Docs: Remove translated nav from .jd files.
Bug: 25717633

Change-Id: Ieb8e1c8c54cf1ced9e8de27204210e689a635ad3
diff --git a/src-intl/ja_ALL/security/bulletin/2015-12-01.jd b/src-intl/ja_ALL/security/bulletin/2015-12-01.jd
index 5f9d55c..165481d 100644
--- a/src-intl/ja_ALL/security/bulletin/2015-12-01.jd
+++ b/src-intl/ja_ALL/security/bulletin/2015-12-01.jd
@@ -23,149 +23,6 @@
   </div>
 </div>
 
-<div id="jd-content">
- <div class="jd-descr" itemprop="articleBody">
-  <!--
-    Copyright 2015 The Android Open Source Project
-
-    Licensed under the Apache License, Version 2.0 (the "License");
-    you may not use this file except in compliance with the License.
-    You may obtain a copy of the License at
-
-        http://www.apache.org/licenses/LICENSE-2.0
-
-    Unless required by applicable law or agreed to in writing, software
-    distributed under the License is distributed on an "AS IS" BASIS,
-    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-    See the License for the specific language governing permissions and
-    limitations under the License.
--->
-  <div id="qv-wrapper">
-   <div id="qv">
-    <h2>
-     このドキュメントの内容
-    </h2>
-    <ol id="auto-toc">
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_summary">
-       セキュリティの脆弱性の概要
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#mitigations">
-       リスクの軽減
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#acknowledgements">
-       謝辞
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_details">
-       セキュリティの脆弱性の詳細
-      </a>
-     </li>
-     <ol>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_mediaserver">
-        メディアサーバーでのリモートコード実行の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_skia">
-        Skia でのリモートコード実行の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_in_kernel">
-        カーネルでの権限昇格
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_display_driver">
-        ディスプレイ ドライバでのリモートコード実行の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_bluetooth">
-        Bluetooth でのリモートコード実行の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerabilities_in_libstagefright">
-        libstagefright での権限昇格の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_systemui">
-        SystemUI での権限昇格の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_native_frameworks_library">
-        Native Frameworks Library での情報開示の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_wi-fi">
-        Wi-Fi での権限昇格の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server">
-        System Server での権限昇格の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerabilities_in_libstagefright">
-        libstagefright での情報開示の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_audio">
-        Audio での情報開示の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_media_framework">
-        Media Framework での情報開示の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_wi-fi">
-        Wi-Fi での情報開示の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server19">
-        System Server での権限昇格の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_systemui">
-        SystemUI での情報開示の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#common_questions_and_answers">
-        一般的な質問と回答
-       </a>
-      </li>
-     </ol>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#revisions">
-       改訂
-      </a>
-     </li>
-    </ol>
-   </div>
-  </div>
-  <p>
-   <em>
-    2015 年 12 月 7 日公開 | 2015 年 12 月 22 日更新
-   </em>
-  </p>
   <p>
    Android のセキュリティに関する月例情報公開の一環として、Nexus 端末に対するセキュリティ アップデートを無線(OTA)アップデートで配信しました。また、Nexus ファームウェア イメージも
    <a href="https://developers.google.com/android/nexus/images">
@@ -440,13 +297,9 @@
      KeenTeam
     </a>

-    <a href="https://twitter.com/k33nteam">
-     @K33nTeam
-    </a>
+    <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
     )の Flanker(
-    <a href="https://twitter.com/flanker_hqd">
-     @flanker_hqd
-    </a>
+    <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a>
     ): CVE-2015-6620
    </li>
    <li>
@@ -454,16 +307,12 @@
      Qihoo 360 Technology Co.Ltd
     </a>
     の Guang Gong(龚广)(
-    <a href="https://twitter.com/oldfresher">
-     @oldfresher
-    </a>
+    <a href="https://twitter.com/oldfresher"> @oldfresher </a>
[email protected]): CVE-2015-6626
    </li>
    <li>
     EmberMitre Ltd の Mark Carter(
-    <a href="https://twitter.com/hanpingchinese">
-     @hanpingchinese
-    </a>
+    <a href="https://twitter.com/hanpingchinese"> @hanpingchinese </a>
     ): CVE-2015-6630
    </li>
    <li>
@@ -484,17 +333,11 @@
      KeenTeam
     </a>

-    <a href="https://twitter.com/k33nteam">
-     @K33nTeam
-    </a>
+    <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
     )の Qidan He(
-    <a href="https://twitter.com/flanker_hqd">
-     @flanker_hqd
-    </a>
+    <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a>
     )と Marco Grassi(
-    <a href="https://twitter.com/marcograss">
-     @marcograss
-    </a>
+    <a href="https://twitter.com/marcograss"> @marcograss </a>
     ): CVE-2015-6622
    </li>
    <li>
@@ -502,9 +345,7 @@
    </li>
    <li>
     Fundación Dr. Manuel Sadosky(アルゼンチン、ブエノスアイレス)Programa STIC の Joaquín Rinaudo(
-    <a href="https://twitter.com/xeroxnir">
-     @xeroxnir
-    </a>
+    <a href="https://twitter.com/xeroxnir"> @xeroxnir </a>
     ): CVE-2015-6631
    </li>
   </ul>
@@ -1537,11 +1378,3 @@
     2015 年 12 月 22 日: 謝辞にクレジットを追加
    </li>
   </ul>
- </div>
- <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
-  <div class="layout-content-col col-9" style="padding-top:4px">
-  </div>
-  <div class="paging-links layout-content-col col-4">
-  </div>
- </div>
-</div>
diff --git a/src-intl/ja_ALL/security/bulletin/2016-01-01.jd b/src-intl/ja_ALL/security/bulletin/2016-01-01.jd
index 867b85c..c6888c4 100644
--- a/src-intl/ja_ALL/security/bulletin/2016-01-01.jd
+++ b/src-intl/ja_ALL/security/bulletin/2016-01-01.jd
@@ -23,129 +23,6 @@
   </div>
 </div>
 
