U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2016-0189

Change History

Modified Analysis by NIST 7/09/2024 2:25:02 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Removed CVSS V3
NIST AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

								
						
Added CWE

								
							
							
						
NIST CWE-787
Removed CWE
NIST CWE-119

								
						
Changed CPE Configuration
AND
     OR
          cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*
          cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*
          cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*
     OR
          *cpe:2.3:a:microsoft:jscript:5.8:*:*:*:*:*:*:*
          *cpe:2.3:a:microsoft:vbscript:5.7:*:*:*:*:*:*:*
          *cpe:2.3:a:microsoft:vbscript:5.8:*:*:*:*:*:*:*
AND
     OR
          *cpe:2.3:a:microsoft:jscript:5.8:*:*:*:*:*:*:*
          *cpe:2.3:a:microsoft:vbscript:5.7:*:*:*:*:*:*:*
          *cpe:2.3:a:microsoft:vbscript:5.8:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*
     OR
          cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
          cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:a:microsoft:vbscript:5.7:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
Changed Reference Type
http://www.securityfocus.com/bid/90012 No Types Assigned
http://www.securityfocus.com/bid/90012 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id/1035820 No Types Assigned
http://www.securitytracker.com/id/1035820 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-051 No Types Assigned
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-051 Patch, Vendor Advisory
Changed Reference Type
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-053 No Types Assigned
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-053 Patch, Vendor Advisory
Changed Reference Type
https://www.exploit-db.com/exploits/40118/ No Types Assigned
https://www.exploit-db.com/exploits/40118/ Third Party Advisory, VDB Entry
Changed Reference Type
https://www.virusbulletin.com/virusbulletin/2017/01/journey-and-evolution-god-mode-2016-cve-2016-0189/ No Types Assigned
https://www.virusbulletin.com/virusbulletin/2017/01/journey-and-evolution-god-mode-2016-cve-2016-0189/ Exploit, Third Party Advisory
OSZAR »