CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.0%
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, execute arbitrary code, cause denial of service.
Below is a complete list of vulnerabilities:
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2016-7239 warning
CVE-2016-7227 warning
CVE-2016-7195 critical
CVE-2016-7198 critical
CVE-2016-7199 warning
CVE-2016-7202 critical
CVE-2016-7256 critical
CVE-2016-7255 critical
CVE-2016-7248 critical
CVE-2016-7246 critical
CVE-2016-7238 critical
CVE-2016-7237 high
CVE-2016-0026 critical
CVE-2016-3332 critical
CVE-2016-3333 critical
CVE-2016-3334 critical
CVE-2016-3335 critical
CVE-2016-3338 critical
CVE-2016-3340 critical
CVE-2016-3342 critical
CVE-2016-3343 critical
CVE-2016-7184 critical
CVE-2016-7205 critical
CVE-2016-7210 high
CVE-2016-7212 critical
CVE-2016-7214 warning
CVE-2016-7215 critical
CVE-2016-7216 high
CVE-2016-7218 warning
CVE-2016-7221 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
support.microsoft.com/kb/3181707
support.microsoft.com/kb/3193418
support.microsoft.com/kb/3194371
support.microsoft.com/kb/3196718
support.microsoft.com/kb/3197655
support.microsoft.com/kb/3197867
support.microsoft.com/kb/3197868
support.microsoft.com/kb/3198234
support.microsoft.com/kb/3198483
support.microsoft.com/kb/3198510
support.microsoft.com/kb/3203621
support.microsoft.com/kb/3203859
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-0026
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3332
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3333
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3334
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3335
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3338
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3340
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3342
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-3343
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7184
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7195
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7198
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7199
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7202
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7205
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7210
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7212
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7214
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7215
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7216
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7218
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7221
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7227
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7237
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7238
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7239
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7246
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7248
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7255
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7256
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Edge/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-7/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2008/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows-Vista-4/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.0%