Beschreibung
Multiple serious vulnerabilities have been found in Microsoft products. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- Incorrect memory initialization can be exploited remotely via an unknown vectors;
- Improper buffer handling can be exploited remotely via an unknown vectors;
- Improper memory handling can be exploited remotely via a specially designed application;
- Improper data validation can be exploited remotely via a specially designed application and other unknown vectors;
- Improper URLs sanitation can be exploited remotely via a specially designed URL;
- Improper user validation can be exploited locally via a DLL hijack.
Ursprüngliche Informationshinweise
- Microsoft advisory
- Microsoft advisory
- Microsoft advisory
- CVE-2015-1725
- CVE-2015-1724
- CVE-2015-1727
- CVE-2015-1726
- CVE-2015-1723
- CVE-2015-1722
- CVE-2015-2360
- CVE-2015-1768
- CVE-2015-1721
- CVE-2015-1720
- CVE-2015-1758
- CVE-2015-1757
- CVE-2015-1756
- CVE-2015-1719
CVE Liste
- CVE-2015-1725 critical
- CVE-2015-1724 critical
- CVE-2015-1727 critical
- CVE-2015-1726 critical
- CVE-2015-1723 critical
- CVE-2015-1722 critical
- CVE-2015-2360 critical
- CVE-2015-1768 critical
- CVE-2015-1721 critical
- CVE-2015-1720 critical
- CVE-2015-1758 critical
- CVE-2015-1757 critical
- CVE-2015-1756 critical
- CVE-2015-1719 critical
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!