{"vulnerability": "CVE-2016-3393", "sightings": [{"uuid": "64bf845f-a6ee-4ee1-b965-467ab96fef49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-3393", "type": "seen", "source": "MISP/5808a24a-2ae8-45cf-85c8-2227bce2ab96", "content": "", "creation_timestamp": "2020-04-28T08:18:15.000000Z"}, {"uuid": "632dc8e9-67ff-4c87-9fba-40c68e4d0acb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-3393", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:03.000000Z"}, {"uuid": "d6cd9b12-223a-4912-bc41-fd7106710ca5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-3393", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971620", "content": "", "creation_timestamp": "2024-12-24T20:31:56.788789Z"}, {"uuid": "50015447-1a82-4844-aa76-ae98178a430c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-3393", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:11.000000Z"}, {"uuid": "7b2eed89-acda-4cf7-8588-b9400d84b7f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2016-3393", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/acd116fc-5cd1-4a3c-8753-15d7951f218a", "content": "", "creation_timestamp": "2026-02-02T12:27:27.012932Z"}, {"uuid": "b45bb4f9-95ec-401f-8fc7-7cee7076e7c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-3393", "type": "seen", "source": "Telegram/qtUbcQgUhins7VCN-wDM68SOhflB98i2tyDh8FYgcpLup1op", "content": "", "creation_timestamp": "2025-02-14T10:00:28.000000Z"}, {"uuid": "f506c72a-f46c-4f23-a396-917ead0daa3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-3393", "type": "seen", "source": "https://t.me/arpsyndicate/969", "content": "#ExploitObserverAlert\n\nCVE-2016-3393\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2016-3393. Graphics Device Interface (aka GDI or GDI ) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows remote attackers to execute arbitrary code via a crafted web site, aka \"Windows Graphics Component RCE Vulnerability.\"\n\nFIRST-EPSS: 0.462950000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-12-03T15:42:25.000000Z"}]}