Beschreibung
Multiple serious vulnerabilities have been found in Microsoft products. Malicious users can exploit these vulnerabilities to gain privileges, bypass security restrictions, cause denial of service or obtain sensitive information.
Below is a complete list of vulnerabilities
- Improper memory initialization can be exploited remotely via a specially designed TIFF, PNG or JXR image;
- Incorrect impersonation handling can be exploited locally via processes manipulations, specially designed task, running AppCompatCache with specially designed DLL or specially designed application;
- Directory traversal vulnerability can be exploited remotely via a specially designed executable file;
- An unspecified vulnerability can be exploited locally via a specially designed application;
- Lack of virtual stores restrictions can be exploited locally via a specially designed application;
- An unknown vulnerability can be exploited remotely via vectors related to Windows Error Reporting;
- Lack of domain restrictions can be exploited remotely via DNS and LDAP spoofing;
- An unknown vulnerability can be exploited remotely via traffic sniffing;
- An unknown vulnerability can be exploited remotely via vectors related to User Profile Service.
Ursprüngliche Informationshinweise
- CVE-2015-0062
- CVE-2015-0015
- CVE-2015-0061
- CVE-2015-0004
- CVE-2015-0080
- CVE-2015-0006
- CVE-2015-0005
- CVE-2015-0001
- CVE-2015-0075
- CVE-2015-0073
- CVE-2015-0002
- CVE-2015-0076
- CVE-2015-0084
- CVE-2015-0011
CVE Liste
- CVE-2015-0016 critical
- CVE-2015-0062 critical
- CVE-2015-0015 critical
- CVE-2015-0061 critical
- CVE-2015-0004 critical
- CVE-2015-0080 critical
- CVE-2015-0006 critical
- CVE-2015-0005 critical
- CVE-2015-0001 critical
- CVE-2015-0075 critical
- CVE-2015-0073 critical
- CVE-2015-0002 critical
- CVE-2015-0076 critical
- CVE-2015-0084 critical
- CVE-2015-0011 critical
KB Liste
- 3019978
- 3019215
- 3021674
- 3038680
- 3014029
- 3035132
- 3023299
- 3023266
- 3029944
- 3020387
- 3035126
- 3002657
- 3025421
- 3022777
- 3004365
- 3031432
- 3030377
- 3035131
- 3020388
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!