Beschreibung
Multiple serious vulnerabilities have been found in Microsoft products. Malicious users can exploit these vulnerabilities to gain privileges, bypass security restrictions, cause denial of service and obtain sensitive information.
Below is a complete list of vulnerabilities
- Improper address information restrictions, improper token validation and improper functions intialization can be exploited locally via a specially designed application;
- Unknown vulnerability can be exploited locally via a specially designed application.
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2015-0077 critical
- CVE-2015-0078 critical
- CVE-2015-0095 critical
- CVE-2015-0094 critical
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!