Beschreibung
Multiple serious vulnerabilities have been found in Microsoft Products. Malicious users can exploit these vulnerabilities to execute arbitrary code or gain privileges.
Below is a complete list of vulnerabilities
- An improper memory objects handling can be exploited remotely via a specially designed content to execute arbitrary code;
- An improper embedded fonts handling can be exploited remotely via a specially designed font to execute arbitrary code;
- An improper memory objects handling can be exploited by logged in attacker via a specially designed application to gain privileges.
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2016-3270 high
- CVE-2016-3263 high
- CVE-2016-3209 high
- CVE-2016-3262 high
- CVE-2016-7182 high
- CVE-2016-3396 high
- CVE-2016-3393 high
KB Liste
- 3192441
- 3191203
- 3194798
- 3192440
- 3185331
- 3185330
- 3185332
- 3192393
- 3192392
- 3192391
- 3118394
- 3189647
- 3189648
- 3118348
- 3118317
- 3188735
- 3188732
- 3188730
- 3188731
- 3189040
- 3188399
- 3192884
- 3193713
- 3188397
- 3118327
- 3188400
- 3189051
- 3189052
- 3188726
- 3118301
- 3189039
- 3188743
- 3188741
- 3188740
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!