Microsoft Monthly Security Update (Oct 2016)
Last Update Date:
12 Oct 2016 14:24
Release Date:
12 Oct 2016
3927
Views
RISK: Extremely High Risk
TYPE: Operating Systems - Windows OS

Microsoft has released monthly security update for their products:
Vulnerable Product | Severity | Impacts | Notes | Details (including CVE) |
Windows (Graphics Component) | ![]() | Remote Code Execution Information Disclosure Elevation of Privilege | Exploits in the wild | MS16-120 |
Internet Explorer | ![]() | Remote Code Execution | Scattered Exploits | MS16-118 |
Edge | ![]() | Remote Code Execution | Scattered Exploits | MS16-119 |
Office | ![]() | Remote Code Execution | Scattered Exploits | MS16-121 |
Windows (Internet Messaging API) | ![]() | Information Disclosure | Exploits in the wild | MS16-126 |
Windows (Video Control) | ![]() | Remote Code Execution | MS16-122 | |
Windows (Kernel-Mode Drivers) | ![]() | Elevation of Privilege | MS16-123 | |
Windows (Registry) | ![]() | Elevation of Privilege | MS16-124 | |
Windows (Diagnostic Hub) | ![]() | Elevation of Privilege | MS16-125 |
Number of 'Extremely Critical' product(s): 1
Number of 'Highly Critical' product(s): 4
Number of 'Moderately Critical' product(s): 4
Evaluation of overall 'Criticality Level': Extremely Critical
Impact
- Elevation of Privilege
- Remote Code Execution
- Security Restriction Bypass
- Information Disclosure
System / Technologies affected
- Internet Explorer 9, 10, 11
- Edge
- Office 2007, 2010, 2013, 2013 RT, 2016, Mac 2011, 2016 for Mac, Web Apps 2010, Web Apps 2013, Online Server
- SharePoint Server 2010, 2013
- Windows Vista, 7, 8.1, RT 8.1, 10
- Windows Server 2008, 2008 R2, 2012, 2012 R2
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- The vendor has issued security updates for the products. Please refer to 'Details' column in the above table for details of individual product update or run software update.
Vulnerability Identifier
Source
Related Link
Share with