-<div id="jd-content">
- <div class="jd-descr" itemprop="articleBody">
-  <!--
-    Copyright 2016 The Android Open Source Project
-
-    Licensed under the Apache License, Version 2.0 (the "License");
-    you may not use this file except in compliance with the License.
-    You may obtain a copy of the License at
-
-        http://www.apache.org/licenses/LICENSE-2.0
-
-    Unless required by applicable law or agreed to in writing, software
-    distributed under the License is distributed on an "AS IS" BASIS,
-    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-    See the License for the specific language governing permissions and
-    limitations under the License.
--->
-  <div id="qv-wrapper">
-   <div id="qv">
-    <h2>
-     このドキュメントの内容
-    </h2>
-    <ol id="auto-toc">
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_summary">
-       セキュリティの脆弱性の概要
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#mitigations">
-       リスクの軽減
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#acknowledgements">
-       謝辞
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_details">
-       セキュリティの脆弱性の詳細
-      </a>
-     </li>
-     <ol>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#remote_code_execution_vulnerability_in_mediaserver">
-        メディアサーバーでのリモートコード実行の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_misc-sd_driver">
-        misc-sd ドライバでの権限昇格の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_the_imagination_technologies_driver">
-        Imagination Technologies ドライバでの権限昇格の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerabilities_in_trustzone">
-        TrustZone での権限昇格の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_kernel">
-        カーネルでの権限昇格の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_bluetooth">
-        Bluetooth での権限昇格の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_kernel">
-        カーネルでの情報開示の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_setup_wizard">
-        セットアップ ウィザードでの権限昇格の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_wi-fi">
-        Wi-Fi での権限昇格の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_bouncy_castle">
-        Bouncy Castle での情報開示の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#denial_of_service_vulnerability_in_syncmanager">
-        SyncManager でのサービスの拒否の脆弱性
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#attack_surface_reduction_for_nexus_kernels">
-        Nexus カーネルの攻撃対象領域の削減
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#common_questions_and_answers">
-        一般的な質問と回答
-       </a>
-      </li>
-     </ol>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#revisions">
-       改訂
-      </a>
-     </li>
-    </ol>
-   </div>
-  </div>
-  <p>
-   <em>
-    2016 年 1 月 4 日公開 | 2016 年 1 月 6 日更新
-   </em>
-  </p>
   <p>
    Android のセキュリティに関する月例情報公開の一環として、Nexus 端末に対するセキュリティ アップデートを無線(OTA)アップデートで配信しました。また、Nexus ファームウェア イメージも
    <a href="https://developers.google.com/android/nexus/images">
@@ -367,13 +244,9 @@
    </li>
    <li>
     Tencent KEEN lab(
-    <a href="https://twitter.com/k33nteam">
-     @K33nTeam
-    </a>
+    <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
     )の Sen Nie(
-    <a href="https://twitter.com/@nforest_">
-     @nforest_
-    </a>
+    <a href="https://twitter.com/@nforest_"> @nforest_ </a>
     )と jfang: CVE-2015-6637
    </li>
    <li>
@@ -397,9 +270,7 @@
    </li>
    <li>
     Gal Beniamini(
-    <a href="https://twitter.com/@laginimaineb">
-     @laginimaineb
-    </a>
+    <a href="https://twitter.com/@laginimaineb"> @laginimaineb </a>

     <a href="http://bits-please.blogspot.com/">
      http://bits-please.blogspot.com
@@ -1094,11 +965,3 @@
     2016 年 1 月 6 日: 公開情報を改訂し AOSP リンクを追加
    </li>
   </ul>
- </div>
- <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
-  <div class="layout-content-col col-9" style="padding-top:4px">
-  </div>
-  <div class="paging-links layout-content-col col-4">
-  </div>
- </div>
-</div>
diff --git a/src-intl/ko_ALL/security/bulletin/2015-12-01.jd b/src-intl/ko_ALL/security/bulletin/2015-12-01.jd
index e77ce35..902a753 100644
--- a/src-intl/ko_ALL/security/bulletin/2015-12-01.jd
+++ b/src-intl/ko_ALL/security/bulletin/2015-12-01.jd
@@ -23,149 +23,6 @@
   </div>
 </div>
 
