Description
Multiple serious vulnerabilities have been found in Microsoft products. Malicious users can exploit these vulnerabilities to execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- Improper fonts handling can be exploited remotely via a specially designed web site;
- Improper fonts handling can be exploited remotely via a specially designed document or web site.
Original advisories
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Silverlight
- Microsoft-Office-Live-Meeting-2007
- Microsoft-Lync
- Microsoft-Office
- Microsoft-Lync-2010-Attendee
- Microsoft-Windows-Vista
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Microsoft-Windows-Server-2003
- Windows-RT
CVE list
- CVE-2015-1671 critical
- CVE-2015-1670 warning
KB list
- 3045171
- 2881073
- 2883029
- 3051466
- 3056819
- 3039779
- 3048068
- 3048077
- 3048074
- 3051468
- 3048072
- 3048073
- 3048070
- 3048071
- 3051467
- 3057110
- 3051465
- 3051464
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!