Msrc Windows 7 vulnerabilities

1,628 known vulnerabilities affecting msrc/windows_7.

Total CVEs
1,628
CISA KEV
72
actively exploited
Public exploits
162
Exploited in wild
82
Severity breakdown
CRITICAL24HIGH1098MEDIUM487LOW19

Vulnerabilities

Page 80 of 82
CVE-2016-3354LOWCVSS 3.32016-09-13
CVE-2016-3354 [LOW] GDI+ Information Disclosure Vulnerability GDI+ Information Disclosure Vulnerability Description: An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system. An attacker who successfully exploited this vulnerability could use the retrieved information to circumvent Address Space Layout Randomization (ASLR) in Windows, which helps guard
msrc
CVE-2016-3310HIGHCVSS 7.82016-08-09
CVE-2016-3310 [HIGH] Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability,
msrc
CVE-2016-3308HIGHCVSS 7.82016-08-09
CVE-2016-3308 [HIGH] Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability,
msrc
CVE-2016-3311HIGHCVSS 7.82016-08-09
CVE-2016-3311 [HIGH] Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability,
msrc
CVE-2016-3304HIGHCVSS 8.8PoC2016-08-09
CVE-2016-3304 [HIGH] Microsoft Graphics Remote Code Execution Vulnerability Microsoft Graphics Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whos
msrc
CVE-2016-3301HIGHCVSS 8.8PoC2016-08-09
CVE-2016-3301 [HIGH] Microsoft Graphics Remote Code Execution Vulnerability Microsoft Graphics Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whos
msrc
CVE-2016-3303HIGHCVSS 8.8PoC2016-08-09
CVE-2016-3303 [HIGH] Microsoft Graphics Remote Code Execution Vulnerability Microsoft Graphics Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whos
msrc
CVE-2016-3309HIGHCVSS 7.8KEVPoC2016-08-09
CVE-2016-3309 [HIGH] Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability,
msrc
CVE-2016-3237MEDIUMCVSS 6.4PoC2016-08-09
CVE-2016-3237 [HIGH] Kerberos Security Feature Bypass Vulnerability Kerberos Security Feature Bypass Vulnerability Description: A security feature bypass vulnerability exists in Windows when Kerberos improperly handles a password change request and falls back to NT LAN Manager (NTLM) Authentication Protocol as the default authentication protocol. An attacker who successfully exploited this vulnerability could use it to bypass Kerberos authentication. To exploit this vulnerability, an attacker w
msrc
CVE-2016-3238HIGHCVSS 8.82016-07-12
CVE-2016-3238 [HIGH] Windows Print Spooler Remote Code Execution Vulnerability Windows Print Spooler Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when the Windows Print Spooler service does not properly validate print drivers while installing a printer from servers. An attacker who successfully exploited this vulnerability could use it to execute arbitrary code and take control of an affected system. An attacker could then install programs; view,
msrc
CVE-2016-3239HIGHCVSS 7.82016-07-12
CVE-2016-3239 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability Windows Print Spooler Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new acco
msrc
CVE-2016-3252HIGHCVSS 7.82016-07-12
CVE-2016-3252 [HIGH] Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability,
msrc
CVE-2016-3254HIGHCVSS 7.82016-07-12
CVE-2016-3254 [HIGH] Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability,
msrc
CVE-2016-3286HIGHCVSS 7.82016-07-12
CVE-2016-3286 [HIGH] Windows Kernel Elevation of Privilege Vulnerability Windows Kernel Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability,
msrc
CVE-2016-3249HIGHCVSS 7.82016-07-12
CVE-2016-3249 [HIGH] Windows Graphics Component Elevation of Privilege Vulnerability Windows Graphics Component Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted applicatio
msrc
CVE-2016-3251LOWCVSS 3.32016-07-12
CVE-2016-3251 [LOW] Windows GDI Information Disclosure Vulnerability Windows GDI Information Disclosure Vulnerability Description: A Win32k information disclosure vulnerability exists when the Windows GDI component improperly discloses kernel memory addresses. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted a
msrc
CVE-2016-3225HIGHCVSS 7.8PoC2016-06-14
CVE-2016-3225 [HIGH] Windows SMB Server Elevation of Privilege Vulnerability Windows SMB Server Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in the Microsoft Server Message Block (SMB) when an attacker forwards an authentication request intended for another service running on the same machine. An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated permissions. To exploit the vulnerability, an attac
msrc
CVE-2016-3223HIGHCVSS 8.1PoC2016-06-14
CVE-2016-3223 [HIGH] Group Policy Elevation of Privilege Vulnerability Group Policy Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists when Microsoft Windows processes group policy updates. An attacker who successfully exploited this vulnerability could potentially escalate permissions or perform additional privileged actions on the target machine. To exploit this vulnerability, an attacker would need to launch a man-in-the-middle (MiTM) attack agai
msrc
CVE-2016-3299HIGHCVSS 5.32016-06-14
CVE-2016-3299 [MEDIUM] NetBIOS Elevation of Privilege Vulnerability NetBIOS Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Microsoft Windows when NetBIOS improperly handles responses. An attacker who successfully exploited the vulnerability could use it to hijack network traffic or render untrusted content in a browser outside of Enhanced Protected Mode (EPM) or an application container. To exploit the vulnerability, an attacker whose system
msrc
CVE-2016-3221HIGHCVSS 7.82016-06-14
CVE-2016-3221 [HIGH] Win32k Elevation of Privilege Vulnerability Win32k Elevation of Privilege Vulnerability Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnera
msrc