-<div id="jd-content">
- <div class="jd-descr" itemprop="articleBody">
-  <!--
-    Copyright 2015 The Android Open Source Project
-
-    Licensed under the Apache License, Version 2.0 (the "License");
-    you may not use this file except in compliance with the License.
-    You may obtain a copy of the License at
-
-        http://www.apache.org/licenses/LICENSE-2.0
-
-    Unless required by applicable law or agreed to in writing, software
-    distributed under the License is distributed on an "AS IS" BASIS,
-    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-    See the License for the specific language governing permissions and
-    limitations under the License.
--->
-  <div id="qv-wrapper">
-   <div id="qv">
-    <h2>
-     이 문서에서 다루는 내용
-    </h2>
-    <ol id="auto-toc">
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_summary">
-       보안 취약성 요약
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#mitigations">
-       완화
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#acknowledgements">
-       사사
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_details">
-       보안 취약성 세부정보
-      </a>
-     </li>
-     <ol>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_mediaserver">
-        미디어 서버의 원격 코드 실행 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_skia">
-        Skia의 원격 코드 실행 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_in_kernel">
-        커널의 권한 승격
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_display_driver">
-        디스플레이 드라이버의 원격 코드 실행 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_bluetooth">
-        블루투스의 원격 코드 실행 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerabilities_in_libstagefright">
-        libstagefright의 권한 승격 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_systemui">
-        SystemUI의 권한 승격 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_native_frameworks_library">
-        기본 프레임워크 라이브러리의 정보 공개 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_wi-fi">
-        Wi-Fi의 권한 승격 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server">
-        시스템 서버의 권한 승격 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerabilities_in_libstagefright">
-        libstagefright의 정보 공개 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_audio">
-        오디오의 정보 공개 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_media_framework">
-        미디어 프레임워크의 정보 공개 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_wi-fi">
-        Wi-Fi의 정보 공개 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server19">
-        시스템 서버의 권한 승격 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_systemui">
-        SystemUI의 정보 공개 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#common_questions_and_answers">
-        일반적인 질문 및 답변
-       </a>
-      </li>
-     </ol>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#revisions">
-       버전
-      </a>
-     </li>
-    </ol>
-   </div>
-  </div>
-  <p>
-   <em>
-    2015년 12월 7일 게시됨 | 2015년 12월 22일 업데이트됨
-   </em>
-  </p>
   <p>
    Google의 Android 보안 게시판 월간 출시 과정의 일환으로 무선
 업데이트를 통해 Nexus 기기에 대한 보안 업데이트가 출시되었습니다.
@@ -467,13 +324,9 @@
      KeenTeam
     </a>
     (
-    <a href="https://twitter.com/k33nteam">
-     @K33nTeam
-    </a>
+    <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
     )의 Flanker(
-    <a href="https://twitter.com/flanker_hqd">
-     @flanker_hqd
-    </a>
+    <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a>
     ): CVE-2015-6620
    </li>
    <li>
@@ -481,16 +334,12 @@
      Qihoo 360 Technology Co.Ltd
     </a>
     의 Guang Gong(龚广)(
-    <a href="https://twitter.com/oldfresher">
-     @oldfresher
-    </a>
+    <a href="https://twitter.com/oldfresher"> @oldfresher </a>
     , [email protected]): CVE-2015-6626
    </li>
    <li>
     EmberMitre Ltd의 Mark Carter(
-    <a href="https://twitter.com/hanpingchinese">
-     @hanpingchinese
-    </a>
+    <a href="https://twitter.com/hanpingchinese"> @hanpingchinese </a>
     ): CVE-2015-6630
    </li>
    <li>
@@ -511,17 +360,11 @@
      KeenTeam
     </a>
     (
-    <a href="https://twitter.com/k33nteam">
-     @K33nTeam
-    </a>
+    <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
     )의 Qidan He(
-    <a href="https://twitter.com/flanker_hqd">
-     @flanker_hqd
-    </a>
+    <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a>
     ), Marco Grassi(
-    <a href="https://twitter.com/marcograss">
-     @marcograss
-    </a>
+    <a href="https://twitter.com/marcograss"> @marcograss </a>
     ): CVE-2015-6622
    </li>
    <li>
@@ -529,9 +372,7 @@
    </li>
    <li>
     아르헨티나 부에노스아이레스 Fundación Dr. Manuel Sadosky, Programa STIC의 Joaquín Rinaudo(
-    <a href="https://twitter.com/xeroxnir">
-     @xeroxnir
-    </a>
+    <a href="https://twitter.com/xeroxnir"> @xeroxnir </a>
     ): CVE-2015-6631
    </li>
   </ul>
@@ -1630,11 +1471,3 @@
     2015년 12월 22일: 사사 섹션에 누락된 크레딧 추가됨
    </li>
   </ul>
- </div>
- <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
-  <div class="layout-content-col col-9" style="padding-top:4px">
-  </div>
-  <div class="paging-links layout-content-col col-4">
-  </div>
- </div>
-</div>
diff --git a/src-intl/ko_ALL/security/bulletin/2016-01-01.jd b/src-intl/ko_ALL/security/bulletin/2016-01-01.jd
index 931b68c..07574ab 100644
--- a/src-intl/ko_ALL/security/bulletin/2016-01-01.jd
+++ b/src-intl/ko_ALL/security/bulletin/2016-01-01.jd
@@ -23,129 +23,6 @@
   </div>
 </div>
 
-<div id="jd-content">
- <div class="jd-descr" itemprop="articleBody">
-  <!--
-    Copyright 2016 The Android Open Source Project
-
-    Licensed under the Apache License, Version 2.0 (the "License");
-    you may not use this file except in compliance with the License.
-    You may obtain a copy of the License at
-
-        http://www.apache.org/licenses/LICENSE-2.0
-
-    Unless required by applicable law or agreed to in writing, software
-    distributed under the License is distributed on an "AS IS" BASIS,
-    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-    See the License for the specific language governing permissions and
-    limitations under the License.
--->
-  <div id="qv-wrapper">
-   <div id="qv">
-    <h2>
-     이 문서에서 다루는 내용
-    </h2>
-    <ol id="auto-toc">
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_summary">
-       보안 취약성 요약
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#mitigations">
-       완화
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#acknowledgements">
-       사사
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_details">
-       보안 취약성 세부정보
-      </a>
-     </li>
-     <ol>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#remote_code_execution_vulnerability_in_mediaserver">
-        미디어 서버의 원격 코드 실행 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_misc-sd_driver">
-        misc-sd 드라이버의 권한 승격 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_the_imagination_technologies_driver">
-        Imagination Technologies 드라이버의 권한 승격 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerabilities_in_trustzone">
-        Trustzone의 권한 승격 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_kernel">
-        커널의 권한 승격 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_bluetooth">
-        블루투스의 권한 승격 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_kernel">
-        커널의 정보 공개 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_setup_wizard">
-        설치 마법사의 권한 승격 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_wi-fi">
-        Wi-Fi의 권한 승격 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_bouncy_castle">
-        Bouncy Castle의 정보 공개 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#denial_of_service_vulnerability_in_syncmanager">
-        SyncManager의 서비스 거부(DoS) 취약성
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#attack_surface_reduction_for_nexus_kernels">
-        Nexus 커널의 공격 범위 축소
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#common_questions_and_answers">
-        일반적인 질문 및 답변
-       </a>
-      </li>
-     </ol>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#revisions">
-       버전
-      </a>
-     </li>
-    </ol>
-   </div>
-  </div>
-  <p>
-   <em>
-    2016년 1월 4일 게시됨 | 2016년 1월 6일 업데이트됨
-   </em>
-  </p>
   <p>
    Google의 Android 보안 게시판 월간 출시 과정의 일환으로 무선
 업데이트를 통해 Nexus 기기에 대한 보안 업데이트가 출시되었습니다.
@@ -392,13 +269,9 @@
    </li>
    <li>
     KEEN lab, Tencent(
-    <a href="https://twitter.com/k33nteam">
-     @K33nTeam
-    </a>
+    <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
     )의 Sen Nie(
-    <a href="https://twitter.com/@nforest_">
-     @nforest_
-    </a>
+    <a href="https://twitter.com/@nforest_"> @nforest_ </a>
     ), jfang: CVE-2015-6637
    </li>
    <li>
@@ -422,9 +295,7 @@
    </li>
    <li>
     Gal Beniamini(
-    <a href="https://twitter.com/@laginimaineb">
-     @laginimaineb
-    </a>
+    <a href="https://twitter.com/@laginimaineb"> @laginimaineb </a>
     ,
     <a href="http://bits-please.blogspot.com/">
      http://bits-please.blogspot.com
@@ -1167,11 +1038,3 @@
     2016년 1월 6일: 게시판이 수정되어 AOSP 링크 포함됨
    </li>
   </ul>
- </div>
- <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
-  <div class="layout-content-col col-9" style="padding-top:4px">
-  </div>
-  <div class="paging-links layout-content-col col-4">
-  </div>
- </div>
-</div>
diff --git a/src-intl/ru_ALL/security/bulletin/2015-12-01.jd b/src-intl/ru_ALL/security/bulletin/2015-12-01.jd
index d6cc714..a1e0eff 100644
--- a/src-intl/ru_ALL/security/bulletin/2015-12-01.jd
+++ b/src-intl/ru_ALL/security/bulletin/2015-12-01.jd
@@ -23,149 +23,6 @@
   </div>
 </div>
 
