Description
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, gain privileges, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Windows Media Center can be exploited remotely via specially crafted to execute arbitrary code.
 - A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
 - Security bypass vulnerability in Windows can be exploited remotely via specially crafted application to bypass security restrictions.
 - An elevation of privilege vulnerability in Microsoft DirectX Graphics Kernel Subsystem can be exploited remotely via specially crafted application to gain privileges.
 - An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
 - A memory corruption vulnerability in Windows Imaging Component can be exploited remotely via specially crafted website to execute arbitrary code.
 - A remote code execution vulnerability in Windows DLL Loading can be exploited remotely to execute arbitrary code.
 - An information disclosure vulnerability in Windows Graphics Component can be exploited remotely via specially crafted document to obtain sensitive information.
 - An elevation of privilege vulnerability in DirectX can be exploited remotely via specially crafted application to gain privileges.
 - An information disclosure vulnerability in Win32k can be exploited remotely via specially crafted application to obtain sensitive information.
 - An elevation of privilege vulnerability in Windows Kernel can be exploited remotely via specially crafted application to gain privileges.
 - A remote code execution vulnerability in Windows Graphics Component can be exploited remotely via specially crafted website to execute arbitrary code.
 - An information disclosure vulnerability in Remote Desktop Protocol Drive Redirection can be exploited remotely to obtain sensitive information.
 - Use-after-free vulnerability in GDI can be exploited remotely via specially crafted website to execute arbitrary code.
 - A memory corruption vulnerability in Windows Journal can be exploited remotely via specially crafted to execute arbitrary code.
 - A remote code execution vulnerability in RPC Network Data Representation Engine can be exploited remotely via specially crafted to execute arbitrary code.
 - A remote code execution vulnerability in Windows Shell can be exploited remotely via specially crafted content to execute arbitrary code.
 
Original advisories
- CVE-2016-0189
 - CVE-2016-0181
 - CVE-2016-0197
 - CVE-2016-0196
 - CVE-2016-0195
 - CVE-2016-0152
 - CVE-2016-0168
 - CVE-2016-0176
 - CVE-2016-0174
 - CVE-2016-0175
 - CVE-2016-0180
 - CVE-2016-0173
 - CVE-2016-0170
 - CVE-2016-0171
 - CVE-2016-0190
 - CVE-2016-0184
 - CVE-2016-0169
 - CVE-2016-0182
 - CVE-2016-0178
 - CVE-2016-0179
 
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Windows
 - Microsoft-Windows-Server
 - Microsoft-Windows-Vista-4
 - Microsoft-Windows-Server-2012
 - Microsoft-Windows-8
 - Microsoft-Windows-7
 - Microsoft-Windows-Server-2008
 - Windows-RT
 - Microsoft-Windows-10
 
CVE list
- CVE-2016-0185 critical
 - CVE-2016-0189 critical
 - CVE-2016-0181 high
 - CVE-2016-0197 critical
 - CVE-2016-0196 critical
 - CVE-2016-0195 critical
 - CVE-2016-0152 critical
 - CVE-2016-0168 high
 - CVE-2016-0176 critical
 - CVE-2016-0174 critical
 - CVE-2016-0175 warning
 - CVE-2016-0180 critical
 - CVE-2016-0173 critical
 - CVE-2016-0170 critical
 - CVE-2016-0171 critical
 - CVE-2016-0190 high
 - CVE-2016-0184 critical
 - CVE-2016-0169 high
 - CVE-2016-0182 critical
 - CVE-2016-0178 critical
 - CVE-2016-0179 critical
 
KB list
- 3156421
 - 3156059
 - 3156016
 - 3153704
 - 3155784
 - 3156387
 - 3156013
 - 3141083
 - 3156019
 - 3155178
 - 3153171
 - 3156017
 - 3153199
 - 3158991
 - 3150220
 
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
                                    Found an inaccuracy in the description of this vulnerability? Let us know!