Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2016-0169Sensitive Information Exposure in Microsoft Windows 10

Severity
6.5MEDIUMNVD
EPSS
62.7%
top 1.62%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMay 11
Latest updateMay 14

Description

GDI in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows remote attackers to obtain sensitive information via a crafted document, aka "Windows Graphics Component Information Disclosure Vulnerability," a different vulnerability than CVE-2016-0168.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages13 packages

🔴Vulnerability Details

2
GHSA
GHSA-99mx-g587-xq57: GDI in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 82022-05-14
GHSA
GHSA-45w6-j27m-2pxj: GDI in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 82022-05-14

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows - 'gdi32.dll' Multiple 'EMF COMMENT_MULTIFORMATS' Record Handling (MS16-055)2016-05-17

📋Vendor Advisories

2
Microsoft
Windows Graphics Component Information Disclosure Vulnerability2016-05-10
Red Hat
openssl: Padding oracle in AES-NI CBC MAC check2016-05-03

🕵️Threat Intelligence

2
Talos
Microsoft Patch Tuesday - May 20162016-05-10
Talos
Microsoft Patch Tuesday - May 20162016-05-10

💬Community

1
HackerOne
Padding oracle in AES-NI CBC MAC check (CVE-2016-2107)2016-05-19