-<div id="jd-content">
- <div class="jd-descr" itemprop="articleBody">
-  <!--
-    Copyright 2015 The Android Open Source Project
-
-    Licensed under the Apache License, Version 2.0 (the "License");
-    you may not use this file except in compliance with the License.
-    You may obtain a copy of the License at
-
-        http://www.apache.org/licenses/LICENSE-2.0
-
-    Unless required by applicable law or agreed to in writing, software
-    distributed under the License is distributed on an "AS IS" BASIS,
-    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-    See the License for the specific language governing permissions and
-    limitations under the License.
--->
-  <div id="qv-wrapper">
-   <div id="qv">
-    <h2>
-     В этом документе
-    </h2>
-    <ol id="auto-toc">
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_summary">
-       Перечень уязвимостей
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#mitigations">
-       Предотвращение атак
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#acknowledgements">
-       Благодарности
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_details">
-       Описание уязвимостей
-      </a>
-     </li>
-     <ol>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_mediaserver">
-        Удаленное выполнение кода через mediaserver
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_skia">
-        Удаленное выполнение кода через Skia
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_in_kernel">
-        Повышение привилегий через ядро
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_display_driver">
-        Удаленное выполнение кода через драйверы экрана
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_bluetooth">
-        Удаленное выполнение кода через Bluetooth
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerabilities_in_libstagefright">
-        Повышение привилегий через libstagefright
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_systemui">
-        Повышение привилегий через SystemUI
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_native_frameworks_library">
-        Раскрытие информации через библиотеку фреймворков Android
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_wi-fi">
-        Повышение привилегий через Wi-Fi
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server">
-        Повышение привилегий через SystemServer
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerabilities_in_libstagefright">
-        Раскрытие информации через libstagefright
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_audio">
-        Раскрытие информации через Audio
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_media_framework">
-        Раскрытие информации через Media Framework
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_wi-fi">
-        Раскрытие информации через Wi-Fi
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server19">
-        Повышение привилегий через SystemServer
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_systemui">
-        Раскрытие информации через SystemUI
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#common_questions_and_answers">
-        Часто задаваемые вопросы
-       </a>
-      </li>
-     </ol>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#revisions">
-       Версии
-      </a>
-     </li>
-    </ol>
-   </div>
-  </div>
-  <p>
-   <em>
-    Опубликовано 7 декабря 2015 г. | Обновлено 22 декабря 2015 г.
-   </em>
-  </p>
   <p>
    К выходу ежемесячного бюллетеня о безопасности Android мы выпустили
 автоматическое обновление системы безопасности для устройств Nexus
@@ -466,24 +323,18 @@
    </li>
    <li>
     Флэнкер (
-    <a href="https://twitter.com/flanker_hqd">
-     @flanker_hqd
-    </a>
+    <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a>
     ) из
     <a href="http://k33nteam.org/">
      KeenTeam
     </a>
     (
-    <a href="https://twitter.com/k33nteam">
-     @K33nTeam
-    </a>
+    <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
     ): CVE-2015-6620.
    </li>
    <li>
     Гуан Гун (龚广) (
-    <a href="https://twitter.com/oldfresher">
-     @oldfresher
-    </a>
+    <a href="https://twitter.com/oldfresher"> @oldfresher </a>
     , [email protected]) из
     <a href="http://www.360.cn/">
      Qihoo 360
@@ -493,9 +344,7 @@
    </li>
    <li>
     Марк Картер (
-    <a href="https://twitter.com/hanpingchinese">
-     @hanpingchinese
-    </a>
+    <a href="https://twitter.com/hanpingchinese"> @hanpingchinese </a>
     ) из EmberMitre Ltd: CVE-2015-6630.
    </li>
    <li>
@@ -513,21 +362,15 @@
    </li>
    <li>
     Цидань Хэ (
-    <a href="https://twitter.com/flanker_hqd">
-     @flanker_hqd
-    </a>
+    <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a>
     ) и Марко Грасси (
-    <a href="https://twitter.com/marcograss">
-     @marcograss
-    </a>
+    <a href="https://twitter.com/marcograss"> @marcograss </a>
     ) из
     <a href="http://k33nteam.org/">
      KeenTeam
     </a>
     (
-    <a href="https://twitter.com/k33nteam">
-     @K33nTeam
-    </a>
+    <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
     ): CVE-2015-6622.
    </li>
    <li>
@@ -535,9 +378,7 @@
    </li>
    <li>
     Жуакин Ринауду (
-    <a href="https://twitter.com/xeroxnir">
-     @xeroxnir
-    </a>
+    <a href="https://twitter.com/xeroxnir"> @xeroxnir </a>
     ), участник Программы безопасности ИКТ
 Фонда доктора Мануэля Садоски, Буэнос-Айрес, Аргентина: CVE-2015-6631.
    </li>
@@ -1652,11 +1493,3 @@
     22 декабря 2015 года. Добавлены благодарности.
    </li>
   </ul>
- </div>
- <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
-  <div class="layout-content-col col-9" style="padding-top:4px">
-  </div>
-  <div class="paging-links layout-content-col col-4">
-  </div>
- </div>
-</div>
diff --git a/src-intl/ru_ALL/security/bulletin/2016-01-01.jd b/src-intl/ru_ALL/security/bulletin/2016-01-01.jd
index 4c9bd5f..8df5320 100644
--- a/src-intl/ru_ALL/security/bulletin/2016-01-01.jd
+++ b/src-intl/ru_ALL/security/bulletin/2016-01-01.jd
@@ -23,129 +23,6 @@
   </div>
 </div>
 
