diff --git a/2016/2xxx/CVE-2016-2094.json b/2016/2xxx/CVE-2016-2094.json index 1e3ce88ef91..82f387bac45 100644 --- a/2016/2xxx/CVE-2016-2094.json +++ b/2016/2xxx/CVE-2016-2094.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2094", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2097.json b/2016/2xxx/CVE-2016-2097.json index 47bf046ea1c..a9231144bb9 100644 --- a/2016/2xxx/CVE-2016-2097.json +++ b/2016/2xxx/CVE-2016-2097.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2097", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2098.json b/2016/2xxx/CVE-2016-2098.json index d4b8c44d385..acfcc40d687 100644 --- a/2016/2xxx/CVE-2016-2098.json +++ b/2016/2xxx/CVE-2016-2098.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2098", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2099.json b/2016/2xxx/CVE-2016-2099.json index f236792c31f..df7a8abe7ca 100644 --- a/2016/2xxx/CVE-2016-2099.json +++ b/2016/2xxx/CVE-2016-2099.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2099", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2100.json b/2016/2xxx/CVE-2016-2100.json index 16c7f9427a5..510909e213c 100644 --- a/2016/2xxx/CVE-2016-2100.json +++ b/2016/2xxx/CVE-2016-2100.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2100", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2102.json b/2016/2xxx/CVE-2016-2102.json index 6cb13fc8456..3f9c1c32ef0 100644 --- a/2016/2xxx/CVE-2016-2102.json +++ b/2016/2xxx/CVE-2016-2102.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2102", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2103.json b/2016/2xxx/CVE-2016-2103.json index 4661e0c855c..d571ba1bffe 100644 --- a/2016/2xxx/CVE-2016-2103.json +++ b/2016/2xxx/CVE-2016-2103.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2103", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2104.json b/2016/2xxx/CVE-2016-2104.json index f9ab25bff81..8691175c16b 100644 --- a/2016/2xxx/CVE-2016-2104.json +++ b/2016/2xxx/CVE-2016-2104.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2104", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2105.json b/2016/2xxx/CVE-2016-2105.json index 27173ba7935..24e53957b15 100644 --- a/2016/2xxx/CVE-2016-2105.json +++ b/2016/2xxx/CVE-2016-2105.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2105", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2106.json b/2016/2xxx/CVE-2016-2106.json index c05bc474b72..9e2d21b59c2 100644 --- a/2016/2xxx/CVE-2016-2106.json +++ b/2016/2xxx/CVE-2016-2106.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2106", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2107.json b/2016/2xxx/CVE-2016-2107.json index 78941f59f20..8759e1c279f 100644 --- a/2016/2xxx/CVE-2016-2107.json +++ b/2016/2xxx/CVE-2016-2107.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2107", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2108.json b/2016/2xxx/CVE-2016-2108.json index f728bb8fb66..17a421a8da9 100644 --- a/2016/2xxx/CVE-2016-2108.json +++ b/2016/2xxx/CVE-2016-2108.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2108", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2109.json b/2016/2xxx/CVE-2016-2109.json index 3a40148e774..f6e5626078d 100644 --- a/2016/2xxx/CVE-2016-2109.json +++ b/2016/2xxx/CVE-2016-2109.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2109", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2110.json b/2016/2xxx/CVE-2016-2110.json index ff53a095ba2..2183af4c7c3 100644 --- a/2016/2xxx/CVE-2016-2110.json +++ b/2016/2xxx/CVE-2016-2110.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2110", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2111.json b/2016/2xxx/CVE-2016-2111.json index ff2b62d4b63..bd995ca438f 100644 --- a/2016/2xxx/CVE-2016-2111.json +++ b/2016/2xxx/CVE-2016-2111.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2111", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2112.json b/2016/2xxx/CVE-2016-2112.json index d31e1752756..4b44c554a47 100644 --- a/2016/2xxx/CVE-2016-2112.json +++ b/2016/2xxx/CVE-2016-2112.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2112", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2113.json b/2016/2xxx/CVE-2016-2113.json index 6a759abc96d..df5a5191380 100644 --- a/2016/2xxx/CVE-2016-2113.json +++ b/2016/2xxx/CVE-2016-2113.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2113", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2114.json b/2016/2xxx/CVE-2016-2114.json index 59dfab53b95..c64f1c68916 100644 --- a/2016/2xxx/CVE-2016-2114.json +++ b/2016/2xxx/CVE-2016-2114.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2114", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2115.json b/2016/2xxx/CVE-2016-2115.json index ca8237ad229..540bde2a639 100644 --- a/2016/2xxx/CVE-2016-2115.json +++ b/2016/2xxx/CVE-2016-2115.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2115", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2116.json b/2016/2xxx/CVE-2016-2116.json index 3228037361d..5d3bd5c657a 100644 --- a/2016/2xxx/CVE-2016-2116.json +++ b/2016/2xxx/CVE-2016-2116.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2116", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2117.json b/2016/2xxx/CVE-2016-2117.json index a003918eb13..e17a3973c9c 100644 --- a/2016/2xxx/CVE-2016-2117.json +++ b/2016/2xxx/CVE-2016-2117.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2117", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2118.json b/2016/2xxx/CVE-2016-2118.json index 58682d016eb..de453664851 100644 --- a/2016/2xxx/CVE-2016-2118.json +++ b/2016/2xxx/CVE-2016-2118.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2118", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2119.json b/2016/2xxx/CVE-2016-2119.json index 11becff348d..1307062182d 100644 --- a/2016/2xxx/CVE-2016-2119.json +++ b/2016/2xxx/CVE-2016-2119.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2119", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2140.json b/2016/2xxx/CVE-2016-2140.json index 5bd049b3f13..024b1fb7d69 100644 --- a/2016/2xxx/CVE-2016-2140.json +++ b/2016/2xxx/CVE-2016-2140.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2140", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2141.json b/2016/2xxx/CVE-2016-2141.json index 500042d445c..c163f405668 100644 --- a/2016/2xxx/CVE-2016-2141.json +++ b/2016/2xxx/CVE-2016-2141.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2141", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2142.json b/2016/2xxx/CVE-2016-2142.json index 9927e7e5ae3..ebdc395e4d6 100644 --- a/2016/2xxx/CVE-2016-2142.json +++ b/2016/2xxx/CVE-2016-2142.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2142", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2143.json b/2016/2xxx/CVE-2016-2143.json index dd7d07da13c..1fc6391e21e 100644 --- a/2016/2xxx/CVE-2016-2143.json +++ b/2016/2xxx/CVE-2016-2143.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2143", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2145.json b/2016/2xxx/CVE-2016-2145.json index 6f57ba4a16d..9b5fcb19f76 100644 --- a/2016/2xxx/CVE-2016-2145.json +++ b/2016/2xxx/CVE-2016-2145.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2145", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2146.json b/2016/2xxx/CVE-2016-2146.json index c46e34dc31c..5736202145c 100644 --- a/2016/2xxx/CVE-2016-2146.json +++ b/2016/2xxx/CVE-2016-2146.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2146", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2147.json b/2016/2xxx/CVE-2016-2147.json index 348520549b3..ec25e60dbd5 100644 --- a/2016/2xxx/CVE-2016-2147.json +++ b/2016/2xxx/CVE-2016-2147.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2147", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2148.json b/2016/2xxx/CVE-2016-2148.json index bd6caec3e0b..2692e267772 100644 --- a/2016/2xxx/CVE-2016-2148.json +++ b/2016/2xxx/CVE-2016-2148.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2148", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2149.json b/2016/2xxx/CVE-2016-2149.json index 1269f2c4024..a69061204f9 100644 --- a/2016/2xxx/CVE-2016-2149.json +++ b/2016/2xxx/CVE-2016-2149.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2149", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2150.json b/2016/2xxx/CVE-2016-2150.json index 8889ef40151..641ca0c95b8 100644 --- a/2016/2xxx/CVE-2016-2150.json +++ b/2016/2xxx/CVE-2016-2150.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2150", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2151.json b/2016/2xxx/CVE-2016-2151.json index 9b86be7aeb0..caaf1949bc0 100644 --- a/2016/2xxx/CVE-2016-2151.json +++ b/2016/2xxx/CVE-2016-2151.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2151", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2152.json b/2016/2xxx/CVE-2016-2152.json index 59c2120c0f3..93be18ea84e 100644 --- a/2016/2xxx/CVE-2016-2152.json +++ b/2016/2xxx/CVE-2016-2152.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2152", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2153.json b/2016/2xxx/CVE-2016-2153.json index 9b2f1436184..a5a694618de 100644 --- a/2016/2xxx/CVE-2016-2153.json +++ b/2016/2xxx/CVE-2016-2153.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2153", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2154.json b/2016/2xxx/CVE-2016-2154.json index 1f9bfa05a31..0403366665c 100644 --- a/2016/2xxx/CVE-2016-2154.json +++ b/2016/2xxx/CVE-2016-2154.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2154", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2155.json b/2016/2xxx/CVE-2016-2155.json index 3b0b91e98c2..61e9dc57ab5 100644 --- a/2016/2xxx/CVE-2016-2155.json +++ b/2016/2xxx/CVE-2016-2155.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2155", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2156.json b/2016/2xxx/CVE-2016-2156.json index f900db16260..365d33bf5c2 100644 --- a/2016/2xxx/CVE-2016-2156.json +++ b/2016/2xxx/CVE-2016-2156.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2156", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2157.json b/2016/2xxx/CVE-2016-2157.json index b1d68993699..15080a20ea0 100644 --- a/2016/2xxx/CVE-2016-2157.json +++ b/2016/2xxx/CVE-2016-2157.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2157", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2158.json b/2016/2xxx/CVE-2016-2158.json index 4b74aaf553f..ca1b0f4d32d 100644 --- a/2016/2xxx/CVE-2016-2158.json +++ b/2016/2xxx/CVE-2016-2158.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2158", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2159.json b/2016/2xxx/CVE-2016-2159.json index 40cd05bbaa2..b3b7a3d498f 100644 --- a/2016/2xxx/CVE-2016-2159.json +++ b/2016/2xxx/CVE-2016-2159.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2159", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2160.json b/2016/2xxx/CVE-2016-2160.json index 2cefdd3490c..381873092e4 100644 --- a/2016/2xxx/CVE-2016-2160.json +++ b/2016/2xxx/CVE-2016-2160.