Description
Multiple serious vulnerabilities have been found in Microsoft products. Malicious users can exploit these vulnerabilities to execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- Improper fonts handling can be exploited remotely via a specially designed web site;
- Improper fonts handling can be exploited remotely via a specially designed document or web site.
Original advisories
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Silverlight
- Microsoft-Office-Live-Meeting-2007
- Microsoft-Lync
- Microsoft-Office
- Microsoft-Lync-2010-Attendee
- Microsoft-Windows-Vista-4
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Microsoft-Windows-Server-2003
- Windows-RT
CVE list
- CVE-2015-1671 critical
- CVE-2015-1670 warning
KB list
- 3045171
- 2881073
- 2883029
- 3051466
- 3056819
- 3039779
- 3048068
- 3048077
- 3048074
- 3051468
- 3048072
- 3048073
- 3048070
- 3048071
- 3051467
- 3057110
- 3051465
- 3051464
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!