-<div id="jd-content">
- <div class="jd-descr" itemprop="articleBody">
-  <!--
-    Copyright 2016 The Android Open Source Project
-
-    Licensed under the Apache License, Version 2.0 (the "License");
-    you may not use this file except in compliance with the License.
-    You may obtain a copy of the License at
-
-        http://www.apache.org/licenses/LICENSE-2.0
-
-    Unless required by applicable law or agreed to in writing, software
-    distributed under the License is distributed on an "AS IS" BASIS,
-    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-    See the License for the specific language governing permissions and
-    limitations under the License.
--->
-  <div id="qv-wrapper">
-   <div id="qv">
-    <h2>
-     В этом документе
-    </h2>
-    <ol id="auto-toc">
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_summary">
-       Перечень уязвимостей
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#mitigations">
-       Предотвращение атак
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#acknowledgements">
-       Благодарности
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_details">
-       Описание уязвимостей
-      </a>
-     </li>
-     <ol>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#remote_code_execution_vulnerability_in_mediaserver">
-        Удаленное выполнение кода через mediaserver
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_misc-sd_driver">
-        Повышение привилегий через драйвер misc-sd
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_the_imagination_technologies_driver">
-        Повышение привилегий через драйвер Imagination Technologies
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerabilities_in_trustzone">
-        Повышение привилегий через Trustzone
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_kernel">
-        Повышение привилегий через ядро
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_bluetooth">
-        Повышение привилегий через Bluetooth
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_kernel">
-        Раскрытие информации через ядро
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_setup_wizard">
-        Повышение привилегий через мастер настройки
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_wi-fi">
-        Повышение привилегий через Wi-Fi
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_bouncy_castle">
-        Раскрытие информации через Bouncy Castle
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#denial_of_service_vulnerability_in_syncmanager">
-        Отказ в обслуживании в SyncManager
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#attack_surface_reduction_for_nexus_kernels">
-        Снижение вероятности атаки в ядрах устройств Nexus
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#common_questions_and_answers">
-        Часто задаваемые вопросы
-       </a>
-      </li>
-     </ol>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#revisions">
-       Версии
-      </a>
-     </li>
-    </ol>
-   </div>
-  </div>
-  <p>
-   <em>
-    Опубликовано 4 января 2016 г. | Обновлено 6 января 2016 г.
-   </em>
-  </p>
   <p>
    К выходу ежемесячного бюллетеня о безопасности Android мы выпустили
 автоматическое обновление системы безопасности для устройств Nexus
@@ -395,13 +272,9 @@
    </li>
    <li>
     Сен Ние (
-    <a href="https://twitter.com/@nforest_">
-     @nforest_
-    </a>
+    <a href="https://twitter.com/@nforest_"> @nforest_ </a>
     ) и jfang из KEEN lab, Tencent (
-    <a href="https://twitter.com/k33nteam">
-     @K33nTeam
-    </a>
+    <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
     ):
 CVE-2015-6637.
    </li>
@@ -426,9 +299,7 @@
    </li>
    <li>
     Гэл Бениамини (
-    <a href="https://twitter.com/@laginimaineb">
-     @laginimaineb
-    </a>
+    <a href="https://twitter.com/@laginimaineb"> @laginimaineb </a>
     ,
     <a href="http://bits-please.blogspot.com/">
      http://bits-please.blogspot.com
@@ -1191,11 +1062,3 @@
     6 января 2016 года. Добавлены ссылки на AOSP.
    </li>
   </ul>
- </div>
- <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
-  <div class="layout-content-col col-9" style="padding-top:4px">
-  </div>
-  <div class="paging-links layout-content-col col-4">
-  </div>
- </div>
-</div>
diff --git a/src-intl/zh-CN_ALL/security/bulletin/2015-12-01.jd b/src-intl/zh-CN_ALL/security/bulletin/2015-12-01.jd
index 19fd79b..3a05773 100644
--- a/src-intl/zh-CN_ALL/security/bulletin/2015-12-01.jd
+++ b/src-intl/zh-CN_ALL/security/bulletin/2015-12-01.jd
@@ -23,149 +23,6 @@
   </div>
 </div>
 