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2160", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2162.json b/2016/2xxx/CVE-2016-2162.json index 3593c099cdd..4ee3db85a2f 100644 --- a/2016/2xxx/CVE-2016-2162.json +++ b/2016/2xxx/CVE-2016-2162.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2162", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2163.json b/2016/2xxx/CVE-2016-2163.json index 8381179413d..4bb71e66fa7 100644 --- a/2016/2xxx/CVE-2016-2163.json +++ b/2016/2xxx/CVE-2016-2163.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2163", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2164.json b/2016/2xxx/CVE-2016-2164.json index f030f884830..7e08e4ca156 100644 --- a/2016/2xxx/CVE-2016-2164.json +++ b/2016/2xxx/CVE-2016-2164.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2164", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2166.json b/2016/2xxx/CVE-2016-2166.json index 9925ee154a4..40ee569cdb6 100644 --- a/2016/2xxx/CVE-2016-2166.json +++ b/2016/2xxx/CVE-2016-2166.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2166", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2167.json b/2016/2xxx/CVE-2016-2167.json index 1db7250c255..a40f7d47320 100644 --- a/2016/2xxx/CVE-2016-2167.json +++ b/2016/2xxx/CVE-2016-2167.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2167", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2168.json b/2016/2xxx/CVE-2016-2168.json index 6939aa1d4a7..302fc495cd4 100644 --- a/2016/2xxx/CVE-2016-2168.json +++ b/2016/2xxx/CVE-2016-2168.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2168", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2170.json b/2016/2xxx/CVE-2016-2170.json index fd0d8113fc1..ee11c5644eb 100644 --- a/2016/2xxx/CVE-2016-2170.json +++ b/2016/2xxx/CVE-2016-2170.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2170", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2171.json b/2016/2xxx/CVE-2016-2171.json index f41573c2775..9395cf3d313 100644 --- a/2016/2xxx/CVE-2016-2171.json +++ b/2016/2xxx/CVE-2016-2171.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2171", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2173.json b/2016/2xxx/CVE-2016-2173.json index 879b6da6ce5..f94f9a2e08e 100644 --- a/2016/2xxx/CVE-2016-2173.json +++ b/2016/2xxx/CVE-2016-2173.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2173", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2174.json b/2016/2xxx/CVE-2016-2174.json index eaab4e361ed..c061f7a7b74 100644 --- a/2016/2xxx/CVE-2016-2174.json +++ b/2016/2xxx/CVE-2016-2174.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2174", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2175.json b/2016/2xxx/CVE-2016-2175.json index fa94a5ae629..2ea778d7796 100644 --- a/2016/2xxx/CVE-2016-2175.json +++ b/2016/2xxx/CVE-2016-2175.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2175", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2176.json b/2016/2xxx/CVE-2016-2176.json index 72f4dbd693a..2207ced037c 100644 --- a/2016/2xxx/CVE-2016-2176.json +++ b/2016/2xxx/CVE-2016-2176.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2176", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2177.json b/2016/2xxx/CVE-2016-2177.json index 1a9abe4bbf5..67a77aa2c2a 100644 --- a/2016/2xxx/CVE-2016-2177.json +++ b/2016/2xxx/CVE-2016-2177.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2177", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2178.json b/2016/2xxx/CVE-2016-2178.json index 0b5e999eb60..5e352725891 100644 --- a/2016/2xxx/CVE-2016-2178.json +++ b/2016/2xxx/CVE-2016-2178.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2178", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2179.json b/2016/2xxx/CVE-2016-2179.json index eeb7bbf4065..075cec1014b 100644 --- a/2016/2xxx/CVE-2016-2179.json +++ b/2016/2xxx/CVE-2016-2179.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2179", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2180.json b/2016/2xxx/CVE-2016-2180.json index 6d94b1ed1c7..ddcc2c58911 100644 --- a/2016/2xxx/CVE-2016-2180.json +++ b/2016/2xxx/CVE-2016-2180.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2180", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2181.json b/2016/2xxx/CVE-2016-2181.json index a0c5bc46107..78852fd2d8f 100644 --- a/2016/2xxx/CVE-2016-2181.json +++ b/2016/2xxx/CVE-2016-2181.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2181", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2182.json b/2016/2xxx/CVE-2016-2182.json index 5ed4e882601..1ccc89539e1 100644 --- a/2016/2xxx/CVE-2016-2182.json +++ b/2016/2xxx/CVE-2016-2182.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2182", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2183.json b/2016/2xxx/CVE-2016-2183.json index c5aa36e3433..3b7cb66ac97 100644 --- a/2016/2xxx/CVE-2016-2183.json +++ b/2016/2xxx/CVE-2016-2183.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2183", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2184.json b/2016/2xxx/CVE-2016-2184.json index 5b1f1ba3dae..209adde4999 100644 --- a/2016/2xxx/CVE-2016-2184.json +++ b/2016/2xxx/CVE-2016-2184.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2184", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2185.json b/2016/2xxx/CVE-2016-2185.json index f04b03b72b4..95c5f8da2d3 100644 --- a/2016/2xxx/CVE-2016-2185.json +++ b/2016/2xxx/CVE-2016-2185.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2185", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2186.json b/2016/2xxx/CVE-2016-2186.json index d30bd0e28c9..66e3df1ecd6 100644 --- a/2016/2xxx/CVE-2016-2186.json +++ b/2016/2xxx/CVE-2016-2186.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2186", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2187.json b/2016/2xxx/CVE-2016-2187.json index 8422ec75129..00b259c08d3 100644 --- a/2016/2xxx/CVE-2016-2187.json +++ b/2016/2xxx/CVE-2016-2187.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2187", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2188.json b/2016/2xxx/CVE-2016-2188.json index 7c870777aeb..f3380aa54cb 100644 --- a/2016/2xxx/CVE-2016-2188.json +++ b/2016/2xxx/CVE-2016-2188.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2188", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2190.json b/2016/2xxx/CVE-2016-2190.json index 55920308b13..039458b0bdc 100644 --- a/2016/2xxx/CVE-2016-2190.json +++ b/2016/2xxx/CVE-2016-2190.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2190", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2191.json b/2016/2xxx/CVE-2016-2191.json index befc11038af..53f2b6f64c7 100644 --- a/2016/2xxx/CVE-2016-2191.json +++ b/2016/2xxx/CVE-2016-2191.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2191", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2192.json b/2016/2xxx/CVE-2016-2192.json index 0c46e35c502..01007e56200 100644 --- a/2016/2xxx/CVE-2016-2192.json +++ b/2016/2xxx/CVE-2016-2192.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2192", "STATE" : "PUBLIC" }, diff --git a/2016/2xxx/CVE-2016-2193.json b/2016/2xxx/CVE-2016-2193.json index 7bbda1e3b60..510afe8d477 100644 --- a/2016/2xxx/CVE-2016-2193.json +++ b/2016/2xxx/CVE-2016-2193.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-2193", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4582.json b/2016/4xxx/CVE-2016-4582.json index 90da81a6d3f..149d498cc9c 100644 --- a/2016/4xxx/CVE-2016-4582.json +++ b/2016/4xxx/CVE-2016-4582.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4582", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4583.json b/2016/4xxx/CVE-2016-4583.json index fd20afd8545..b51045da767 100644 --- a/2016/4xxx/CVE-2016-4583.json +++ b/2016/4xxx/CVE-2016-4583.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4583", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4584.json b/2016/4xxx/CVE-2016-4584.json index bd6a1fcd0e7..0b4852692ad 100644 --- a/2016/4xxx/CVE-2016-4584.json +++ b/2016/4xxx/CVE-2016-4584.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4584", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4585.json b/2016/4xxx/CVE-2016-4585.json index 251f958eac7..da8d5cceda1 100644 --- a/2016/4xxx/CVE-2016-4585.json +++ b/2016/4xxx/CVE-2016-4585.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4585", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4586.json b/2016/4xxx/CVE-2016-4586.json index fce523b4987..d9e9d118a1d 100644 --- a/2016/4xxx/CVE-2016-4586.json +++ b/2016/4xxx/CVE-2016-4586.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4586", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4587.json b/2016/4xxx/CVE-2016-4587.json index f3fb809cd7d..a19271044cb 100644 --- a/2016/4xxx/CVE-2016-4587.json +++ b/2016/4xxx/CVE-2016-4587.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4587", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4588.json b/2016/4xxx/CVE-2016-4588.json index 770ab31e6e1..8affb1986fa 100644 --- a/2016/4xxx/CVE-2016-4588.json +++ b/2016/4xxx/CVE-2016-4588.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4588", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4589.json b/2016/4xxx/CVE-2016-4589.json index 15f43b3c9b2..d90bfa4ee3d 100644 --- a/2016/4xxx/CVE-2016-4589.json +++ b/2016/4xxx/CVE-2016-4589.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4589", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4590.json b/2016/4xxx/CVE-2016-4590.json index 839919ac3f8..ebbed3ac1a7 100644 --- a/2016/4xxx/CVE-2016-4590.json +++ b/2016/4xxx/CVE-2016-4590.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4590", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4591.json b/2016/4xxx/CVE-2016-4591.json index 4427d631a8b..8d6a530aea5 100644 --- a/2016/4xxx/CVE-2016-4591.json +++ b/2016/4xxx/CVE-2016-4591.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4591", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4592.json b/2016/4xxx/CVE-2016-4592.json index 31c9d427279..df07c861412 100644 --- a/2016/4xxx/CVE-2016-4592.json +++ b/2016/4xxx/CVE-2016-4592.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4592", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4593.json b/2016/4xxx/CVE-2016-4593.json index de2e6f89bbe..a60ed42ca1c 100644 --- a/2016/4xxx/CVE-2016-4593.json +++ b/2016/4xxx/CVE-2016-4593.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4593", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4594.json b/2016/4xxx/CVE-2016-4594.json index 3ed7674e08f..6ff50d00f75 100644 --- a/2016/4xxx/CVE-2016-4594.json +++ b/2016/4xxx/CVE-2016-4594.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4594", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4595.json b/2016/4xxx/CVE-2016-4595.json index 712e5111c54..a1ec0b0812f 100644 --- a/2016/4xxx/CVE-2016-4595.json +++ b/2016/4xxx/CVE-2016-4595.