Description
Multiple serious vulnerabilities have been found in Microsoft products. Malicious users can exploit these vulnerabilities to gain privileges, bypass security restrictions, cause denial of service and obtain sensitive information.
Below is a complete list of vulnerabilities
- Improper address information restrictions, improper token validation and improper functions intialization can be exploited locally via a specially designed application;
- Unknown vulnerability can be exploited locally via a specially designed application.
Original advisories
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Windows-Vista-4
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Microsoft-Windows-Server-2003
- Windows-RT
CVE list
- CVE-2015-0077 warning
- CVE-2015-0078 high
- CVE-2015-0095 high
- CVE-2015-0094 warning
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!