-<div id="jd-content">
- <div class="jd-descr" itemprop="articleBody">
-  <!--
-    Copyright 2015 The Android Open Source Project
-
-    Licensed under the Apache License, Version 2.0 (the "License");
-    you may not use this file except in compliance with the License.
-    You may obtain a copy of the License at
-
-        http://www.apache.org/licenses/LICENSE-2.0
-
-    Unless required by applicable law or agreed to in writing, software
-    distributed under the License is distributed on an "AS IS" BASIS,
-    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-    See the License for the specific language governing permissions and
-    limitations under the License.
--->
-  <div id="qv-wrapper">
-   <div id="qv">
-    <h2>
-     本文内容
-    </h2>
-    <ol id="auto-toc">
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_summary">
-       安全漏洞摘要
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#mitigations">
-       缓解措施
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#acknowledgements">
-       致谢
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_details">
-       安全漏洞详情
-      </a>
-     </li>
-     <ol>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_mediaserver">
-        Mediaserver 中的远程代码执行漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_skia">
-        Skia 中的远程代码执行漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_in_kernel">
-        内核中的提权漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_display_driver">
-        显卡驱动程序中的远程代码执行漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_bluetooth">
-        蓝牙中的远程代码执行漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerabilities_in_libstagefright">
-        libstagefright 中的提权漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_systemui">
-        SystemUI 中的提权漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_native_frameworks_library">
-        Native Frameworks Library 中的信息披露漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_wi-fi">
-        WLAN 中的提权漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server">
-        系统服务器中的提权漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerabilities_in_libstagefright">
-        libstagefright 中的信息披露漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_audio">
-        音频中的信息披露漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_media_framework">
-        媒体框架中的信息披露漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_wi-fi">
-        WLAN 中的信息披露漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server19">
-        系统服务器中的提权漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_systemui">
-        SystemUI 中的信息披露漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#common_questions_and_answers">
-        常见问题和解答
-       </a>
-      </li>
-     </ol>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#revisions">
-       修订版本
-      </a>
-     </li>
-    </ol>
-   </div>
-  </div>
-  <p>
-   <em>
-    发布时间:2015 年 12 月 7 日 | 更新时间:2015 年 12 月 22 日
-   </em>
-  </p>
   <p>
    在每月发布 Android 安全公告的过程中,我们都会通过无线 (OTA) 更新的方式发布针对 Nexus 设备的安全更新。我们还会在
    <a href="https://developers.google.com/android/nexus/images">
@@ -440,13 +297,9 @@
      碁震安全研究团队
     </a>
     (
-    <a href="https://twitter.com/k33nteam">
-     @K33nTeam
-    </a>
+    <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
     ) 的 Flanker (
-    <a href="https://twitter.com/flanker_hqd">
-     @flanker_hqd
-    </a>
+    <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a>
     ):CVE-2015-6620
    </li>
    <li>
@@ -454,16 +307,12 @@
      奇虎 360 科技有限公司
     </a>
     的龚广(
-    <a href="https://twitter.com/oldfresher">
-     @oldfresher
-    </a>
+    <a href="https://twitter.com/oldfresher"> @oldfresher </a>
[email protected]):CVE-2015-6626
    </li>
    <li>
     EmberMitre Ltd 的 Mark Carter (
-    <a href="https://twitter.com/hanpingchinese">
-     @hanpingchinese
-    </a>
+    <a href="https://twitter.com/hanpingchinese"> @hanpingchinese </a>
     ):CVE-2015-6630
    </li>
    <li>
@@ -484,17 +333,11 @@
      碁震安全研究团队
     </a>
     (
-    <a href="https://twitter.com/k33nteam">
-     @K33nTeam
-    </a>
+    <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
     ) 的 Qidan He (
-    <a href="https://twitter.com/flanker_hqd">
-     @flanker_hqd
-    </a>
+    <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a>
     ) 和 Marco Grassi (
-    <a href="https://twitter.com/marcograss">
-     @marcograss
-    </a>
+    <a href="https://twitter.com/marcograss"> @marcograss </a>
     ):CVE-2015-6622
    </li>
    <li>
@@ -502,9 +345,7 @@
    </li>
    <li>
     阿根廷布宜诺斯艾利斯 Dr. Manuel Sadosky 基金会 Programa STIC 的 Joaquín Rinaudo (
-    <a href="https://twitter.com/xeroxnir">
-     @xeroxnir
-    </a>
+    <a href="https://twitter.com/xeroxnir"> @xeroxnir </a>
     ):CVE-2015-6631
    </li>
   </ul>
@@ -1537,11 +1378,3 @@
     2015 年 12 月 22 日:在“致谢”部分新添了遗漏的内容。
    </li>
   </ul>
- </div>
- <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
-  <div class="layout-content-col col-9" style="padding-top:4px">
-  </div>
-  <div class="paging-links layout-content-col col-4">
-  </div>
- </div>
-</div>
diff --git a/src-intl/zh-CN_ALL/security/bulletin/2016-01-01.jd b/src-intl/zh-CN_ALL/security/bulletin/2016-01-01.jd
index 158bbc8..c00c665 100644
--- a/src-intl/zh-CN_ALL/security/bulletin/2016-01-01.jd
+++ b/src-intl/zh-CN_ALL/security/bulletin/2016-01-01.jd
@@ -16,6 +16,7 @@
     See the License for the specific language governing permissions and
     limitations under the License.
 -->
+
 <div id="qv-wrapper">
   <div id="qv">
     <ol id="auto-toc">
@@ -23,129 +24,6 @@
   </div>
 </div>
 
-<div id="jd-content">
- <div class="jd-descr" itemprop="articleBody">
-  <!--
-    Copyright 2016 The Android Open Source Project
-
-    Licensed under the Apache License, Version 2.0 (the "License");
-    you may not use this file except in compliance with the License.
-    You may obtain a copy of the License at
-
-        http://www.apache.org/licenses/LICENSE-2.0
-
-    Unless required by applicable law or agreed to in writing, software
-    distributed under the License is distributed on an "AS IS" BASIS,
-    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-    See the License for the specific language governing permissions and
-    limitations under the License.
--->
-  <div id="qv-wrapper">
-   <div id="qv">
-    <h2>
-     本文内容
-    </h2>
-    <ol id="auto-toc">
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_summary">
-       安全漏洞摘要
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#mitigations">
-       缓解措施
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#acknowledgements">
-       致谢
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_details">
-       安全漏洞详情
-      </a>
-     </li>
-     <ol>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#remote_code_execution_vulnerability_in_mediaserver">
-        Mediaserver 中的远程代码执行漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_misc-sd_driver">
-        misc-sd 驱动程序中的提权漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_the_imagination_technologies_driver">
-        Imagination Technologies 驱动程序中的提权漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerabilities_in_trustzone">
-        TrustZone 中的提权漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_kernel">
-        内核中的提权漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_bluetooth">
-        蓝牙中的提权漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_kernel">
-        内核中的信息披露漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_setup_wizard">
-        设置向导中的提权漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_wi-fi">
-        WLAN 中的提权漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_bouncy_castle">
-        Bouncy Castle 中的信息披露漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#denial_of_service_vulnerability_in_syncmanager">
-        SyncManager 中的拒绝服务漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#attack_surface_reduction_for_nexus_kernels">
-        减少 Nexus 内核的受攻击面
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#common_questions_and_answers">
-        常见问题和解答
-       </a>
-      </li>
-     </ol>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#revisions">
-       修订版本
-      </a>
-     </li>
-    </ol>
-   </div>
-  </div>
-  <p>
-   <em>
-    发布时间:2016 年 1 月 4 日 | 更新时间:2016 年 1 月 6 日
-   </em>
-  </p>
   <p>
    在每月发布 Android 安全公告的过程中,我们都会通过无线 (OTA) 更新的方式发布针对 Nexus 设备的安全更新。我们还会在
    <a href="https://developers.google.com/android/nexus/images">
@@ -367,13 +245,9 @@
    </li>
    <li>
     腾讯 KEEN 实验室 (
-    <a href="https://twitter.com/k33nteam">
-     @K33nTeam
-    </a>
+    <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
     ) 的 Sen Nie (
-    <a href="https://twitter.com/@nforest_">
-     @nforest_
-    </a>
+    <a href="https://twitter.com/@nforest_"> @nforest_ </a>
     ) 和 jfang:CVE-2015-6637
    </li>
    <li>
@@ -397,9 +271,7 @@
    </li>
    <li>
     Gal Beniamini (
-    <a href="https://twitter.com/@laginimaineb">
-     @laginimaineb
-    </a>
+    <a href="https://twitter.com/@laginimaineb"> @laginimaineb </a>

