Msrc Windows 10 Version 1511 vulnerabilities
314 known vulnerabilities affecting msrc/windows_10_version_1511.
Total CVEs
314
CISA KEV
18
actively exploited
Public exploits
100
Exploited in wild
18
Severity breakdown
CRITICAL5HIGH158MEDIUM142LOW9
Vulnerabilities
Page 15 of 16
CVE-2016-3249HIGHCVSS 7.82016-07-12
CVE-2016-3249 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability
Windows Graphics Component Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted applicatio
msrc
CVE-2016-3251LOWCVSS 3.32016-07-12
CVE-2016-3251 [LOW] Windows GDI Information Disclosure Vulnerability
Windows GDI Information Disclosure Vulnerability
Description: A Win32k information disclosure vulnerability exists when the Windows GDI component improperly discloses kernel memory addresses. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted a
msrc
CVE-2016-3225HIGHCVSS 7.8PoC2016-06-14
CVE-2016-3225 [HIGH] Windows SMB Server Elevation of Privilege Vulnerability
Windows SMB Server Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the Microsoft Server Message Block (SMB) when an attacker forwards an authentication request intended for another service running on the same machine. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated permissions.
To exploit the vulnerability, an attac
msrc
CVE-2016-3223HIGHCVSS 8.1PoC2016-06-14
CVE-2016-3223 [HIGH] Group Policy Elevation of Privilege Vulnerability
Group Policy Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when Microsoft Windows processes group policy updates. An attacker who successfully exploited this vulnerability could potentially escalate permissions or perform additional privileged actions on the target machine.
To exploit this vulnerability, an attacker would need to launch a man-in-the-middle (MiTM) attack agai
msrc
CVE-2016-3299HIGHCVSS 5.32016-06-14
CVE-2016-3299 [MEDIUM] NetBIOS Elevation of Privilege Vulnerability
NetBIOS Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Microsoft Windows when NetBIOS improperly handles responses. An attacker who successfully exploited the vulnerability could use it to hijack network traffic or render untrusted content in a browser outside of Enhanced Protected Mode (EPM) or an application container.
To exploit the vulnerability, an attacker whose system
msrc
CVE-2016-3221HIGHCVSS 7.82016-06-14
CVE-2016-3221 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnera
msrc
CVE-2016-3236HIGHCVSS 9.8PoC2016-06-14
CVE-2016-3236 [CRITICAL] Windows WPAD Proxy Discovery Elevation of Privilege Vulnerability
Windows WPAD Proxy Discovery Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when Microsoft Windows improperly handles certain proxy discovery scenarios using the Web Proxy Auto Discovery (WPAD) protocol method.
An attacker who successfully exploited the vulnerability could potentially access and control network traffic for which the attacker does not have
msrc
CVE-2016-3220HIGHCVSS 7.8PoC2016-06-14
CVE-2016-3220 [HIGH] OpenType Font Driver Elevation of Privilege Vulnerability
OpenType Font Driver Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows Adobe Type Manager Font Driver (ATMFD.dll) when it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code and take control of an affected system. An attacker could then install programs; view, change, or delete data
msrc
CVE-2016-3216HIGHCVSS 4.3PoC2016-06-14
CVE-2016-3216 [MEDIUM] Windows Graphics Component Information Disclosure Vulnerability
Windows Graphics Component Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the Windows Graphics Component (GDI32.dll) fails to properly handle objects in memory, allowing an attacker to retrieve information that could lead to an Address Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited this vulnerability could cause an inform
msrc
CVE-2016-3218HIGHCVSS 7.82016-06-14
CVE-2016-3218 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnera
msrc
CVE-2016-3213LOWCVSS 8.8PoC2016-06-14
CVE-2016-3213 [HIGH] WPAD Elevation of Privilege Vulnerability
WPAD Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Microsoft Windows when the Web Proxy Auto Discovery (WPAD) protocol falls back to a vulnerable proxy discovery process. An attacker who successfully exploited this vulnerability could bypass security and gain elevated privileges on a targeted system.
To exploit the vulnerability, an attacker could respond to NetBIOS name requests
msrc
CVE-2016-0195CRITICALCVSS 8.82016-05-10
CVE-2016-0195 [HIGH] Windows Imaging Component Memory Corruption Vulnerability
Windows Imaging Component Memory Corruption Vulnerability
Description: A remote code execution vulnerability exists in Windows when the Windows Imaging Component fails to properly handle objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user
msrc
CVE-2016-0170CRITICALCVSS 8.8PoC2016-05-10
CVE-2016-0170 [HIGH] Windows Graphics Component Remote Code Execution Vulnerability
Windows Graphics Component Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists due to the way the Windows Graphics Component handles objects in memory. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. User
msrc
CVE-2016-0184CRITICALCVSS 8.82016-05-10
CVE-2016-0184 [HIGH] Direct3D Use After Free RCE Vulnerability
Direct3D Use After Free RCE Vulnerability
Description: A remote code execution vulnerability exists when the Windows GDI component fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have
msrc
CVE-2016-0168HIGHCVSS 6.5PoC2016-05-10
CVE-2016-0168 [MEDIUM] Windows Graphics Component Information Disclosure Vulnerability
Windows Graphics Component Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user’s system.
There are multiple ways an attacker could exploit the vulnerability, such as by convinc
msrc
CVE-2016-0196HIGHCVSS 7.82016-05-10
CVE-2016-0196 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnera
msrc
CVE-2016-0171HIGHCVSS 7.8PoC2016-05-10
CVE-2016-0171 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnera
msrc
CVE-2016-0173HIGHCVSS 7.8PoC2016-05-10
CVE-2016-0173 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnera
msrc
CVE-2016-0175HIGHCVSS 3.32016-05-10
CVE-2016-0175 [LOW] Win32k Information Disclosure Vulnerability
Win32k Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists in Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (KASLR) bypass. An attacker who successfully exploited this vulnerability could retrieve the memory address of a kernel object.
To exploit this vulnerability, an attacker would have to log on to an
msrc
CVE-2016-0169HIGHCVSS 6.5PoC2016-05-10
CVE-2016-0169 [MEDIUM] Windows Graphics Component Information Disclosure Vulnerability
Windows Graphics Component Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user’s system.
There are multiple ways an attacker could exploit the vulnerability, such as by convinc
msrc