{
  "data": {
    "info": {
      "count": 1,
      "vuln_count": 1,
      "description": "The remote Windows host contains a version of the Microsoft Foundation Class (MFC) library affected by an insecure library loading vulnerability. The path used for loading external libraries is not securely restricted.\n\nAn attacker can exploit this by tricking a user into opening an MFC application in a directory that contains a malicious DLL, resulting in arbitrary code execution.",
      "synopsis": "Arbitrary code can be executed on the remote host through the Microsoft Foundation Class library.",
      "solution": "Microsoft has released a set of patches for Visual Studio .NET 2003, 2005, and 2008, as well as Visual C++ 2005, 2008, and 2010.",
      "discovery": {
        "seen_first": "2019-12-31T17:15:52.000Z",
        "seen_last": "2019-12-31T17:15:52.000Z"
      },
      "severity": 3,
      "plugin_details": {
        "family": "Windows : Microsoft Bulletins",
        "modification_date": "2016-12-31T00:00:00Z",
        "name": "MS11-025: Vulnerability in Microsoft Foundation Class (MFC) Library Could Allow Remote Code Execution (2500212)",
        "publication_date": "2011-12-31T00:00:00Z",
        "type": "local",
        "version": null,
        "severity": 3
      },
      "reference_information": [
        {
          "name": "bid",
          "url": "http://www.securityfocus.com/bid/",
          "values": [
            42811
          ]
        },
        {
          "name": "cve",
          "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=",
          "values": [
            "CVE-2010-3190"
          ]
        },
        {
          "name": "iavb",
          "values": [
            "2011-B-0046"
          ]
        },
        {
          "name": "msft",
          "url": "http://technet.microsoft.com/en-us/security/bulletin/",
          "values": [
            "MS11-025"
          ]
        },
        {
          "name": "osvdb",
          "values": [
            "67674"
          ]
        },
        {
          "name": "secunia",
          "url": "http://secunia.com/advisories/",
          "values": [
            "41212"
          ]
        }
      ],
      "risk_information": {
        "risk_factor": "High",
        "cvss_vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
        "cvss_base_score": "9.3",
        "cvss_temporal_vector": "E:F/RL:OF/RC:ND",
        "cvss_temporal_score": "7.7",
        "cvss3_vector": null,
        "cvss3_base_score": null,
        "cvss3_temporal_vector": null,
        "cvss3_temporal_score": null,
        "stig_severity": null
      },
      "see_also": [
        "[\"https://technet.microsoft.com/library/security/ms11-025\"]"
      ],
      "vulnerability_information": {
        "vulnerability_publication_date": "2010-12-31T00:00:00Z",
        "exploited_by_malware": null,
        "patch_publication_date": "2011-12-31T00:00:00Z",
        "exploit_available": true,
        "exploitability_ease": null,
        "asset_inventory": null,
        "default_account": null,
        "exploited_by_nessus": null,
        "in_the_news": null,
        "malware": null,
        "unsupported_by_vendor": null,
        "cpe": null,
        "exploit_frameworks": []
      },
      "vpr": {
        "score": 5.9,
        "drivers": {
          "age_of_vuln": {
            "lower_bound": 731,
            "upper_bound": 0
          },
          "exploit_code_maturity": "UNPROVEN",
          "cvss_impact_score_predicted": true,
          "threat_intensity_last28": "VERY_LOW",
          "threat_sources_last28": [
            "No recorded events"
          ],
          "product_coverage": "MEDIUM"
        },
        "updated": "2019-12-31T10:08:58Z"
      }
    }
  }
}