     <a href="http://bits-please.blogspot.com/">
      http://bits-please.blogspot.com
@@ -1094,11 +966,3 @@
     2016 年 1 月 6 日:修订了公告,添加 AOSP 链接。
    </li>
   </ul>
- </div>
- <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
-  <div class="layout-content-col col-9" style="padding-top:4px">
-  </div>
-  <div class="paging-links layout-content-col col-4">
-  </div>
- </div>
-</div>
diff --git a/src-intl/zh-TW_ALL/security/bulletin/2015-12-01.jd b/src-intl/zh-TW_ALL/security/bulletin/2015-12-01.jd
index d4dc03d..e05b38c 100644
--- a/src-intl/zh-TW_ALL/security/bulletin/2015-12-01.jd
+++ b/src-intl/zh-TW_ALL/security/bulletin/2015-12-01.jd
@@ -23,149 +23,6 @@
   </div>
 </div>
 
-<div id="jd-content">
- <div class="jd-descr" itemprop="articleBody">
-  <!--
-    Copyright 2015 The Android Open Source Project
-
-    Licensed under the Apache License, Version 2.0 (the "License");
-    you may not use this file except in compliance with the License.
-    You may obtain a copy of the License at
-
-        http://www.apache.org/licenses/LICENSE-2.0
-
-    Unless required by applicable law or agreed to in writing, software
-    distributed under the License is distributed on an "AS IS" BASIS,
-    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-    See the License for the specific language governing permissions and
-    limitations under the License.
--->
-  <div id="qv-wrapper">
-   <div id="qv">
-    <h2>
-     本文內容
-    </h2>
-    <ol id="auto-toc">
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_summary">
-       安全性漏洞摘要
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#mitigations">
-       因應措施
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#acknowledgements">
-       特別銘謝
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#security_vulnerability_details">
-       安全性漏洞詳情
-      </a>
-     </li>
-     <ol>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_mediaserver">
-        媒體伺服器中的遠端程式碼執行漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_skia">
-        Skia 中的遠端程式碼執行漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_in_kernel">
-        核心中的權限升級漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerabilities_in_display_driver">
-        顯示器驅動程式中的遠端程式碼執行漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#remote_code_execution_vulnerability_in_bluetooth">
-        藍牙中的遠端程式碼執行漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerabilities_in_libstagefright">
-        libstagefright 中的權限升級漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_systemui">
-        SystemUI 中的權限升級漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_native_frameworks_library">
-        原生架構程式庫中的資訊外洩漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_wi-fi">
-        Wi-Fi 中的權限升級漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server">
-        系統伺服器中的權限升級漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerabilities_in_libstagefright">
-        libstagefright 中的資訊外洩漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_audio">
-        音訊中的資訊外洩漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_media_framework">
-        媒體架構中的資訊外洩漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_wi-fi">
-        Wi-Fi 中的資訊外洩漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#elevation_of_privilege_vulnerability_in_system_server19">
-        系統伺服器中的權限升級漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#information_disclosure_vulnerability_in_systemui">
-        SystemUI 中的資訊外洩漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2015-12-01.html#common_questions_and_answers">
-        常見問題與解答
-       </a>
-      </li>
-     </ol>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2015-12-01.html#revisions">
-       修訂版本
-      </a>
-     </li>
-    </ol>
-   </div>
-  </div>
-  <p>
-   <em>
-    發佈日期:2015 年 12 月 7 日 | 更新日期:2015 年 12 月 22 日
-   </em>
-  </p>
   <p>
    Google 已透過 Android 安全性公佈欄每月公告程序中的無線 (OTA) 更新,
 發佈 Nexus 裝置的安全性更新。
@@ -462,13 +319,9 @@
      KeenTeam
     </a>
     (
-    <a href="https://twitter.com/k33nteam">
-     @K33nTeam
-    </a>
+    <a href="https://twitter.com/k33nteam">@K33nTeam </a>
     ) 的 Flanker (
-    <a href="https://twitter.com/flanker_hqd">
-     @flanker_hqd
-    </a>
+    <a href="https://twitter.com/flanker_hqd"> @flanker_hqd </a>
     ):CVE-2015-6620
    </li>
    <li>
@@ -476,17 +329,12 @@
      奇虎 360 科技有限公司
     </a>
     的 Guang Gong (龔廣) (
-    <a href="https://twitter.com/oldfresher">
-     @oldfresher
-    </a>
+    <a href="https://twitter.com/oldfresher">@oldfresher </a>
[email protected]):CVE-2015-6626
    </li>
    <li>
     EmberMitre Ltd 的 Mark Carter (
-    <a href="https://twitter.com/hanpingchinese">
-     @hanpingchinese
-    </a>
-    ):CVE-2015-6630
+    <a href="https://twitter.com/hanpingchinese">@hanpingchinese </a>):CVE-2015-6630
    </li>
    <li>
     Michał Bednarski (
@@ -506,17 +354,11 @@
      KeenTeam
     </a>
     (
-    <a href="https://twitter.com/k33nteam">
-     @K33nTeam
-    </a>
+    <a href="https://twitter.com/k33nteam">@K33nTeam</a>
     ) 的 Qidan He (
-    <a href="https://twitter.com/flanker_hqd">
-     @flanker_hqd
-    </a>
+    <a href="https://twitter.com/flanker_hqd">@flanker_hqd</a>
     ) 和 Marco Grassi (
-    <a href="https://twitter.com/marcograss">
-     @marcograss
-    </a>
+    <a href="https://twitter.com/marcograss">@marcograss</a>
     ):CVE-2015-6622
    </li>
    <li>
@@ -525,9 +367,7 @@
    <li>
     阿根廷布宜諾斯艾利斯 Dr. Manuel Sadosky 基金會
  Programa STIC 的 Joaquín Rinaudo (
-    <a href="https://twitter.com/xeroxnir">
-     @xeroxnir
-    </a>
+    <a href="https://twitter.com/xeroxnir"> @xeroxnir </a>
     ):CVE-2015-6631
    </li>
   </ul>
@@ -1635,11 +1475,3 @@
     2015 年 12 月 22 日:在「特別銘謝」部分新增遺漏的銘謝對象。
    </li>
   </ul>
- </div>
- <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
-  <div class="layout-content-col col-9" style="padding-top:4px">
-  </div>
-  <div class="paging-links layout-content-col col-4">
-  </div>
- </div>
-</div>
diff --git a/src-intl/zh-TW_ALL/security/bulletin/2016-01-01.jd b/src-intl/zh-TW_ALL/security/bulletin/2016-01-01.jd
index 4bd8f71..9d09d4c 100644
--- a/src-intl/zh-TW_ALL/security/bulletin/2016-01-01.jd
+++ b/src-intl/zh-TW_ALL/security/bulletin/2016-01-01.jd
@@ -23,129 +23,6 @@
   </div>
 </div>
 
