Added |
CWE |
|
NIST CWE-426
|
Removed |
CWE |
NIST NVD-CWE-Other
|
|
Changed |
CPE Configuration |
AND
OR
*cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*
OR
cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*
|
AND
OR
*cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*
OR
cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:-:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
|
Changed |
Reference Type |
http://www.us-cert.gov/cas/techalerts/TA11-347A.html US Government Resource
|
http://www.us-cert.gov/cas/techalerts/TA11-347A.html Third Party Advisory, US Government Resource
|
Changed |
Reference Type |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-099 No Types Assigned
|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-099 Patch, Vendor Advisory
|
Changed |
Reference Type |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13884 No Types Assigned
|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13884 Tool Signature
|
Changed |
Evaluator Description |
Per: http://technet.microsoft.com/en-us/security/bulletin/ms11-099
'FAQ for Internet Explorer Insecure Library Loading Vulnerability - CVE-2011-2019
What is the scope of the vulnerability?
This is a remote code execution vulnerability. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.'
Per: http://cwe.mitre.org/data/definitions/426.html
|
Per: http://technet.microsoft.com/en-us/security/bulletin/ms11-099
'FAQ for Internet Explorer Insecure Library Loading Vulnerability - CVE-2011-2019
What is the scope of the vulnerability?
This is a remote code execution vulnerability. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.'
|