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4595", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4596.json b/2016/4xxx/CVE-2016-4596.json index d23808b3311..34069b684df 100644 --- a/2016/4xxx/CVE-2016-4596.json +++ b/2016/4xxx/CVE-2016-4596.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4596", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4597.json b/2016/4xxx/CVE-2016-4597.json index ff381afe0eb..ca792c87747 100644 --- a/2016/4xxx/CVE-2016-4597.json +++ b/2016/4xxx/CVE-2016-4597.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4597", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4598.json b/2016/4xxx/CVE-2016-4598.json index be38c9c7179..6ce71b34b92 100644 --- a/2016/4xxx/CVE-2016-4598.json +++ b/2016/4xxx/CVE-2016-4598.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4598", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4599.json b/2016/4xxx/CVE-2016-4599.json index 53a41c56857..f032b7445a6 100644 --- a/2016/4xxx/CVE-2016-4599.json +++ b/2016/4xxx/CVE-2016-4599.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4599", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4600.json b/2016/4xxx/CVE-2016-4600.json index 1c571135505..afcfe4c7b71 100644 --- a/2016/4xxx/CVE-2016-4600.json +++ b/2016/4xxx/CVE-2016-4600.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4600", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4601.json b/2016/4xxx/CVE-2016-4601.json index 71f60261d97..a1ddecef345 100644 --- a/2016/4xxx/CVE-2016-4601.json +++ b/2016/4xxx/CVE-2016-4601.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4601", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4602.json b/2016/4xxx/CVE-2016-4602.json index aa477cec37a..d67a5e5b052 100644 --- a/2016/4xxx/CVE-2016-4602.json +++ b/2016/4xxx/CVE-2016-4602.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4602", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4603.json b/2016/4xxx/CVE-2016-4603.json index 9b1e84c6576..bba3282ce78 100644 --- a/2016/4xxx/CVE-2016-4603.json +++ b/2016/4xxx/CVE-2016-4603.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4603", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4604.json b/2016/4xxx/CVE-2016-4604.json index 1b29c220988..09c0553e19f 100644 --- a/2016/4xxx/CVE-2016-4604.json +++ b/2016/4xxx/CVE-2016-4604.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4604", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4605.json b/2016/4xxx/CVE-2016-4605.json index c8598a69551..ccfe93eb01b 100644 --- a/2016/4xxx/CVE-2016-4605.json +++ b/2016/4xxx/CVE-2016-4605.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4605", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4607.json b/2016/4xxx/CVE-2016-4607.json index f9a020e63c8..12768937663 100644 --- a/2016/4xxx/CVE-2016-4607.json +++ b/2016/4xxx/CVE-2016-4607.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4607", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4608.json b/2016/4xxx/CVE-2016-4608.json index c2527bad9f7..513744587d6 100644 --- a/2016/4xxx/CVE-2016-4608.json +++ b/2016/4xxx/CVE-2016-4608.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4608", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4609.json b/2016/4xxx/CVE-2016-4609.json index 5a4eaff2a15..86057699879 100644 --- a/2016/4xxx/CVE-2016-4609.json +++ b/2016/4xxx/CVE-2016-4609.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4609", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4610.json b/2016/4xxx/CVE-2016-4610.json index d0c9eed4c27..2c804a8e60a 100644 --- a/2016/4xxx/CVE-2016-4610.json +++ b/2016/4xxx/CVE-2016-4610.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4610", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4611.json b/2016/4xxx/CVE-2016-4611.json index 2d60dcfc0f9..e0b9bdba096 100644 --- a/2016/4xxx/CVE-2016-4611.json +++ b/2016/4xxx/CVE-2016-4611.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4611", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4613.json b/2016/4xxx/CVE-2016-4613.json index c2daa03dad4..3a068e46cba 100644 --- a/2016/4xxx/CVE-2016-4613.json +++ b/2016/4xxx/CVE-2016-4613.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4613", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4614.json b/2016/4xxx/CVE-2016-4614.json index 09724f546a5..3c12ffa178c 100644 --- a/2016/4xxx/CVE-2016-4614.json +++ b/2016/4xxx/CVE-2016-4614.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4614", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4615.json b/2016/4xxx/CVE-2016-4615.json index 52918cf71d3..d5500d02b1e 100644 --- a/2016/4xxx/CVE-2016-4615.json +++ b/2016/4xxx/CVE-2016-4615.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4615", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4616.json b/2016/4xxx/CVE-2016-4616.json index 4202fcc58a5..10ebc924b38 100644 --- a/2016/4xxx/CVE-2016-4616.json +++ b/2016/4xxx/CVE-2016-4616.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4616", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4617.json b/2016/4xxx/CVE-2016-4617.json index 278e2fb77fc..e2c6d3aa986 100644 --- a/2016/4xxx/CVE-2016-4617.json +++ b/2016/4xxx/CVE-2016-4617.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4617", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4618.json b/2016/4xxx/CVE-2016-4618.json index e11b1904b14..f0430456534 100644 --- a/2016/4xxx/CVE-2016-4618.json +++ b/2016/4xxx/CVE-2016-4618.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4618", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4620.json b/2016/4xxx/CVE-2016-4620.json index 06b12f00dba..ab7511afd08 100644 --- a/2016/4xxx/CVE-2016-4620.json +++ b/2016/4xxx/CVE-2016-4620.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4620", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4621.json b/2016/4xxx/CVE-2016-4621.json index 9fbd5be916d..2b696b56b9a 100644 --- a/2016/4xxx/CVE-2016-4621.json +++ b/2016/4xxx/CVE-2016-4621.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4621", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4622.json b/2016/4xxx/CVE-2016-4622.json index 51fad14d881..3f7b0a67831 100644 --- a/2016/4xxx/CVE-2016-4622.json +++ b/2016/4xxx/CVE-2016-4622.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4622", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4623.json b/2016/4xxx/CVE-2016-4623.json index aee9cf3a6de..b9f7ac861c3 100644 --- a/2016/4xxx/CVE-2016-4623.json +++ b/2016/4xxx/CVE-2016-4623.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4623", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4624.json b/2016/4xxx/CVE-2016-4624.json index 8c6ccdf35a3..d6a10659792 100644 --- a/2016/4xxx/CVE-2016-4624.json +++ b/2016/4xxx/CVE-2016-4624.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4624", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4625.json b/2016/4xxx/CVE-2016-4625.json index 536385e7b17..ea3e5838b4c 100644 --- a/2016/4xxx/CVE-2016-4625.json +++ b/2016/4xxx/CVE-2016-4625.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4625", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4626.json b/2016/4xxx/CVE-2016-4626.json index c76e6947082..46748cccd50 100644 --- a/2016/4xxx/CVE-2016-4626.json +++ b/2016/4xxx/CVE-2016-4626.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4626", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4627.json b/2016/4xxx/CVE-2016-4627.json index 89b6c22dd6b..a059d836677 100644 --- a/2016/4xxx/CVE-2016-4627.json +++ b/2016/4xxx/CVE-2016-4627.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4627", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4628.json b/2016/4xxx/CVE-2016-4628.json index 71c770e194f..a23812d5bfa 100644 --- a/2016/4xxx/CVE-2016-4628.json +++ b/2016/4xxx/CVE-2016-4628.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4628", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4629.json b/2016/4xxx/CVE-2016-4629.json index 892bd3c003e..3040c696d54 100644 --- a/2016/4xxx/CVE-2016-4629.json +++ b/2016/4xxx/CVE-2016-4629.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4629", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4630.json b/2016/4xxx/CVE-2016-4630.json index 8203c074e09..e50b4925152 100644 --- a/2016/4xxx/CVE-2016-4630.json +++ b/2016/4xxx/CVE-2016-4630.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4630", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4631.json b/2016/4xxx/CVE-2016-4631.json index 31edf116ef0..9ba42515b3d 100644 --- a/2016/4xxx/CVE-2016-4631.json +++ b/2016/4xxx/CVE-2016-4631.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4631", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4632.json b/2016/4xxx/CVE-2016-4632.json index 0a29584a91e..001c9f9fcfb 100644 --- a/2016/4xxx/CVE-2016-4632.json +++ b/2016/4xxx/CVE-2016-4632.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4632", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4633.json b/2016/4xxx/CVE-2016-4633.json index d13485c4b83..9c5a0f06dd5 100644 --- a/2016/4xxx/CVE-2016-4633.json +++ b/2016/4xxx/CVE-2016-4633.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4633", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4634.json b/2016/4xxx/CVE-2016-4634.json index cd6350d781e..d5ff893b918 100644 --- a/2016/4xxx/CVE-2016-4634.json +++ b/2016/4xxx/CVE-2016-4634.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4634", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4635.json b/2016/4xxx/CVE-2016-4635.json index b3dd3220bbf..ae82a03b811 100644 --- a/2016/4xxx/CVE-2016-4635.json +++ b/2016/4xxx/CVE-2016-4635.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4635", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4637.json b/2016/4xxx/CVE-2016-4637.json index 97c7d60d903..8d4150fe241 100644 --- a/2016/4xxx/CVE-2016-4637.json +++ b/2016/4xxx/CVE-2016-4637.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4637", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4638.json b/2016/4xxx/CVE-2016-4638.json index 0800eed6e41..4045c593eee 100644 --- a/2016/4xxx/CVE-2016-4638.json +++ b/2016/4xxx/CVE-2016-4638.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4638", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4639.json b/2016/4xxx/CVE-2016-4639.json index c190785b696..59f8c08b60b 100644 --- a/2016/4xxx/CVE-2016-4639.json +++ b/2016/4xxx/CVE-2016-4639.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4639", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4640.json b/2016/4xxx/CVE-2016-4640.json index 40fa2980f31..002018afb84 100644 --- a/2016/4xxx/CVE-2016-4640.json +++ b/2016/4xxx/CVE-2016-4640.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4640", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4641.json b/2016/4xxx/CVE-2016-4641.json index ec13acf2120..4ebf19750ff 100644 --- a/2016/4xxx/CVE-2016-4641.json +++ b/2016/4xxx/CVE-2016-4641.