Added |
CVSS V3.1 |
|
NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
Added |
CWE |
|
NIST CWE-787
|
Removed |
CWE |
NIST CWE-119
|
|
Changed |
CPE Configuration |
OR
*cpe:2.3:o:microsoft:windows_2003_server:*:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*
|
OR
*cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
*cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
*cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
|
Changed |
Reference Type |
http://isc.sans.edu/diary.html?storyid=9988 No Types Assigned
|
http://isc.sans.edu/diary.html?storyid=9988 Exploit, Issue Tracking
|
Changed |
Reference Type |
http://nakedsecurity.sophos.com/2010/11/25/new-windows-zero-day-flaw-bypasses-uac/ No Types Assigned
|
http://nakedsecurity.sophos.com/2010/11/25/new-windows-zero-day-flaw-bypasses-uac/ Broken Link
|
Changed |
Reference Type |
http://secunia.com/advisories/42356 Vendor Advisory
|
http://secunia.com/advisories/42356 Broken Link, Vendor Advisory
|
Changed |
Reference Type |
http://support.avaya.com/css/P8/documents/100127248 No Types Assigned
|
http://support.avaya.com/css/P8/documents/100127248 Third Party Advisory
|
Changed |
Reference Type |
http://twitter.com/msftsecresponse/statuses/7590788200402945 No Types Assigned
|
http://twitter.com/msftsecresponse/statuses/7590788200402945 Not Applicable
|
Changed |
Reference Type |
http://www.exploit-db.com/bypassing-uac-with-user-privilege-under-windows-vista7-mirror/ Exploit
|
http://www.exploit-db.com/bypassing-uac-with-user-privilege-under-windows-vista7-mirror/ Broken Link, Exploit, Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
http://www.exploit-db.com/exploits/15609/ Exploit
|
http://www.exploit-db.com/exploits/15609/ Exploit, Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
http://www.kb.cert.org/vuls/id/529673 US Government Resource
|
http://www.kb.cert.org/vuls/id/529673 Third Party Advisory, US Government Resource
|
Changed |
Reference Type |
http://www.securityfocus.com/bid/45045 No Types Assigned
|
http://www.securityfocus.com/bid/45045 Broken Link, Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
http://www.securitytracker.com/id?1025046 No Types Assigned
|
http://www.securitytracker.com/id?1025046 Broken Link, Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
http://www.vupen.com/english/advisories/2011/0324 No Types Assigned
|
http://www.vupen.com/english/advisories/2011/0324 Broken Link
|
Changed |
Reference Type |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-011 No Types Assigned
|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-011 Patch, Vendor Advisory
|
Changed |
Reference Type |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12162 No Types Assigned
|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12162 Broken Link
|