Açıklama
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Microsoft Browser can be exploited remotely via specially crafted content to obtain sensitive information.
- A remote code execution vulnerability in Microsoft Graphics can be exploited remotely via specially crafted embedded to execute arbitrary code.
- A security feature bypass vulnerability in Kerberos can be exploited remotely to bypass security restrictions.
- A memory corruption vulnerability in Microsoft Browser can be exploited remotely via specially crafted website to execute arbitrary code.
Orijinal öneriler
- CVE-2016-3309
- CVE-2016-3329
- CVE-2016-3301
- CVE-2016-3303
- CVE-2016-3304
- CVE-2016-3311
- CVE-2016-3237
- CVE-2016-3326
- CVE-2016-3327
- CVE-2016-3293
- CVE-2016-3310
Kötüye kullanma
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
İlgili ürünler
- Microsoft-Internet-Explorer
- Microsoft-Lync
- Microsoft-Office
- Microsoft-Lync-2010-Attendee
- Microsoft-Word
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Vista
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
- Microsoft-Edge
CVE Listesi
- CVE-2016-3293 critical
- CVE-2016-3329 high
- CVE-2016-3327 high
- CVE-2016-3326 high
- CVE-2016-3311 critical
- CVE-2016-3310 critical
- CVE-2016-3309 critical
- CVE-2016-3308 critical
- CVE-2016-3304 critical
- CVE-2016-3303 critical
- CVE-2016-3301 critical
- CVE-2016-3237 critical
KB Listesi
Daha fazlasını okuyun
Bölgenizde yayılan güvenlik açıklarının istatistiklerini öğrenin statistics.securelist.com
Bu güvenlik açığının açıklamasında bir tutarsızlık mı tespit ettiniz? Bize bildirin!