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4641", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4645.json b/2016/4xxx/CVE-2016-4645.json index 6ce882cfcfd..16cf8863f86 100644 --- a/2016/4xxx/CVE-2016-4645.json +++ b/2016/4xxx/CVE-2016-4645.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4645", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4646.json b/2016/4xxx/CVE-2016-4646.json index b63e1e3ed87..6323a2619a6 100644 --- a/2016/4xxx/CVE-2016-4646.json +++ b/2016/4xxx/CVE-2016-4646.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4646", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4647.json b/2016/4xxx/CVE-2016-4647.json index 91ffb3fdc2a..f060be7bec8 100644 --- a/2016/4xxx/CVE-2016-4647.json +++ b/2016/4xxx/CVE-2016-4647.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4647", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4648.json b/2016/4xxx/CVE-2016-4648.json index 796dc41b1d8..e23ffa2aae4 100644 --- a/2016/4xxx/CVE-2016-4648.json +++ b/2016/4xxx/CVE-2016-4648.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4648", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4649.json b/2016/4xxx/CVE-2016-4649.json index 691f21cd790..630503154b5 100644 --- a/2016/4xxx/CVE-2016-4649.json +++ b/2016/4xxx/CVE-2016-4649.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4649", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4650.json b/2016/4xxx/CVE-2016-4650.json index 6c3137bb599..95c7d133bce 100644 --- a/2016/4xxx/CVE-2016-4650.json +++ b/2016/4xxx/CVE-2016-4650.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4650", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4651.json b/2016/4xxx/CVE-2016-4651.json index d6ba563e87b..c4ade583aeb 100644 --- a/2016/4xxx/CVE-2016-4651.json +++ b/2016/4xxx/CVE-2016-4651.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4651", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4652.json b/2016/4xxx/CVE-2016-4652.json index 754f91f56e9..9472883129e 100644 --- a/2016/4xxx/CVE-2016-4652.json +++ b/2016/4xxx/CVE-2016-4652.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4652", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4653.json b/2016/4xxx/CVE-2016-4653.json index 4bde8a8d253..b28809776fe 100644 --- a/2016/4xxx/CVE-2016-4653.json +++ b/2016/4xxx/CVE-2016-4653.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4653", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4654.json b/2016/4xxx/CVE-2016-4654.json index 5c1d4d34d66..0318fcc61b9 100644 --- a/2016/4xxx/CVE-2016-4654.json +++ b/2016/4xxx/CVE-2016-4654.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4654", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4655.json b/2016/4xxx/CVE-2016-4655.json index dd8e71d4982..5a0c94ecd6a 100644 --- a/2016/4xxx/CVE-2016-4655.json +++ b/2016/4xxx/CVE-2016-4655.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4655", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4656.json b/2016/4xxx/CVE-2016-4656.json index 9d34b5121f3..ca13b9bdf43 100644 --- a/2016/4xxx/CVE-2016-4656.json +++ b/2016/4xxx/CVE-2016-4656.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4656", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4657.json b/2016/4xxx/CVE-2016-4657.json index ba7a52e766e..b6a5de7cd2f 100644 --- a/2016/4xxx/CVE-2016-4657.json +++ b/2016/4xxx/CVE-2016-4657.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4657", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4658.json b/2016/4xxx/CVE-2016-4658.json index 763e8de3624..6600d564083 100644 --- a/2016/4xxx/CVE-2016-4658.json +++ b/2016/4xxx/CVE-2016-4658.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4658", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4660.json b/2016/4xxx/CVE-2016-4660.json index e9e8d1666b2..164b75b1afe 100644 --- a/2016/4xxx/CVE-2016-4660.json +++ b/2016/4xxx/CVE-2016-4660.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4660", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4661.json b/2016/4xxx/CVE-2016-4661.json index 1f3b01d5007..8c0afb00a06 100644 --- a/2016/4xxx/CVE-2016-4661.json +++ b/2016/4xxx/CVE-2016-4661.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4661", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4662.json b/2016/4xxx/CVE-2016-4662.json index a980df6d3c8..aa3bfc6ad7d 100644 --- a/2016/4xxx/CVE-2016-4662.json +++ b/2016/4xxx/CVE-2016-4662.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4662", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4663.json b/2016/4xxx/CVE-2016-4663.json index 7b6df1a10cc..e1e5a3293d9 100644 --- a/2016/4xxx/CVE-2016-4663.json +++ b/2016/4xxx/CVE-2016-4663.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4663", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4664.json b/2016/4xxx/CVE-2016-4664.json index 022e0da95bf..8883a301a57 100644 --- a/2016/4xxx/CVE-2016-4664.json +++ b/2016/4xxx/CVE-2016-4664.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4664", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4665.json b/2016/4xxx/CVE-2016-4665.json index 8d531c5fd1c..68a984b9abf 100644 --- a/2016/4xxx/CVE-2016-4665.json +++ b/2016/4xxx/CVE-2016-4665.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4665", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4666.json b/2016/4xxx/CVE-2016-4666.json index 6b6f4991329..d748e722cb5 100644 --- a/2016/4xxx/CVE-2016-4666.json +++ b/2016/4xxx/CVE-2016-4666.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4666", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4667.json b/2016/4xxx/CVE-2016-4667.json index 4530de65b4e..26e4eb64605 100644 --- a/2016/4xxx/CVE-2016-4667.json +++ b/2016/4xxx/CVE-2016-4667.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4667", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4669.json b/2016/4xxx/CVE-2016-4669.json index f583a1d3d1b..5e841aa1c3e 100644 --- a/2016/4xxx/CVE-2016-4669.json +++ b/2016/4xxx/CVE-2016-4669.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4669", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4670.json b/2016/4xxx/CVE-2016-4670.json index 01d7fcee181..7c5f6292b61 100644 --- a/2016/4xxx/CVE-2016-4670.json +++ b/2016/4xxx/CVE-2016-4670.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4670", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4671.json b/2016/4xxx/CVE-2016-4671.json index abdef04d559..7646a8516f9 100644 --- a/2016/4xxx/CVE-2016-4671.json +++ b/2016/4xxx/CVE-2016-4671.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4671", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4673.json b/2016/4xxx/CVE-2016-4673.json index ef28842d02b..dc4bb8acf18 100644 --- a/2016/4xxx/CVE-2016-4673.json +++ b/2016/4xxx/CVE-2016-4673.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4673", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4674.json b/2016/4xxx/CVE-2016-4674.json index b09c09e3111..c5510beefa9 100644 --- a/2016/4xxx/CVE-2016-4674.json +++ b/2016/4xxx/CVE-2016-4674.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4674", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4675.json b/2016/4xxx/CVE-2016-4675.json index 74bf4ed77a6..ccd5f583499 100644 --- a/2016/4xxx/CVE-2016-4675.json +++ b/2016/4xxx/CVE-2016-4675.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4675", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4677.json b/2016/4xxx/CVE-2016-4677.json index f6e58fce645..2ea84a5da88 100644 --- a/2016/4xxx/CVE-2016-4677.json +++ b/2016/4xxx/CVE-2016-4677.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4677", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4678.json b/2016/4xxx/CVE-2016-4678.json index cd29b04c6ec..73acf3dde3f 100644 --- a/2016/4xxx/CVE-2016-4678.json +++ b/2016/4xxx/CVE-2016-4678.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4678", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4679.json b/2016/4xxx/CVE-2016-4679.json index 3fa967e2168..5a0d7bd848e 100644 --- a/2016/4xxx/CVE-2016-4679.json +++ b/2016/4xxx/CVE-2016-4679.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4679", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4680.json b/2016/4xxx/CVE-2016-4680.json index 7faf930aa7d..620ac3ea9b6 100644 --- a/2016/4xxx/CVE-2016-4680.json +++ b/2016/4xxx/CVE-2016-4680.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4680", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4681.json b/2016/4xxx/CVE-2016-4681.json index a2da5c32cd0..4b0c70f2c50 100644 --- a/2016/4xxx/CVE-2016-4681.json +++ b/2016/4xxx/CVE-2016-4681.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4681", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4682.json b/2016/4xxx/CVE-2016-4682.json index 35b258baee0..791d11a5909 100644 --- a/2016/4xxx/CVE-2016-4682.json +++ b/2016/4xxx/CVE-2016-4682.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4682", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4683.json b/2016/4xxx/CVE-2016-4683.json index d86b7319ddd..1da630f9fcd 100644 --- a/2016/4xxx/CVE-2016-4683.json +++ b/2016/4xxx/CVE-2016-4683.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4683", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4685.json b/2016/4xxx/CVE-2016-4685.json index a1d598218b1..e474d5046cb 100644 --- a/2016/4xxx/CVE-2016-4685.json +++ b/2016/4xxx/CVE-2016-4685.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4685", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4686.json b/2016/4xxx/CVE-2016-4686.json index 31e5429ff92..f3b0f18d2bf 100644 --- a/2016/4xxx/CVE-2016-4686.json +++ b/2016/4xxx/CVE-2016-4686.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4686", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4688.json b/2016/4xxx/CVE-2016-4688.json index 62457bcd2ba..96c5b1db0da 100644 --- a/2016/4xxx/CVE-2016-4688.json +++ b/2016/4xxx/CVE-2016-4688.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4688", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4689.json b/2016/4xxx/CVE-2016-4689.json index 5f6aceda1f7..67d834915c0 100644 --- a/2016/4xxx/CVE-2016-4689.json +++ b/2016/4xxx/CVE-2016-4689.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4689", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4690.json b/2016/4xxx/CVE-2016-4690.json index 2632b77b3c8..810c9aaf97f 100644 --- a/2016/4xxx/CVE-2016-4690.json +++ b/2016/4xxx/CVE-2016-4690.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4690", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4691.json b/2016/4xxx/CVE-2016-4691.json index 7d2aedc22cc..01b06e3d738 100644 --- a/2016/4xxx/CVE-2016-4691.json +++ b/2016/4xxx/CVE-2016-4691.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4691", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4692.json b/2016/4xxx/CVE-2016-4692.json index 2cf718f37e8..35ca83ff2e6 100644 --- a/2016/4xxx/CVE-2016-4692.json +++ b/2016/4xxx/CVE-2016-4692.