},
{
"name": "CVE-2017-0416",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0416"
},
{
"name": "CVE-2017-0430",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0430"
},
{
"name": "CVE-2016-1004",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1004"
},
{
"name": "CVE-2017-0428",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0428"
},
{
"name": "CVE-2017-0414",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0414"
},
{
"name": "CVE-2017-0407",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0407"
},
{
"name": "CVE-2017-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0447"
},
{
"name": "CVE-2017-0415",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0415"
},
{
"name": "CVE-2017-0405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0405"
},
{
"name": "CVE-2017-0418",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0418"
},
{
"name": "CVE-2017-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0433"
},
{
"name": "CVE-2017-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0434"
},
{
"name": "CVE-2017-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0435"
},
{
"name": "CVE-2017-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0442"
},
{
"name": "CVE-2017-0421",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0421"
},
{
"name": "CVE-2014-9914",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9914"
},
{
"name": "CVE-2017-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0451"
},
{
"name": "CVE-2017-0424",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0424"
},
{
"name": "CVE-2016-8420",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8420"
},
{
"name": "CVE-2016-8476",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8476"
},
{
"name": "CVE-2017-0423",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0423"
},
{
"name": "CVE-2017-0417",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0417"
},
{
"name": "CVE-2017-0425",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0425"
},
{
"name": "CVE-2016-8419",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8419"
},
{
"name": "CVE-2017-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0446"
},
{
"name": "CVE-2016-8414",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8414"
},
{
"name": "CVE-2017-0449",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0449"
}
],
"initial_release_date": "2017-02-07T00:00:00",
"last_revision_date": "2017-02-07T00:00:00",
"links": [],
"reference": "CERTFR-2017-AVI-040",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-02-07T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eGoogle Android (Nexus)\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non\nsp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et\nun d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Google Android (Nexus)",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Google du 06 f\u00e9vrier 2017",
"url": "http://source.android.com/security/bulletin/2017-02-01.html"
}
]
}
CERTFR-2017-AVI-162
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module pour Public Cloud 12 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP1 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 12-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module pour Public Cloud 12",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 12-SP1",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2016-2117",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2117"
},
{
"name": "CVE-2017-7308",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7308"
},
{
"name": "CVE-2017-6348",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6348"
},
{
"name": "CVE-2017-2647",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2647"
},
{
"name": "CVE-2017-6353",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6353"
},
{
"name": "CVE-2017-6346",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6346"
},
{
"name": "CVE-2017-6951",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6951"
},
{
"name": "CVE-2015-1350",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1350"
},
{
"name": "CVE-2017-7645",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7645"
},
{
"name": "CVE-2016-3070",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3070"
},
{
"name": "CVE-2017-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6345"
},
{
"name": "CVE-2017-6214",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6214"
},
{
"name": "CVE-2016-5243",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5243"
},
{
"name": "CVE-2017-7616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7616"
},
{
"name": "CVE-2017-8106",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8106"
},
{
"name": "CVE-2017-7294",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7294"
},
{
"name": "CVE-2017-6074",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6074"
},
{
"name": "CVE-2017-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2671"
},
{
"name": "CVE-2016-1004",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1004"
},
{
"name": "CVE-2016-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1020"
},
{
"name": "CVE-2016-9588",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9588"
},
{
"name": "CVE-2017-5897",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5897"
},
{
"name": "CVE-2017-7187",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7187"
},
{
"name": "CVE-2016-9191",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9191"
},
{
"name": "CVE-2016-7117",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7117"
},
{
"name": "CVE-2017-5986",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5986"
},
{
"name": "CVE-2016-9604",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9604"
},
{
"name": "CVE-2017-7261",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7261"
},
{
"name": "CVE-2017-5669",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5669"
}
],
"initial_release_date": "2017-05-22T00:00:00",
"last_revision_date": "2017-05-22T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2017:1360-1 du 19 mai 2017",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171360-1/"
}
],
"reference": "CERTFR-2017-AVI-162",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-05-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003ele noyau Linux de SUSE\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2017:1360-1 du 19 mai 2017",
"url": null
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.