Windows Reader in Microsoft Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 allows remote attackers to execute arbitrary code via a crafted Reader file, aka "Microsoft Windows Reader Vulnerability."
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securitytracker.com/id/1034973 | Third Party Advisory VDB Entry | 
| http://www.zerodayinitiative.com/advisories/ZDI-16-156 | Third Party Advisory VDB Entry | 
| https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-012 | Patch Vendor Advisory | 
| http://www.securitytracker.com/id/1034973 | Third Party Advisory VDB Entry | 
| http://www.zerodayinitiative.com/advisories/ZDI-16-156 | Third Party Advisory VDB Entry | 
| https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-012 | Patch Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2016-02-10 11:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-0046
Mitre link : CVE-2016-0046
CVE.ORG link : CVE-2016-0046
JSON object : View
Products Affected
                microsoft
- windows_10
- windows_8.1
- windows_server_2012
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