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4692", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4693.json b/2016/4xxx/CVE-2016-4693.json index 72156c9a55c..8bbf74bb6bd 100644 --- a/2016/4xxx/CVE-2016-4693.json +++ b/2016/4xxx/CVE-2016-4693.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4693", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4694.json b/2016/4xxx/CVE-2016-4694.json index 5a4e6ce571c..a38d2d2ef5a 100644 --- a/2016/4xxx/CVE-2016-4694.json +++ b/2016/4xxx/CVE-2016-4694.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4694", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4696.json b/2016/4xxx/CVE-2016-4696.json index b519326703d..c11ea65a2ce 100644 --- a/2016/4xxx/CVE-2016-4696.json +++ b/2016/4xxx/CVE-2016-4696.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4696", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4697.json b/2016/4xxx/CVE-2016-4697.json index 5115a31ef43..f1310dd1094 100644 --- a/2016/4xxx/CVE-2016-4697.json +++ b/2016/4xxx/CVE-2016-4697.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4697", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4698.json b/2016/4xxx/CVE-2016-4698.json index 7d3caa2067e..7f3c6b38bf8 100644 --- a/2016/4xxx/CVE-2016-4698.json +++ b/2016/4xxx/CVE-2016-4698.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4698", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4699.json b/2016/4xxx/CVE-2016-4699.json index e10ae8b51d9..3297f14cdd6 100644 --- a/2016/4xxx/CVE-2016-4699.json +++ b/2016/4xxx/CVE-2016-4699.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4699", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4700.json b/2016/4xxx/CVE-2016-4700.json index 8f330d95bc6..559bd176f0f 100644 --- a/2016/4xxx/CVE-2016-4700.json +++ b/2016/4xxx/CVE-2016-4700.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4700", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4701.json b/2016/4xxx/CVE-2016-4701.json index a7d1615e186..d196a85fb0a 100644 --- a/2016/4xxx/CVE-2016-4701.json +++ b/2016/4xxx/CVE-2016-4701.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4701", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4702.json b/2016/4xxx/CVE-2016-4702.json index 2bcb5e0f994..1a8b8c46767 100644 --- a/2016/4xxx/CVE-2016-4702.json +++ b/2016/4xxx/CVE-2016-4702.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4702", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4703.json b/2016/4xxx/CVE-2016-4703.json index c6a8d4c4fe6..f9b07d77269 100644 --- a/2016/4xxx/CVE-2016-4703.json +++ b/2016/4xxx/CVE-2016-4703.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4703", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4704.json b/2016/4xxx/CVE-2016-4704.json index a1dd1c03208..f6e92ef9582 100644 --- a/2016/4xxx/CVE-2016-4704.json +++ b/2016/4xxx/CVE-2016-4704.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4704", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4705.json b/2016/4xxx/CVE-2016-4705.json index 0fd469ff94e..49462687b95 100644 --- a/2016/4xxx/CVE-2016-4705.json +++ b/2016/4xxx/CVE-2016-4705.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4705", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4706.json b/2016/4xxx/CVE-2016-4706.json index 1bb991ea4a2..60cd80418dc 100644 --- a/2016/4xxx/CVE-2016-4706.json +++ b/2016/4xxx/CVE-2016-4706.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4706", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4707.json b/2016/4xxx/CVE-2016-4707.json index 1fdd71954ee..c36e6c7c4e3 100644 --- a/2016/4xxx/CVE-2016-4707.json +++ b/2016/4xxx/CVE-2016-4707.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4707", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4708.json b/2016/4xxx/CVE-2016-4708.json index dfa7daffef0..f30923007e4 100644 --- a/2016/4xxx/CVE-2016-4708.json +++ b/2016/4xxx/CVE-2016-4708.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4708", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4709.json b/2016/4xxx/CVE-2016-4709.json index 65ae947a81b..e5bbd0ad15a 100644 --- a/2016/4xxx/CVE-2016-4709.json +++ b/2016/4xxx/CVE-2016-4709.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4709", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4710.json b/2016/4xxx/CVE-2016-4710.json index 1b39b4707b6..adc61252592 100644 --- a/2016/4xxx/CVE-2016-4710.json +++ b/2016/4xxx/CVE-2016-4710.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4710", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4711.json b/2016/4xxx/CVE-2016-4711.json index 536f4e7c759..4cfd8636499 100644 --- a/2016/4xxx/CVE-2016-4711.json +++ b/2016/4xxx/CVE-2016-4711.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4711", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4712.json b/2016/4xxx/CVE-2016-4712.json index 56f79bd6bb1..16433c0cb2a 100644 --- a/2016/4xxx/CVE-2016-4712.json +++ b/2016/4xxx/CVE-2016-4712.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4712", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4713.json b/2016/4xxx/CVE-2016-4713.json index 04eeac3bd39..08711adae43 100644 --- a/2016/4xxx/CVE-2016-4713.json +++ b/2016/4xxx/CVE-2016-4713.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4713", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4715.json b/2016/4xxx/CVE-2016-4715.json index d7932bb4c34..32c794ddf8c 100644 --- a/2016/4xxx/CVE-2016-4715.json +++ b/2016/4xxx/CVE-2016-4715.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4715", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4716.json b/2016/4xxx/CVE-2016-4716.json index 687d7772ff5..5d10463e4a0 100644 --- a/2016/4xxx/CVE-2016-4716.json +++ b/2016/4xxx/CVE-2016-4716.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4716", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4717.json b/2016/4xxx/CVE-2016-4717.json index b8d9a05bd43..4de85a583a4 100644 --- a/2016/4xxx/CVE-2016-4717.json +++ b/2016/4xxx/CVE-2016-4717.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4717", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4718.json b/2016/4xxx/CVE-2016-4718.json index 6513687f892..795ca0ff27b 100644 --- a/2016/4xxx/CVE-2016-4718.json +++ b/2016/4xxx/CVE-2016-4718.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4718", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4719.json b/2016/4xxx/CVE-2016-4719.json index d59f812ebbc..f24ccf0b1c1 100644 --- a/2016/4xxx/CVE-2016-4719.json +++ b/2016/4xxx/CVE-2016-4719.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4719", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4721.json b/2016/4xxx/CVE-2016-4721.json index 0f1f0564b76..d6eb2ffae2a 100644 --- a/2016/4xxx/CVE-2016-4721.json +++ b/2016/4xxx/CVE-2016-4721.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4721", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4722.json b/2016/4xxx/CVE-2016-4722.json index 3e2e3f65738..b4afa6d58ce 100644 --- a/2016/4xxx/CVE-2016-4722.json +++ b/2016/4xxx/CVE-2016-4722.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4722", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4723.json b/2016/4xxx/CVE-2016-4723.json index 8b9a08cabce..3545a98c821 100644 --- a/2016/4xxx/CVE-2016-4723.json +++ b/2016/4xxx/CVE-2016-4723.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4723", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4724.json b/2016/4xxx/CVE-2016-4724.json index b9b5d353cbd..50f263a01b8 100644 --- a/2016/4xxx/CVE-2016-4724.json +++ b/2016/4xxx/CVE-2016-4724.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4724", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4725.json b/2016/4xxx/CVE-2016-4725.json index af967fbed4e..362e6245751 100644 --- a/2016/4xxx/CVE-2016-4725.json +++ b/2016/4xxx/CVE-2016-4725.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4725", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4726.json b/2016/4xxx/CVE-2016-4726.json index 6bebb32f88f..6381cbdf482 100644 --- a/2016/4xxx/CVE-2016-4726.json +++ b/2016/4xxx/CVE-2016-4726.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4726", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4727.json b/2016/4xxx/CVE-2016-4727.json index 1417b2a0abf..a466c4798f0 100644 --- a/2016/4xxx/CVE-2016-4727.json +++ b/2016/4xxx/CVE-2016-4727.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4727", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4728.json b/2016/4xxx/CVE-2016-4728.json index 17101c9afba..bb8f0a53b53 100644 --- a/2016/4xxx/CVE-2016-4728.json +++ b/2016/4xxx/CVE-2016-4728.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4728", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4729.json b/2016/4xxx/CVE-2016-4729.json index 25a8e750f87..aa352e508d8 100644 --- a/2016/4xxx/CVE-2016-4729.json +++ b/2016/4xxx/CVE-2016-4729.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4729", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4730.json b/2016/4xxx/CVE-2016-4730.json index e0096988397..ae509ed9b16 100644 --- a/2016/4xxx/CVE-2016-4730.json +++ b/2016/4xxx/CVE-2016-4730.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4730", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4731.json b/2016/4xxx/CVE-2016-4731.json index 5f33830cce7..7f19b409487 100644 --- a/2016/4xxx/CVE-2016-4731.json +++ b/2016/4xxx/CVE-2016-4731.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4731", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4733.json b/2016/4xxx/CVE-2016-4733.json index ef0fe311b4c..2f8dfe1b8de 100644 --- a/2016/4xxx/CVE-2016-4733.json +++ b/2016/4xxx/CVE-2016-4733.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4733", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4734.json b/2016/4xxx/CVE-2016-4734.json index c89c6b8a8a4..1c1c250945d 100644 --- a/2016/4xxx/CVE-2016-4734.json +++ b/2016/4xxx/CVE-2016-4734.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4734", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4735.json b/2016/4xxx/CVE-2016-4735.json index 9f49e8608f3..5912282c9de 100644 --- a/2016/4xxx/CVE-2016-4735.json +++ b/2016/4xxx/CVE-2016-4735.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4735", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4736.json b/2016/4xxx/CVE-2016-4736.json index 15540c4882f..d6de84c3f70 100644 --- a/2016/4xxx/CVE-2016-4736.json +++ b/2016/4xxx/CVE-2016-4736.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4736", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4737.json b/2016/4xxx/CVE-2016-4737.json index 59c000f8ac0..22eaa5b2228 100644 --- a/2016/4xxx/CVE-2016-4737.json +++ b/2016/4xxx/CVE-2016-4737.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4737", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4738.json b/2016/4xxx/CVE-2016-4738.json index a7b803fb822..b8a8416b115 100644 --- a/2016/4xxx/CVE-2016-4738.json +++ b/2016/4xxx/CVE-2016-4738.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4738", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4739.json b/2016/4xxx/CVE-2016-4739.json index 906c73dec9e..0e4248fa910 100644 --- a/2016/4xxx/CVE-2016-4739.json +++ b/2016/4xxx/CVE-2016-4739.