Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-3238

EPSS 15.15% · P95
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2016-3238

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows man-in-the-middle attackers to execute arbitrary code by providing a crafted print driver during printer installation, aka "Windows Print Spooler Remote Code Execution Vulnerability."
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows打印后台处理程序远程执行代码漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。Print Spooler service是其中的一个打印服务组件。 Microsoft Windows Print Spooler服务中存在远程执行代码漏洞,该漏洞源于服务器安装打印机的过程中打印后台处理程序服务未正确地验证打印驱动程序。攻击者可用此执行任意代码,并可控制受影响的系统。以下系统受到影响:Microsoft Windows Vista SP2,Windows Server 2008 SP2和R2 S
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2016-3238

#POC DescriptionSource LinkShenlong Link
1Whitepaper for CVE-2016-3238/MS16-087 Proof Of concept.https://github.com/pyiesone/CVE-2016-3238-PoCPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2016-3238

Please Login to view more intelligence information

Same Patch Batch · n/a · 2016-07-13 · 131 CVEs total

CVE-2016-4214多款Adobe产品内存损坏漏洞
CVE-2016-4230Adobe Flash Player 释放后重用漏洞
CVE-2016-4229Adobe Flash Player 释放后重用漏洞
CVE-2016-4228Adobe Flash Player 释放后重用漏洞
CVE-2016-4227Adobe Flash Player 释放后重用漏洞
CVE-2016-4226Adobe Flash Player 释放后重用漏洞
CVE-2016-4225Adobe Flash Player 任意代码执行漏洞
CVE-2016-4224Adobe Flash Player 任意代码执行漏洞
CVE-2016-4223Adobe Flash Player 任意代码执行漏洞
CVE-2016-4222Adobe Flash Player 释放后重用漏洞
CVE-2016-4221Adobe Flash Player 内存损坏漏洞
CVE-2016-4220Adobe Flash Player 内存损坏漏洞
CVE-2016-4219Adobe Flash Player 内存损坏漏洞
CVE-2016-4218Adobe Flash Player 内存损坏漏洞
CVE-2016-4217Adobe Flash Player 内存损坏漏洞
CVE-2016-4216Adobe XMP Toolkit for Java 信息泄露漏洞
CVE-2016-4215多款Adobe产品安全绕过漏洞
CVE-2016-4204多款Adobe产品内存损坏漏洞
CVE-2016-4203多款Adobe产品内存损坏漏洞
CVE-2016-4202多款Adobe产品安全漏洞

Showing top 20 of 131 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2016-3238

No comments yet


Leave a comment