vulnerability
MS16-030: Security Update for Windows OLE to Address Remote Code Execution (3143136)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | Mar 8, 2016 | Mar 8, 2016 | Jul 28, 2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Mar 8, 2016
Added
Mar 8, 2016
Modified
Jul 28, 2025
Description
Multiple remote code execution vulnerabilities exist when Microsoft Windows OLE fails to properly validate user input. An attacker could use the vulnerabilities to execute malicious code.
Solutions
WINDOWS-HOTFIX-MS16-023-0c7e9829-cc88-4af8-ae95-e2823ab2cbfaWINDOWS-HOTFIX-MS16-023-3f5f2fab-88aa-4fbf-975d-94424a363208WINDOWS-HOTFIX-MS16-023-62cef694-cd47-4d46-be15-e0a592991d07WINDOWS-HOTFIX-MS16-023-a52756d1-e676-45c3-8fa3-af607ba9a62eWINDOWS-HOTFIX-MS16-030-0043e623-5876-4536-841b-f067d49121b7WINDOWS-HOTFIX-MS16-030-0314e67d-7b15-4b20-a123-c1e6d4ff19c6WINDOWS-HOTFIX-MS16-030-079a808e-d3fb-4aa8-af77-0280d636ec0fWINDOWS-HOTFIX-MS16-030-1bc4c68a-3217-47ce-8fc3-5c81b781b40cWINDOWS-HOTFIX-MS16-030-37cd8ad2-24d6-498e-9f2b-f6cef6a778d5WINDOWS-HOTFIX-MS16-030-3ec46065-ed07-48a9-a54c-6e51a37c9639WINDOWS-HOTFIX-MS16-030-437b8cd4-e716-4372-b424-4da358b58a35WINDOWS-HOTFIX-MS16-030-74391f30-218c-4221-89cd-884213093dcfWINDOWS-HOTFIX-MS16-030-7d85135a-b8ea-457d-b85e-cd798e36b968WINDOWS-HOTFIX-MS16-030-ab98f916-6caa-488b-af90-39f637e71e56WINDOWS-HOTFIX-MS16-030-ace28841-e47f-4cff-9e2f-9784641f0aeeWINDOWS-HOTFIX-MS16-030-c0e25eb8-c9d3-4cae-8658-a5ed42c82fa5WINDOWS-HOTFIX-MS16-030-d8bbe54b-4c62-4650-a754-2669f0cf2588WINDOWS-HOTFIX-MS16-030-db589a87-68ac-4ed2-91eb-536342089a50WINDOWS-HOTFIX-MS16-030-ea11c96d-9ad1-4b8c-8151-727104845206WINDOWS-HOTFIX-MS16-030-f346043e-7f84-475b-a2a3-975ad99a67b3WINDOWS-HOTFIX-MS16-030-fbf32548-f874-41d0-a976-203cb9f885bbWINDOWS-HOTFIX-MS16-030-fcaeed94-97c0-4fbb-8078-871f705016ab
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.