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4739", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4740.json b/2016/4xxx/CVE-2016-4740.json index 4d2f94d81c8..5bbb2d90bb2 100644 --- a/2016/4xxx/CVE-2016-4740.json +++ b/2016/4xxx/CVE-2016-4740.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4740", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4741.json b/2016/4xxx/CVE-2016-4741.json index ae6bf15ca2a..ab1cd4a8b5f 100644 --- a/2016/4xxx/CVE-2016-4741.json +++ b/2016/4xxx/CVE-2016-4741.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4741", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4742.json b/2016/4xxx/CVE-2016-4742.json index f2c1ab00c8f..2c5fbe7e96c 100644 --- a/2016/4xxx/CVE-2016-4742.json +++ b/2016/4xxx/CVE-2016-4742.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4742", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4743.json b/2016/4xxx/CVE-2016-4743.json index 2d4def99643..c8fb4c3e644 100644 --- a/2016/4xxx/CVE-2016-4743.json +++ b/2016/4xxx/CVE-2016-4743.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4743", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4745.json b/2016/4xxx/CVE-2016-4745.json index 3b80efa8524..a31a097f384 100644 --- a/2016/4xxx/CVE-2016-4745.json +++ b/2016/4xxx/CVE-2016-4745.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4745", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4746.json b/2016/4xxx/CVE-2016-4746.json index 3a3667ae3f6..8b4fc56f50f 100644 --- a/2016/4xxx/CVE-2016-4746.json +++ b/2016/4xxx/CVE-2016-4746.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4746", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4747.json b/2016/4xxx/CVE-2016-4747.json index 3db806490f7..4568149a12a 100644 --- a/2016/4xxx/CVE-2016-4747.json +++ b/2016/4xxx/CVE-2016-4747.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4747", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4748.json b/2016/4xxx/CVE-2016-4748.json index c92b53e2a5a..16ccf32c03d 100644 --- a/2016/4xxx/CVE-2016-4748.json +++ b/2016/4xxx/CVE-2016-4748.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4748", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4749.json b/2016/4xxx/CVE-2016-4749.json index d106cb25ae6..de17b1db84b 100644 --- a/2016/4xxx/CVE-2016-4749.json +++ b/2016/4xxx/CVE-2016-4749.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4749", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4750.json b/2016/4xxx/CVE-2016-4750.json index 8d486340455..efcc8a71987 100644 --- a/2016/4xxx/CVE-2016-4750.json +++ b/2016/4xxx/CVE-2016-4750.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4750", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4751.json b/2016/4xxx/CVE-2016-4751.json index 17cae1576a8..5c56d99ea1f 100644 --- a/2016/4xxx/CVE-2016-4751.json +++ b/2016/4xxx/CVE-2016-4751.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4751", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4752.json b/2016/4xxx/CVE-2016-4752.json index 254760a179d..ffb414ba5e3 100644 --- a/2016/4xxx/CVE-2016-4752.json +++ b/2016/4xxx/CVE-2016-4752.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4752", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4753.json b/2016/4xxx/CVE-2016-4753.json index a378887e7cf..7534303395c 100644 --- a/2016/4xxx/CVE-2016-4753.json +++ b/2016/4xxx/CVE-2016-4753.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4753", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4754.json b/2016/4xxx/CVE-2016-4754.json index b8bfeab7f33..67a574e81c0 100644 --- a/2016/4xxx/CVE-2016-4754.json +++ b/2016/4xxx/CVE-2016-4754.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4754", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4755.json b/2016/4xxx/CVE-2016-4755.json index 7e3f55abe5a..78f113f3304 100644 --- a/2016/4xxx/CVE-2016-4755.json +++ b/2016/4xxx/CVE-2016-4755.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4755", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4758.json b/2016/4xxx/CVE-2016-4758.json index 19245db0954..9a67372a79e 100644 --- a/2016/4xxx/CVE-2016-4758.json +++ b/2016/4xxx/CVE-2016-4758.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4758", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4759.json b/2016/4xxx/CVE-2016-4759.json index f40493c3b14..cda34055fe1 100644 --- a/2016/4xxx/CVE-2016-4759.json +++ b/2016/4xxx/CVE-2016-4759.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4759", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4760.json b/2016/4xxx/CVE-2016-4760.json index 6d9465c7c45..72a5cabb743 100644 --- a/2016/4xxx/CVE-2016-4760.json +++ b/2016/4xxx/CVE-2016-4760.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4760", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4762.json b/2016/4xxx/CVE-2016-4762.json index a3d0c2fe773..7f4b72f107f 100644 --- a/2016/4xxx/CVE-2016-4762.json +++ b/2016/4xxx/CVE-2016-4762.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4762", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4763.json b/2016/4xxx/CVE-2016-4763.json index 9a96fe911dc..f72bdea26c7 100644 --- a/2016/4xxx/CVE-2016-4763.json +++ b/2016/4xxx/CVE-2016-4763.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4763", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4764.json b/2016/4xxx/CVE-2016-4764.json index 6efdc758b7d..f4f1d29b488 100644 --- a/2016/4xxx/CVE-2016-4764.json +++ b/2016/4xxx/CVE-2016-4764.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4764", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4765.json b/2016/4xxx/CVE-2016-4765.json index 01488af8fdc..82698c34f8e 100644 --- a/2016/4xxx/CVE-2016-4765.json +++ b/2016/4xxx/CVE-2016-4765.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4765", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4766.json b/2016/4xxx/CVE-2016-4766.json index 0eb12cb9a6a..7538a55af76 100644 --- a/2016/4xxx/CVE-2016-4766.json +++ b/2016/4xxx/CVE-2016-4766.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4766", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4767.json b/2016/4xxx/CVE-2016-4767.json index a32ccc199d7..fa7a280a8fc 100644 --- a/2016/4xxx/CVE-2016-4767.json +++ b/2016/4xxx/CVE-2016-4767.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4767", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4768.json b/2016/4xxx/CVE-2016-4768.json index d5b67c5ea82..af2f0f187da 100644 --- a/2016/4xxx/CVE-2016-4768.json +++ b/2016/4xxx/CVE-2016-4768.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4768", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4769.json b/2016/4xxx/CVE-2016-4769.json index c748120475e..8c4680a3b77 100644 --- a/2016/4xxx/CVE-2016-4769.json +++ b/2016/4xxx/CVE-2016-4769.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4769", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4771.json b/2016/4xxx/CVE-2016-4771.json index e10e8dc551c..51d4b058307 100644 --- a/2016/4xxx/CVE-2016-4771.json +++ b/2016/4xxx/CVE-2016-4771.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4771", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4772.json b/2016/4xxx/CVE-2016-4772.json index 51d1a1218d4..95bf945615d 100644 --- a/2016/4xxx/CVE-2016-4772.json +++ b/2016/4xxx/CVE-2016-4772.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4772", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4773.json b/2016/4xxx/CVE-2016-4773.json index 0bb745a8523..53232d34afa 100644 --- a/2016/4xxx/CVE-2016-4773.json +++ b/2016/4xxx/CVE-2016-4773.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4773", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4774.json b/2016/4xxx/CVE-2016-4774.json index e4cffb8a4b9..96af5c4aa0e 100644 --- a/2016/4xxx/CVE-2016-4774.json +++ b/2016/4xxx/CVE-2016-4774.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4774", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4775.json b/2016/4xxx/CVE-2016-4775.json index 36d45276d61..a417da45ebd 100644 --- a/2016/4xxx/CVE-2016-4775.json +++ b/2016/4xxx/CVE-2016-4775.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4775", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4776.json b/2016/4xxx/CVE-2016-4776.json index 2e7ee6266fb..41bea19acab 100644 --- a/2016/4xxx/CVE-2016-4776.json +++ b/2016/4xxx/CVE-2016-4776.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4776", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4777.json b/2016/4xxx/CVE-2016-4777.json index 03dcdd9123a..e58b36b91fb 100644 --- a/2016/4xxx/CVE-2016-4777.json +++ b/2016/4xxx/CVE-2016-4777.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4777", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4778.json b/2016/4xxx/CVE-2016-4778.json index d122253ea12..b947199a0a2 100644 --- a/2016/4xxx/CVE-2016-4778.json +++ b/2016/4xxx/CVE-2016-4778.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4778", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4779.json b/2016/4xxx/CVE-2016-4779.json index 39f094ec980..87b39d5d139 100644 --- a/2016/4xxx/CVE-2016-4779.json +++ b/2016/4xxx/CVE-2016-4779.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4779", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4780.json b/2016/4xxx/CVE-2016-4780.json index e96f124abc4..2c8a2613d05 100644 --- a/2016/4xxx/CVE-2016-4780.json +++ b/2016/4xxx/CVE-2016-4780.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4780", "STATE" : "PUBLIC" }, diff --git a/2016/4xxx/CVE-2016-4781.json b/2016/4xxx/CVE-2016-4781.json index 0cce6dd9edc..ebb46732185 100644 --- a/2016/4xxx/CVE-2016-4781.json +++ b/2016/4xxx/CVE-2016-4781.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "product-security@apple.com", "ID" : "CVE-2016-4781", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5383.json b/2016/5xxx/CVE-2016-5383.json index 2d339203abb..e03698b027b 100644 --- a/2016/5xxx/CVE-2016-5383.json +++ b/2016/5xxx/CVE-2016-5383.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5383", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5384.json b/2016/5xxx/CVE-2016-5384.json index 227155b3c9a..ed57f48ca39 100644 --- a/2016/5xxx/CVE-2016-5384.json +++ b/2016/5xxx/CVE-2016-5384.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5384", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5385.json b/2016/5xxx/CVE-2016-5385.json index 6cc7894ace5..4906883eb32 100644 --- a/2016/5xxx/CVE-2016-5385.json +++ b/2016/5xxx/CVE-2016-5385.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5385", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5386.json b/2016/5xxx/CVE-2016-5386.json index 21550f4630c..21760645495 100644 --- a/2016/5xxx/CVE-2016-5386.json +++ b/2016/5xxx/CVE-2016-5386.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5386", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5387.json b/2016/5xxx/CVE-2016-5387.json index 77e9c40237a..dfbba168e03 100644 --- a/2016/5xxx/CVE-2016-5387.json +++ b/2016/5xxx/CVE-2016-5387.