Msrc Windows Vista Service Pack 2 vulnerabilities
163 known vulnerabilities affecting msrc/windows_vista_service_pack_2.
Total CVEs
163
CISA KEV
19
actively exploited
Public exploits
75
Exploited in wild
19
Severity breakdown
CRITICAL8HIGH95MEDIUM55LOW5
Vulnerabilities
Page 6 of 9
CVE-2016-3305HIGHCVSS 7.82016-09-13
CVE-2016-3305 [HIGH] Windows Session Object Elevation of Privilege Vulnerability
Windows Session Object Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that Windows handles session objects. A locally authenticated attacker who successfully exploited the vulnerability could hijack the session of another user.
To exploit the vulnerability, the attacker could run a specially crafted application.
The security update corrects how Windows ha
msrc
CVE-2016-3348HIGHCVSS 7.82016-09-13
CVE-2016-3348 [HIGH] Win32k Elevation of Privilege Vulnerability
Win32k Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnera
msrc
CVE-2016-3375HIGHCVSS 7.52016-09-13
CVE-2016-3375 [HIGH] Scripting Engine Memory Corruption Vulnerability
Scripting Engine Memory Corruption Vulnerability
Description: A remote code execution vulnerability exists in the way that the Microsoft OLE Automation mechanism and the VBScript Scripting Engine in Internet Explorer access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vuln
msrc
CVE-2016-3355HIGHCVSS 7.82016-09-13
CVE-2016-3355 [HIGH] Windows GDI Elevation of Privilege Vulnerability
Windows GDI Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this v
msrc
CVE-2016-3368HIGHCVSS 7.52016-09-13
CVE-2016-3368 [HIGH] Windows Remote Code Execution Vulnerability
Windows Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists in the way that Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code with elevated permissions on a target system.
To exploit the vulnerability, an attacker who has a domain user account could create a specially crafted request, causing Windows to execute arbitrar
msrc
CVE-2016-3371MEDIUMCVSS 6.8PoC2016-09-13
CVE-2016-3371 [MEDIUM] Windows Elevation of Privilege Vulnerability
Windows Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions. An attacker who successfully exploited the vulnerability could impersonate processes, interject cross-process communication, or interrupt system functionality.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
msrc
CVE-2016-3345MEDIUMCVSS 5.02016-09-13
CVE-2016-3345 [HIGH] Windows SMB Authenticated Remote Code Execution Vulnerability
Windows SMB Authenticated Remote Code Execution Vulnerability
Description: For Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 operating systems, a remote code execution vulnerability exists in the way that the Microsoft Server Message Block 1.0 (SMBv1) Server handles certain requests when an authenticated attacker sends specially crafted packets to the SMBv1 server. The vulnerability do
msrc
CVE-2016-3373MEDIUMCVSS 6.8PoC2016-09-13
CVE-2016-3373 [MEDIUM] Windows Kernel Local Elevation of Privilege Vulnerability
Windows Kernel Local Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Kernel API improperly allows a user to access sensitive registry information. An attacker who successfully exploited the vulnerability could gain access to user account information that is not intended for the user.
A locally authenticated attacker could exploit this vulnerability b
msrc
CVE-2016-3372MEDIUMCVSS 4.22016-09-13
CVE-2016-3372 [MEDIUM] Windows Elevation of Privilege Vulnerability
Windows Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions. An attacker who successfully exploited the vulnerability could impersonate processes, interject cross-process communication, or interrupt system functionality.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
msrc
CVE-2016-3354LOWCVSS 3.32016-09-13
CVE-2016-3354 [LOW] GDI+ Information Disclosure Vulnerability
GDI+ Information Disclosure Vulnerability
Description: An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system. An attacker who successfully exploited this vulnerability could use the retrieved information to circumvent Address Space Layout Randomization (ASLR) in Windows, which helps guard
msrc
CVE-2016-3310HIGHCVSS 7.82016-08-09
CVE-2016-3310 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability,
msrc
CVE-2016-3308HIGHCVSS 7.82016-08-09
CVE-2016-3308 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability,
msrc
CVE-2016-3311HIGHCVSS 7.82016-08-09
CVE-2016-3311 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability,
msrc
CVE-2016-3304HIGHCVSS 8.8PoC2016-08-09
CVE-2016-3304 [HIGH] Microsoft Graphics Remote Code Execution Vulnerability
Microsoft Graphics Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whos
msrc
CVE-2016-3303HIGHCVSS 8.8PoC2016-08-09
CVE-2016-3303 [HIGH] Microsoft Graphics Remote Code Execution Vulnerability
Microsoft Graphics Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whos
msrc
CVE-2016-3309HIGHCVSS 7.8KEVPoC2016-08-09
CVE-2016-3309 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability,
msrc
CVE-2016-3237MEDIUMCVSS 6.4PoC2016-08-09
CVE-2016-3237 [HIGH] Kerberos Security Feature Bypass Vulnerability
Kerberos Security Feature Bypass Vulnerability
Description: A security feature bypass vulnerability exists in Windows when Kerberos improperly handles a password change request and falls back to NT LAN Manager (NTLM) Authentication Protocol as the default authentication protocol.
An attacker who successfully exploited this vulnerability could use it to bypass Kerberos authentication. To exploit this vulnerability, an attacker w
msrc
CVE-2016-3238HIGHCVSS 8.82016-07-12
CVE-2016-3238 [HIGH] Windows Print Spooler Remote Code Execution Vulnerability
Windows Print Spooler Remote Code Execution Vulnerability
Description: A remote code execution vulnerability exists when the Windows Print Spooler service does not properly validate print drivers while installing a printer from servers. An attacker who successfully exploited this vulnerability could use it to execute arbitrary code and take control of an affected system. An attacker could then install programs; view,
msrc
CVE-2016-3239HIGHCVSS 7.82016-07-12
CVE-2016-3239 [HIGH] Windows Print Spooler Elevation of Privilege Vulnerability
Windows Print Spooler Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new acco
msrc
CVE-2016-3252HIGHCVSS 7.82016-07-12
CVE-2016-3252 [HIGH] Windows Kernel Elevation of Privilege Vulnerability
Windows Kernel Elevation of Privilege Vulnerability
Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability,
msrc