TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2015-0016

HIGHCISA KEV
7.8

Beschreibung

Directory traversal vulnerability in the TS WebProxy (aka TSWbPrxy) component in Microsoft Windows Vista SP2, Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via a crafted pathname in an executable file, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Directory Traversal Elevation of Privilege Vulnerability."

CVE Details

CVSS v3.1 Bewertung7.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionREQUIRED
Veroffentlicht1/13/2015
Zuletzt geandert4/22/2026
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerMicrosoft
ProduktWindows
SchwachstellennameMicrosoft Windows TS WebProxy Directory Traversal Vulnerability
KEV Aufnahmedatum2022-05-25
Behebungsfrist2022-06-15
Ransomware-NutzungUnknown

Betroffene Produkte

microsoft:windows_7microsoft:windows_8microsoft:windows_8.1microsoft:windows_rtmicrosoft:windows_rt_8.1microsoft:windows_server_2008microsoft:windows_server_2012microsoft:windows_vista

Schwachen (CWE)

CWE-22CWE-22

Referenzen

http://secunia.com/advisories/62076(af854a3a-2127-422b-91ae-364da2661108)
http://www.exploit-db.com/exploits/35983(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/71965(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1031524(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.