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5387", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5388.json b/2016/5xxx/CVE-2016-5388.json index 110e6b03ae9..a6771875e36 100644 --- a/2016/5xxx/CVE-2016-5388.json +++ b/2016/5xxx/CVE-2016-5388.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5388", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5390.json b/2016/5xxx/CVE-2016-5390.json index 64d6a8926d9..b8a34b38188 100644 --- a/2016/5xxx/CVE-2016-5390.json +++ b/2016/5xxx/CVE-2016-5390.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5390", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5391.json b/2016/5xxx/CVE-2016-5391.json index a51b5f30672..53e33f01e66 100644 --- a/2016/5xxx/CVE-2016-5391.json +++ b/2016/5xxx/CVE-2016-5391.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5391", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5392.json b/2016/5xxx/CVE-2016-5392.json index 2546886a288..0c81f0cd959 100644 --- a/2016/5xxx/CVE-2016-5392.json +++ b/2016/5xxx/CVE-2016-5392.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5392", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5395.json b/2016/5xxx/CVE-2016-5395.json index 5f9d7e71edc..7ccc17b45dc 100644 --- a/2016/5xxx/CVE-2016-5395.json +++ b/2016/5xxx/CVE-2016-5395.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5395", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5398.json b/2016/5xxx/CVE-2016-5398.json index acfe89301fc..d93c8d419d7 100644 --- a/2016/5xxx/CVE-2016-5398.json +++ b/2016/5xxx/CVE-2016-5398.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5398", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5399.json b/2016/5xxx/CVE-2016-5399.json index 195d0acdb3c..f32689d31f4 100644 --- a/2016/5xxx/CVE-2016-5399.json +++ b/2016/5xxx/CVE-2016-5399.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5399", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5400.json b/2016/5xxx/CVE-2016-5400.json index fa75758f8f7..b9293bec5ea 100644 --- a/2016/5xxx/CVE-2016-5400.json +++ b/2016/5xxx/CVE-2016-5400.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5400", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5401.json b/2016/5xxx/CVE-2016-5401.json index 93610288405..7c94084ee9d 100644 --- a/2016/5xxx/CVE-2016-5401.json +++ b/2016/5xxx/CVE-2016-5401.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5401", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5403.json b/2016/5xxx/CVE-2016-5403.json index 8565fb29af3..5194915a9c0 100644 --- a/2016/5xxx/CVE-2016-5403.json +++ b/2016/5xxx/CVE-2016-5403.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5403", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5404.json b/2016/5xxx/CVE-2016-5404.json index c65805cfa67..5168d2fa83b 100644 --- a/2016/5xxx/CVE-2016-5404.json +++ b/2016/5xxx/CVE-2016-5404.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5404", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5405.json b/2016/5xxx/CVE-2016-5405.json index 3ac8426e1df..b4c0f1adaf2 100644 --- a/2016/5xxx/CVE-2016-5405.json +++ b/2016/5xxx/CVE-2016-5405.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5405", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5406.json b/2016/5xxx/CVE-2016-5406.json index 70f3682c9be..262d026caa7 100644 --- a/2016/5xxx/CVE-2016-5406.json +++ b/2016/5xxx/CVE-2016-5406.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5406", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5407.json b/2016/5xxx/CVE-2016-5407.json index eed066a7053..179f8213a85 100644 --- a/2016/5xxx/CVE-2016-5407.json +++ b/2016/5xxx/CVE-2016-5407.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5407", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5408.json b/2016/5xxx/CVE-2016-5408.json index a154edfb560..34d05adae02 100644 --- a/2016/5xxx/CVE-2016-5408.json +++ b/2016/5xxx/CVE-2016-5408.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5408", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5409.json b/2016/5xxx/CVE-2016-5409.json index 55b8eee1e5e..599ccb36913 100644 --- a/2016/5xxx/CVE-2016-5409.json +++ b/2016/5xxx/CVE-2016-5409.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5409", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5410.json b/2016/5xxx/CVE-2016-5410.json index a4d9b968796..94ef7a193be 100644 --- a/2016/5xxx/CVE-2016-5410.json +++ b/2016/5xxx/CVE-2016-5410.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5410", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5411.json b/2016/5xxx/CVE-2016-5411.json index 3c23f7ae0d0..cf54ac97bcf 100644 --- a/2016/5xxx/CVE-2016-5411.json +++ b/2016/5xxx/CVE-2016-5411.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5411", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5412.json b/2016/5xxx/CVE-2016-5412.json index 3969ddc911b..667b43ebb4f 100644 --- a/2016/5xxx/CVE-2016-5412.json +++ b/2016/5xxx/CVE-2016-5412.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5412", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5414.json b/2016/5xxx/CVE-2016-5414.json index 61b9dfdfe18..4ff098122a6 100644 --- a/2016/5xxx/CVE-2016-5414.json +++ b/2016/5xxx/CVE-2016-5414.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5414", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5416.json b/2016/5xxx/CVE-2016-5416.json index dfc8d9d84bd..2d9df79745e 100644 --- a/2016/5xxx/CVE-2016-5416.json +++ b/2016/5xxx/CVE-2016-5416.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5416", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5417.json b/2016/5xxx/CVE-2016-5417.json index d0900dbdf92..e701005fdf1 100644 --- a/2016/5xxx/CVE-2016-5417.json +++ b/2016/5xxx/CVE-2016-5417.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5417", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5418.json b/2016/5xxx/CVE-2016-5418.json index 5d0652bb507..40fd892db2c 100644 --- a/2016/5xxx/CVE-2016-5418.json +++ b/2016/5xxx/CVE-2016-5418.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5418", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5419.json b/2016/5xxx/CVE-2016-5419.json index 5216c3fe7a2..93b89730726 100644 --- a/2016/5xxx/CVE-2016-5419.json +++ b/2016/5xxx/CVE-2016-5419.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5419", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5420.json b/2016/5xxx/CVE-2016-5420.json index 4fd23fda622..52c476a49ff 100644 --- a/2016/5xxx/CVE-2016-5420.json +++ b/2016/5xxx/CVE-2016-5420.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5420", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5421.json b/2016/5xxx/CVE-2016-5421.json index 90fd3a19299..678df30add1 100644 --- a/2016/5xxx/CVE-2016-5421.json +++ b/2016/5xxx/CVE-2016-5421.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5421", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5422.json b/2016/5xxx/CVE-2016-5422.json index c2916d81964..ae259bf077a 100644 --- a/2016/5xxx/CVE-2016-5422.json +++ b/2016/5xxx/CVE-2016-5422.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5422", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5423.json b/2016/5xxx/CVE-2016-5423.json index 94a5fdb74f7..ca69dbb931a 100644 --- a/2016/5xxx/CVE-2016-5423.json +++ b/2016/5xxx/CVE-2016-5423.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5423", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5424.json b/2016/5xxx/CVE-2016-5424.json index 6723fac7f69..4b9fbad24dd 100644 --- a/2016/5xxx/CVE-2016-5424.json +++ b/2016/5xxx/CVE-2016-5424.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5424", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5425.json b/2016/5xxx/CVE-2016-5425.json index c1ee7b0ed4a..8d53b0677a8 100644 --- a/2016/5xxx/CVE-2016-5425.json +++ b/2016/5xxx/CVE-2016-5425.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5425", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5426.json b/2016/5xxx/CVE-2016-5426.json index 8df75825b5d..92da85015ef 100644 --- a/2016/5xxx/CVE-2016-5426.json +++ b/2016/5xxx/CVE-2016-5426.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5426", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5427.json b/2016/5xxx/CVE-2016-5427.json index 49a209617a4..eee19bc6305 100644 --- a/2016/5xxx/CVE-2016-5427.json +++ b/2016/5xxx/CVE-2016-5427.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5427", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5429.json b/2016/5xxx/CVE-2016-5429.json index 6bb3f7eb68e..92fb3a27304 100644 --- a/2016/5xxx/CVE-2016-5429.json +++ b/2016/5xxx/CVE-2016-5429.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5429", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5430.json b/2016/5xxx/CVE-2016-5430.json index 537438276f4..82148da9c29 100644 --- a/2016/5xxx/CVE-2016-5430.json +++ b/2016/5xxx/CVE-2016-5430.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5430", "STATE" : "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5432.json b/2016/5xxx/CVE-2016-5432.json index d1ede7c299f..8fae5482694 100644 --- a/2016/5xxx/CVE-2016-5432.json +++ b/2016/5xxx/CVE-2016-5432.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-5432", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6298.json b/2016/6xxx/CVE-2016-6298.json index d69065f08ac..9af90aa2ef3 100644 --- a/2016/6xxx/CVE-2016-6298.json +++ b/2016/6xxx/CVE-2016-6298.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6298", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6299.json b/2016/6xxx/CVE-2016-6299.json index a8a3b97fa6e..fb29337a0c2 100644 --- a/2016/6xxx/CVE-2016-6299.json +++ b/2016/6xxx/CVE-2016-6299.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6299", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6301.json b/2016/6xxx/CVE-2016-6301.json index dc004d73852..4671e2b427a 100644 --- a/2016/6xxx/CVE-2016-6301.json +++ b/2016/6xxx/CVE-2016-6301.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6301", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6302.json b/2016/6xxx/CVE-2016-6302.json index ad75aaa70da..289755382be 100644 --- a/2016/6xxx/CVE-2016-6302.json +++ b/2016/6xxx/CVE-2016-6302.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6302", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6303.json b/2016/6xxx/CVE-2016-6303.json index 444a67e1938..3f4582bdbaf 100644 --- a/2016/6xxx/CVE-2016-6303.json +++ b/2016/6xxx/CVE-2016-6303.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6303", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6304.json b/2016/6xxx/CVE-2016-6304.json index 546c09720cc..bfa84f0d09b 100644 --- a/2016/6xxx/CVE-2016-6304.json +++ b/2016/6xxx/CVE-2016-6304.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6304", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6305.json b/2016/6xxx/CVE-2016-6305.json index 59d514ac5a1..11cf215cf4d 100644 --- a/2016/6xxx/CVE-2016-6305.json +++ b/2016/6xxx/CVE-2016-6305.