vulnerability
MS16-023: Cumulative Security Update for Internet Explorer (3142015)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:H/Au:N/C:C/I:C/A:C) | Mar 8, 2016 | Mar 8, 2016 | Jul 28, 2025 |
Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
Mar 8, 2016
Added
Mar 8, 2016
Modified
Jul 28, 2025
Description
Multiple remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
Solutions
WINDOWS-HOTFIX-MS16-023-0c7e9829-cc88-4af8-ae95-e2823ab2cbfaWINDOWS-HOTFIX-MS16-023-16ea69f8-9c3c-415e-b513-9812c8212865WINDOWS-HOTFIX-MS16-023-3426bd13-7062-4968-8ee2-7529dd02ad0dWINDOWS-HOTFIX-MS16-023-3a523af1-88ce-43ce-8724-fbbf5b81cbedWINDOWS-HOTFIX-MS16-023-3f5f2fab-88aa-4fbf-975d-94424a363208WINDOWS-HOTFIX-MS16-023-4f9a6bc2-18be-4f07-b3c7-dd37dca961b1WINDOWS-HOTFIX-MS16-023-5b2dbc7e-9e11-442f-ad69-2c593c1b56dfWINDOWS-HOTFIX-MS16-023-62cef694-cd47-4d46-be15-e0a592991d07WINDOWS-HOTFIX-MS16-023-63665b01-35be-4893-b994-5ab2d72e2434WINDOWS-HOTFIX-MS16-023-79e97a4e-dd65-467c-bbc7-1aeadabb0fcaWINDOWS-HOTFIX-MS16-023-8de9b48a-62a3-4473-a125-606a63f7a046WINDOWS-HOTFIX-MS16-023-8e1be6a5-93c1-45f4-b4a9-32954592f411WINDOWS-HOTFIX-MS16-023-990b5db5-c087-437b-88d6-29cb04067b3cWINDOWS-HOTFIX-MS16-023-a50dba6b-761a-4451-ac7e-4b285864a7c2WINDOWS-HOTFIX-MS16-023-a52756d1-e676-45c3-8fa3-af607ba9a62eWINDOWS-HOTFIX-MS16-023-b3db03db-b107-4d0a-b27d-15acac596ac7WINDOWS-HOTFIX-MS16-023-b828c97e-e2e1-4200-88bf-01eef179cbc0WINDOWS-HOTFIX-MS16-023-db6a6827-a9e9-41ed-abda-658ccb1b2541WINDOWS-HOTFIX-MS16-023-e91948ca-fba7-49b4-905a-ced95863ceeaWINDOWS-HOTFIX-MS16-023-ec15f5ec-2f3d-4a1e-a901-141a52ebdb68WINDOWS-HOTFIX-MS16-023-f3f6550f-4a25-471c-a79a-bdd93e198324
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.