Msrc Windows 10 For 32-Bit Systems vulnerabilities
188 known vulnerabilities affecting msrc/windows_10_for_32-bit_systems.
Total CVEs
188
CISA KEV
5
actively exploited
Public exploits
31
Exploited in wild
5
Severity breakdown
CRITICAL7HIGH89MEDIUM83LOW9
Vulnerabilities
Page 8 of 10
CVE-2016-7271MEDIUMCVSS 6.32016-12-13
CVE-2016-7271 [HIGH] Windows Elevation of Privilege Vulnerability
Windows Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when Windows Secure Kernel Mode fails to properly handle objects in memory.
To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a targeted system. An attacker who successfully exploited the vulnerability could violate virtual trust levels (VTL).
The security up
msrc
CVE-2016-7258LOWCVSS 3.32016-12-13
CVE-2016-7258 [MEDIUM] Windows Kernel Memory Information Disclosure Vulnerability
Windows Kernel Memory Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists in Microsoft Windows when the Windows kernel fails to properly handle certain page fault system calls. An authenticated attacker who successfully exploited the vulnerability could disclose information from one process to another.
To exploit the vulnerability, an attacker would have to either log o
msrc
CVE-2016-7248CRITICALCVSS 7.82016-11-08
CVE-2016-7248 [HIGH] Microsoft Video Control Remote Code Execution Vulnerability
Microsoft Video Control Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when Microsoft Video Control fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affec
msrc
CVE-2016-7246HIGHCVSS 7.82016-11-08
CVE-2016-7246 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnera
msrc
CVE-2016-7205HIGHCVSS 7.12016-11-08
CVE-2016-7205 [HIGH] Windows Animation Manager Memory Corruption Vulnerability
Windows Animation Manager Memory Corruption Vulnerability
Description: A remote code execution vulnerability exists when the Windows Animation Manager improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights.
An attacker could exploit the vulnerability by convincing a user to visit
msrc
CVE-2016-7223MEDIUMCVSS 6.82016-11-08
CVE-2016-7223 [MEDIUM] VHD Driver Elevation of Privilege Vulnerability
VHD Driver Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Virtual Hard Disk Drive fails to properly handle user access to certain files. An attacker who successfully exploited the vulnerability could manipulate files in locations not intended to be available to the user.
To exploit the vulnerability, an attacker would need access to the local system and the a
msrc
CVE-2016-7225MEDIUMCVSS 6.8PoC2016-11-08
CVE-2016-7225 [MEDIUM] VHD Driver Elevation of Privilege Vulnerability
VHD Driver Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Virtual Hard Disk Drive fails to properly handle user access to certain files. An attacker who successfully exploited the vulnerability could manipulate files in locations not intended to be available to the user.
To exploit the vulnerability, an attacker would need access to the local system and the a
msrc
CVE-2016-7220MEDIUMCVSS 6.52016-11-08
CVE-2016-7220 [LOW] Virtual Secure Mode Information Disclosure Vulnerability
Virtual Secure Mode Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when Windows Virtual Secure Mode improperly handles objects in memory. A locally authenticated attacker who successfully exploited this vulnerability could be able to read sensitive information on the target system.
To exploit the vulnerability, an attacker could run a specially crafted application on th
msrc
CVE-2016-7224MEDIUMCVSS 6.8PoC2016-11-08
CVE-2016-7224 [MEDIUM] VHD Driver Elevation of Privilege Vulnerability
VHD Driver Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Virtual Hard Disk Drive fails to properly handle user access to certain files. An attacker who successfully exploited the vulnerability could manipulate files in locations not intended to be available to the user.
To exploit the vulnerability, an attacker would need access to the local system and the a
msrc
CVE-2016-7222MEDIUMCVSS 6.52016-11-08
CVE-2016-7222 [HIGH] Task Scheduler Elevation of Privilege Vulnerability
Task Scheduler Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Task Scheduler when a user creates a task that uses UNC paths. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges.
To exploit the vulnerability, a locally authenticated attacker could use Windows Task Scheduler to schedule a new task with a specia
msrc
CVE-2016-7226MEDIUMCVSS 6.8PoC2016-11-08
CVE-2016-7226 [MEDIUM] VHD Driver Elevation of Privilege Vulnerability
VHD Driver Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Virtual Hard Disk Drive fails to properly handle user access to certain files. An attacker who successfully exploited the vulnerability could manipulate files in locations not intended to be available to the user.
To exploit the vulnerability, an attacker would need access to the local system and the a
msrc
CVE-2016-7247MEDIUMCVSS 6.22016-11-08
CVE-2016-7247 [HIGH] Secure Boot Component Security Feature Bypass Vulnerability
Secure Boot Component Security Feature Bypass Vulnerability
Description: A security feature bypass vulnerability exists when Windows Secure Boot improperly loads a boot policy that is affected by the vulnerability. An attacker who successfully exploited this vulnerability could disable code integrity checks, allowing test-signed executables and drivers to be loaded onto a target device.
To exploit the vulnerability
msrc
CVE-2016-7217MEDIUMCVSS 4.22016-11-08
CVE-2016-7217 [HIGH] Media Foundation Memory Corruption Vulnerability
Media Foundation Memory Corruption Vulnerability
Description: A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights.
There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to
msrc
CVE-2016-0142CRITICALCVSS 7.82016-10-11
CVE-2016-0142 [HIGH] Microsoft Video Control Remote Code Execution Vulnerability
Microsoft Video Control Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when Microsoft Video Control fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affec
msrc
CVE-2016-0073HIGHCVSS 5.0PoC2016-10-11
CVE-2016-0073 [MEDIUM] Windows Kernel Local Elevation of Privilege Vulnerability
Windows Kernel Local Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Kernel API improperly allows a user to access sensitive registry information. An attacker who successfully exploited the vulnerability could gain access to user account information that is not intended for the user.
A locally authenticated attacker could exploit this vulnerability b
msrc
CVE-2016-3341HIGHCVSS 7.82016-10-11
CVE-2016-3341 [HIGH] Windows Transaction Manager Elevation of Privilege Vulnerability
Windows Transaction Manager Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Transaction Manager improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted applica
msrc
CVE-2016-0079HIGHCVSS 5.0PoC2016-10-11
CVE-2016-0079 [MEDIUM] Windows Kernel Local Elevation of Privilege Vulnerability
Windows Kernel Local Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Kernel API improperly allows a user to access sensitive registry information. An attacker who successfully exploited the vulnerability could gain access to user account information that is not intended for the user.
A locally authenticated attacker could exploit this vulnerability b
msrc
CVE-2016-7188HIGHCVSS 7.8PoC2016-10-11
CVE-2016-7188 [HIGH] Windows Diagnostics Hub Elevation of Privilege Vulnerability
Windows Diagnostics Hub Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Diagnostics Hub Standard Collector Service fails to properly sanitize input, leading to an unsecure library-loading behavior. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install progra
msrc
CVE-2016-0075HIGHCVSS 5.5PoC2016-10-11
CVE-2016-0075 [MEDIUM] Windows Kernel Local Elevation of Privilege Vulnerability
Windows Kernel Local Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Kernel API improperly allows a user to access sensitive registry information. An attacker who successfully exploited the vulnerability could gain access to user account information that is not intended for the user.
A locally authenticated attacker could exploit this vulnerability b
msrc
CVE-2016-3349HIGHCVSS 7.82016-09-13
CVE-2016-3349 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnera
msrc