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6305", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6306.json b/2016/6xxx/CVE-2016-6306.json index 34e4a75ebc5..f390d403765 100644 --- a/2016/6xxx/CVE-2016-6306.json +++ b/2016/6xxx/CVE-2016-6306.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6306", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6307.json b/2016/6xxx/CVE-2016-6307.json index 38fd49d7928..2525c444d9b 100644 --- a/2016/6xxx/CVE-2016-6307.json +++ b/2016/6xxx/CVE-2016-6307.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6307", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6308.json b/2016/6xxx/CVE-2016-6308.json index 047be4aa786..f954bd66c33 100644 --- a/2016/6xxx/CVE-2016-6308.json +++ b/2016/6xxx/CVE-2016-6308.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6308", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6309.json b/2016/6xxx/CVE-2016-6309.json index 9c361f12328..d6c4c6ce5f4 100644 --- a/2016/6xxx/CVE-2016-6309.json +++ b/2016/6xxx/CVE-2016-6309.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6309", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6310.json b/2016/6xxx/CVE-2016-6310.json index bc43b3df6b6..e4d94895438 100644 --- a/2016/6xxx/CVE-2016-6310.json +++ b/2016/6xxx/CVE-2016-6310.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6310", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6311.json b/2016/6xxx/CVE-2016-6311.json index 07e4cdd13a3..7c5418d0437 100644 --- a/2016/6xxx/CVE-2016-6311.json +++ b/2016/6xxx/CVE-2016-6311.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6311", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6312.json b/2016/6xxx/CVE-2016-6312.json index 87188eb4c98..da784c5678b 100644 --- a/2016/6xxx/CVE-2016-6312.json +++ b/2016/6xxx/CVE-2016-6312.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6312", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6313.json b/2016/6xxx/CVE-2016-6313.json index 5b9d2d07d00..08f88152b8a 100644 --- a/2016/6xxx/CVE-2016-6313.json +++ b/2016/6xxx/CVE-2016-6313.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6313", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6316.json b/2016/6xxx/CVE-2016-6316.json index 8cbf8079610..20e1c7d59e6 100644 --- a/2016/6xxx/CVE-2016-6316.json +++ b/2016/6xxx/CVE-2016-6316.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6316", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6317.json b/2016/6xxx/CVE-2016-6317.json index be2e4a5e0e4..f4c357ef3a3 100644 --- a/2016/6xxx/CVE-2016-6317.json +++ b/2016/6xxx/CVE-2016-6317.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6317", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6318.json b/2016/6xxx/CVE-2016-6318.json index cc5b599675b..60ee695cf2e 100644 --- a/2016/6xxx/CVE-2016-6318.json +++ b/2016/6xxx/CVE-2016-6318.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6318", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6319.json b/2016/6xxx/CVE-2016-6319.json index f9a748d8f21..d134082a423 100644 --- a/2016/6xxx/CVE-2016-6319.json +++ b/2016/6xxx/CVE-2016-6319.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6319", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6320.json b/2016/6xxx/CVE-2016-6320.json index ddc7490c45a..f58e1f29eee 100644 --- a/2016/6xxx/CVE-2016-6320.json +++ b/2016/6xxx/CVE-2016-6320.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6320", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6321.json b/2016/6xxx/CVE-2016-6321.json index 62b36fa1c4b..e4e5e4b0aee 100644 --- a/2016/6xxx/CVE-2016-6321.json +++ b/2016/6xxx/CVE-2016-6321.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6321", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6322.json b/2016/6xxx/CVE-2016-6322.json index ea1dcbdf707..bd24ffde00e 100644 --- a/2016/6xxx/CVE-2016-6322.json +++ b/2016/6xxx/CVE-2016-6322.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6322", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6323.json b/2016/6xxx/CVE-2016-6323.json index aa1ab30d8a8..9b46015fd6f 100644 --- a/2016/6xxx/CVE-2016-6323.json +++ b/2016/6xxx/CVE-2016-6323.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6323", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6325.json b/2016/6xxx/CVE-2016-6325.json index d047b594c27..feb21099e66 100644 --- a/2016/6xxx/CVE-2016-6325.json +++ b/2016/6xxx/CVE-2016-6325.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6325", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6327.json b/2016/6xxx/CVE-2016-6327.json index c626ade882d..aacd8db7adc 100644 --- a/2016/6xxx/CVE-2016-6327.json +++ b/2016/6xxx/CVE-2016-6327.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6327", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6329.json b/2016/6xxx/CVE-2016-6329.json index 162232daa16..c1878536fba 100644 --- a/2016/6xxx/CVE-2016-6329.json +++ b/2016/6xxx/CVE-2016-6329.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6329", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6330.json b/2016/6xxx/CVE-2016-6330.json index 7084d9ae357..2efd989c227 100644 --- a/2016/6xxx/CVE-2016-6330.json +++ b/2016/6xxx/CVE-2016-6330.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6330", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6331.json b/2016/6xxx/CVE-2016-6331.json index 2c07ea9d435..ae268083c45 100644 --- a/2016/6xxx/CVE-2016-6331.json +++ b/2016/6xxx/CVE-2016-6331.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6331", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6332.json b/2016/6xxx/CVE-2016-6332.json index d2eb2e4ecd6..8d8bf197f78 100644 --- a/2016/6xxx/CVE-2016-6332.json +++ b/2016/6xxx/CVE-2016-6332.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6332", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6333.json b/2016/6xxx/CVE-2016-6333.json index 46144b51841..0f1f416c3f9 100644 --- a/2016/6xxx/CVE-2016-6333.json +++ b/2016/6xxx/CVE-2016-6333.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6333", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6334.json b/2016/6xxx/CVE-2016-6334.json index dde0e17e7c1..d6e3b2ceebe 100644 --- a/2016/6xxx/CVE-2016-6334.json +++ b/2016/6xxx/CVE-2016-6334.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6334", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6335.json b/2016/6xxx/CVE-2016-6335.json index 8333f776cfe..9ce4dea9c3b 100644 --- a/2016/6xxx/CVE-2016-6335.json +++ b/2016/6xxx/CVE-2016-6335.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6335", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6336.json b/2016/6xxx/CVE-2016-6336.json index 7a1841aa013..2495c06e8ac 100644 --- a/2016/6xxx/CVE-2016-6336.json +++ b/2016/6xxx/CVE-2016-6336.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6336", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6337.json b/2016/6xxx/CVE-2016-6337.json index fe89c436735..673ec0717e5 100644 --- a/2016/6xxx/CVE-2016-6337.json +++ b/2016/6xxx/CVE-2016-6337.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6337", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6338.json b/2016/6xxx/CVE-2016-6338.json index 483001eec78..9bbfeb4c435 100644 --- a/2016/6xxx/CVE-2016-6338.json +++ b/2016/6xxx/CVE-2016-6338.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6338", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6340.json b/2016/6xxx/CVE-2016-6340.json index fca8223a20f..f508b729ee3 100644 --- a/2016/6xxx/CVE-2016-6340.json +++ b/2016/6xxx/CVE-2016-6340.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6340", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6341.json b/2016/6xxx/CVE-2016-6341.json index 4e3b123b8da..a9e5229f10c 100644 --- a/2016/6xxx/CVE-2016-6341.json +++ b/2016/6xxx/CVE-2016-6341.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6341", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6342.json b/2016/6xxx/CVE-2016-6342.json index f05f2de37bf..0405c9b9540 100644 --- a/2016/6xxx/CVE-2016-6342.json +++ b/2016/6xxx/CVE-2016-6342.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6342", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6344.json b/2016/6xxx/CVE-2016-6344.json index d21ffe5057f..34e0721ce1a 100644 --- a/2016/6xxx/CVE-2016-6344.json +++ b/2016/6xxx/CVE-2016-6344.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6344", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6345.json b/2016/6xxx/CVE-2016-6345.json index a9e310264b5..3b0f2ffd783 100644 --- a/2016/6xxx/CVE-2016-6345.json +++ b/2016/6xxx/CVE-2016-6345.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6345", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6346.json b/2016/6xxx/CVE-2016-6346.json index 432f22731d0..794111ac2ff 100644 --- a/2016/6xxx/CVE-2016-6346.json +++ b/2016/6xxx/CVE-2016-6346.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6346", "STATE" : "PUBLIC" }, diff --git a/2016/6xxx/CVE-2016-6347.json b/2016/6xxx/CVE-2016-6347.json index 61fa65cf3b2..7851ed74f5b 100644 --- a/2016/6xxx/CVE-2016-6347.json +++ b/2016/6xxx/CVE-2016-6347.json @@ -1,6 +1,6 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secalert@redhat.com", "ID" : "CVE-2016-6347", "STATE" : "PUBLIC" }, diff --git a/2018/18xxx/CVE-2018-18623.json b/2018/18xxx/CVE-2018-18623.json new file mode 100644 index 00000000000..406aa5beb8c --- /dev/null +++ b/2018/18xxx/CVE-2018-18623.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18623", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18624.json b/2018/18xxx/CVE-2018-18624.json new file mode 100644 index 00000000000..e5aa8612895 --- /dev/null +++ b/2018/18xxx/CVE-2018-18624.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18624", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18625.json b/2018/18xxx/CVE-2018-18625.json new file mode 100644 index 00000000000..83e574d0b49 --- /dev/null +++ b/2018/18xxx/CVE-2018-18625.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18625", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18626.json b/2018/18xxx/CVE-2018-18626.json new file mode 100644 index 00000000000..f785ee3ad6e --- /dev/null +++ b/2018/18xxx/CVE-2018-18626.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18626", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in PHPYun V4.6. There is a vulnerability that can delete any file or directory via the \"admin/index.php?m=database&c=del\" sql parameter because del_action() in admin/model/database.class.php mishandles this parameter." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "http://str3am.me/2018/10/23/CVE_01/#more", + "refsource" : "MISC", + "url" : "http://str3am.me/2018/10/23/CVE_01/#more" + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18627.json b/2018/18xxx/CVE-2018-18627.json new file mode 100644 index 00000000000..76b79dd945f --- /dev/null +++ b/2018/18xxx/CVE-2018-18627.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18627", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +}