Beschreibung
Multiple serious vulnerabilities have been found in Microsoft products. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause denial of service, gain privileges or obtain sensitive information.
Below is a complete list of vulnerabilities
- An unknown vulnerability can be exploited remotely via a specially designed XML data or specially designed application;
- Improper memory handling and other unknown vulnerability can be exploited locally via a specially designed application;
- Improper memory address validation can be exploited locally via a specially designed application or .msc file;
- Improper ASL usage can be exploited remotely via a specially designed web site;
- An weak encryption can be exploited remotely via an unknown vectors.
Ursprüngliche Informationshinweise
- CVE-2015-1686
- CVE-2015-1684
- CVE-2015-1702
- CVE-2015-1679
- CVE-2015-1678
- CVE-2015-1680
- CVE-2015-1672
- CVE-2015-1701
- CVE-2015-1677
- CVE-2015-1676
- CVE-2015-1681
- CVE-2015-1674
- CVE-2015-1673
- CVE-2015-1716
CVE Liste
- CVE-2015-1686 critical
- CVE-2015-1684 critical
- CVE-2015-1702 critical
- CVE-2015-1679 critical
- CVE-2015-1678 critical
- CVE-2015-1680 critical
- CVE-2015-1672 critical
- CVE-2015-1701 critical
- CVE-2015-1677 critical
- CVE-2015-1676 critical
- CVE-2015-1681 critical
- CVE-2015-1674 critical
- CVE-2015-1673 critical
- CVE-2015-1716 critical
KB Liste
- 3045171
- 3050941
- 3049563
- 3050946
- 3050945
- 3032655
- 3055642
- 3023221
- 3051768
- 3035490
- 3023219
- 3050514
- 3057263
- 3023211
- 3023213
- 3023215
- 3023217
- 3032662
- 3032663
- 3023220
- 3057134
- 3023222
- 3061518
- 3057191
- 3035489
- 3035488
- 3035487
- 3035486
- 3035485
- 3023223
- 3023224
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!