-<div id="jd-content">
- <div class="jd-descr" itemprop="articleBody">
-  <!--
-    Copyright 2016 The Android Open Source Project
-
-    Licensed under the Apache License, Version 2.0 (the "License");
-    you may not use this file except in compliance with the License.
-    You may obtain a copy of the License at
-
-        http://www.apache.org/licenses/LICENSE-2.0
-
-    Unless required by applicable law or agreed to in writing, software
-    distributed under the License is distributed on an "AS IS" BASIS,
-    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-    See the License for the specific language governing permissions and
-    limitations under the License.
--->
-  <div id="qv-wrapper">
-   <div id="qv">
-    <h2>
-     本文內容
-    </h2>
-    <ol id="auto-toc">
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_summary">
-       安全性漏洞摘要
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#mitigations">
-       因應措施
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#acknowledgements">
-       特別銘謝
-      </a>
-     </li>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#security_vulnerability_details">
-       安全性漏洞詳情
-      </a>
-     </li>
-     <ol>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#remote_code_execution_vulnerability_in_mediaserver">
-        媒體伺服器中的遠端程式碼執行漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_misc-sd_driver">
-        misc-sd 驅動程式中的權限升級漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_the_imagination_technologies_driver">
-        Imagination Technologies 驅動程式中的權限升級漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerabilities_in_trustzone">
-        Trustzone 中的權限升級漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_kernel">
-        核心中的權限升級漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_bluetooth">
-        藍牙中的權限升級漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_kernel">
-        核心中的資訊外洩漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_setup_wizard">
-        設定精靈中的權限升級漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#elevation_of_privilege_vulnerability_in_wi-fi">
-        Wi-Fi 中的權限升級漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#information_disclosure_vulnerability_in_bouncy_castle">
-        Bouncy Castle 中的資訊外洩漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#denial_of_service_vulnerability_in_syncmanager">
-        SyncManager 中的拒絕服務漏洞
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#attack_surface_reduction_for_nexus_kernels">
-        縮減 Nexus 核心的受攻擊面
-       </a>
-      </li>
-      <li>
-       <a href="http://source.android.com/security/bulletin/2016-01-01.html#common_questions_and_answers">
-        常見問題與解答
-       </a>
-      </li>
-     </ol>
-     <li>
-      <a href="http://source.android.com/security/bulletin/2016-01-01.html#revisions">
-       修訂版本
-      </a>
-     </li>
-    </ol>
-   </div>
-  </div>
-  <p>
-   <em>
-    發佈日期:2016 年 1 月 4 日 | 更新日期:2016 年 1 月 6 日
-   </em>
-  </p>
   <p>
    Google 已透過 Android 安全性公佈欄每月公告程序中的無線 (OTA) 更新,
 發佈 Nexus 裝置的安全性更新。
@@ -390,13 +267,9 @@
    </li>
    <li>
     騰訊 (
-    <a href="https://twitter.com/k33nteam">
-     @K33nTeam
-    </a>
+    <a href="https://twitter.com/k33nteam"> @K33nTeam </a>
     ) KEEN 實驗室的 Sen Nie (
-    <a href="https://twitter.com/@nforest_">
-     @nforest_
-    </a>
+    <a href="https://twitter.com/@nforest_"> @nforest_ </a>
     ) 和 jfang:CVE-2015-6637
    </li>
    <li>
@@ -420,9 +293,7 @@
    </li>
    <li>
     Gal Beniamini (
-    <a href="https://twitter.com/@laginimaineb">
-     @laginimaineb
-    </a>
+    <a href="https://twitter.com/@laginimaineb"> @laginimaineb </a>

     <a href="http://bits-please.blogspot.com/">
      http://bits-please.blogspot.com
@@ -1183,11 +1054,3 @@
     2016 年 1 月 6 日:修訂公告,加入 AOSP 連結。
    </li>
   </ul>
- </div>
- <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
-  <div class="layout-content-col col-9" style="padding-top:4px">
-  </div>
-  <div class="paging-links layout-content-col col-4">
-  </div>
- </div>
-</div>
diff --git a/src/security/bulletin/index.jd b/src/security/bulletin/index.jd
index 687fb6b..d25a99c 100644
--- a/src/security/bulletin/index.jd
+++ b/src/security/bulletin/index.jd
@@ -60,14 +60,23 @@
  <tr>
     <td><a href="2016-01-01.html">January 2016</a></td>
     <td>
-    Coming soon
+      <a href="{@docRoot}intl/ja_ALL/security/bulletin/2016-01-01.html">日本語</a>&nbsp;/
+      <a href="{@docRoot}intl/ko_ALL/security/bulletin/2016-01-01.html">한국어</a>&nbsp;/
+      <a href="{@docRoot}intl/ru_ALL/security/bulletin/2016-01-01.html">ru</a>&nbsp;/<br />
+      <a href="{@docRoot}intl/zh-CN_ALL/security/bulletin/2016-01-01.html">中文&nbsp;(中国)</a>&nbsp;/
+      <a href="{@docRoot}intl/zh-TW_ALL/security/bulletin/2016-01-01.html">中文&nbsp;(台灣)</a>
     </td>
     <td>January 4, 2016</td>
     <td>January 1, 2016: [2016-01-01]</td>
  </tr>
  <tr>
     <td><a href="2015-12-01.html">December 2015</a></td>
-    <td>Coming soon
+    <td>
+      <a href="{@docRoot}intl/ja_ALL/security/bulletin/2015-12-01.html">日本語</a>&nbsp;/
+      <a href="{@docRoot}intl/ko_ALL/security/bulletin/2015-12-01.html">한국어</a>&nbsp;/
+      <a href="{@docRoot}intl/ru_ALL/security/bulletin/2015-12-01.html">ru</a>&nbsp;/<br />
+      <a href="{@docRoot}intl/zh-CN_ALL/security/bulletin/2015-12-01.html">中文&nbsp;(中国)</a>&nbsp;/
+      <a href="{@docRoot}intl/zh-TW_ALL/security/bulletin/2015-12-01.html">中文&nbsp;(台灣)</a>
     </td>
     <td>December 7, 2015</td>
     <td>December 1, 2015: [2015-12-01]</td>