7.2
CVSSv2

CVE-2016-0041

Published: 10/02/2016 Updated: 12/10/2018
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold and 1511, and Internet Explorer 10 and 11 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "DLL Loading Remote Code Execution Vulnerability."

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 8.1

microsoft windows server 2012

microsoft windows 7

microsoft windows server 2008

microsoft internet explorer 11

microsoft internet explorer 10

microsoft windows server 2008 r2

microsoft windows vista

microsoft windows rt 8.1

microsoft windows server 2012 r2

microsoft windows 10 1511

microsoft windows 10 -

Exploits

require 'zip' require 'base64' require 'msf/core' require 'rex/ole' class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::FILEFORMAT include Msf::Exploit::EXE def initialize(info = {}) super(update_info(info, 'Name' => 'Office OLE Multiple DLL Side Loading Vulnerabilities', 'Descri ...