December 2015 |
|
|
|
MS15-135 |
Windows Kernel Memory Elevation of Privilege Vulnerability |
CVE-2015-6171 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-135 |
Windows Kernel Memory Elevation of Privilege Vulnerability |
CVE-2015-6173 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-135 |
Windows Kernel Memory Elevation of Privilege Vulnerability |
CVE-2015-6174 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-135 |
Windows Kernel Memory Elevation of Privilege Vulnerability |
CVE-2015-6175 |
ChenDong Li of Tencent |
MS15-134 |
Windows Media Center Information Disclosure Vulnerability |
CVE-2015-6127 |
Francisco Falcon of Core Security |
MS15-134 |
Media Center Library Parsing RCE Vulnerability |
CVE-2015-6131 |
Zhang YunHai of NSFOCUS Security Team |
MS15-134 |
Windows Library Loading Remote Code Execution Vulnerability |
CVE-2015-6128 |
Steven Vittitoe of Google Project Zero |
MS15-134 |
Windows Library Loading Remote Code Execution Vulnerability |
CVE-2015-6128 |
Parvez Anwar |
MS15-132 |
Windows Library Loading Remote Code Execution Vulnerability |
CVE-2015-6132 |
Yorick Koster of Securify B.V. |
MS15-132 |
Windows Library Loading Remote Code Execution Vulnerability |
CVE-2015-6132 |
Steven Vittitoe of Google Project Zero |
MS15-131 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-6040 |
Steven Vittitoe of Google Project Zero |
MS15-131 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-6118 |
Kai Lu of Fortinet's FortiGuard Labs |
MS15-131 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-6122 |
Steven Vittitoe of Google Project Zero |
MS15-131 |
Microsoft Office RCE Vulnerability |
CVE-2015-6172 |
Haifei Li |
MS15-131 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-6177 |
Kai Lu of Fortinet's FortiGuard Labs |
MS15-130 |
Windows Integer Underflow Vulnerability |
CVE-2015-6130 |
Hossein Lotfi, Secunia Research (now part of Flexera Software) |
MS15-129 |
Microsoft Silverlight Information Disclosure Vulnerability |
CVE-2015-6165 |
Marcin 'Icewall' Noga of Cisco Talos |
MS15-128 |
Graphics Memory Corruption Vulnerability |
CVE-2015-6106 |
Steven Vittitoe of Google Project Zero |
MS15-128 |
Graphics Memory Corruption Vulnerability |
CVE-2015-6107 |
Steven Vittitoe of Google Project Zero |
MS15-126 |
Scripting Engine Information Disclosure Vulnerability |
CVE-2015-6135 |
Simon Zuckerbraun, working with HP’s Zero Day Initiative |
MS15-126 |
Scripting Engine Memory Corruption Vulnerability |
CVE-2015-6136 |
Simon Zuckerbraun, working with HP’s Zero Day Initiative |
MS15-126 |
Scripting Engine Memory Corruption Vulnerability |
CVE-2015-6136 |
An anonymous researcher, working with HP’s Zero Day Initiative |
MS15-126 |
Scripting Engine Memory Corruption Vulnerability |
CVE-2015-6136 |
Yuki Chen of Qihoo 360Vulcan Team |
MS15-126 |
Scripting Engine Memory Corruption Vulnerability |
CVE-2015-6137 |
Anonymous contributor, working with VeriSign iDefense Labs |
MS15-125 |
Microsoft Browser Elevation of Privilege Vulnerability |
CVE-2015-6139 |
Michal Bentkowski |
MS15-125 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6140 |
Bo Qu of Palo Alto Networks |
MS15-125 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6142 |
Simon Zuckerbraun, working with HP’s Zero Day Initiative |
MS15-125 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6142 |
Zheng Huang of the Baidu Scloud XTeam, working with VeriSign iDefense Labs |
MS15-125 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6148 |
A3F2160DCA1BDE70DA1D99ED267D5DC1EC336192, working with HP’s Zero Day Initiative |
MS15-125 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6151 |
Li Kemeng of Baidu Security Team(x-Team) , working with HP’s Zero Day Initiative |
MS15-125 |
Microsoft Edge Memory Corruption Vulnerability |
CVE-2015-6153 |
Shi Ji (@Puzzor) of VARAS@IIE |
MS15-125 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6154 |
ChenDong Li and YunZe Ni of Tencent |
MS15-125 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6155 |
Zheng Huang of the Baidu Scloud XTeam, working with VeriSign iDefense Labs |
MS15-125 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6158 |
Zheng Huang of the Baidu Scloud XTeam, working with VeriSign iDefense Labs |
MS15-125 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6159 |
Zheng Huang of the Baidu Scloud XTeam |
MS15-125 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6159 |
Jason Kratzer, working with HP’s Zero Day Initiative |
MS15-125 |
Microsoft Browser ASLR Bypass |
CVE-2015-6161 |
Rh0 |
MS15-125 |
Microsoft Edge Memory Corruption Vulnerability |
CVE-2015-6168 |
SkyLined, working with HP’s Zero Day Initiative |
MS15-125 |
Microsoft Edge Spoofing Vulnerability |
CVE-2015-6169 |
Stephan Brunner |
MS15-125 |
Microsoft Edge Elevation of Privilege Vulnerability |
CVE-2015-6170 |
Mario Heiderich of Cure53 |
MS15-125 |
Microsoft Edge XSS Filter Bypass Vulnerability |
CVE-2015-6176 |
Masato Kinugawa |
MS15-124 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6083 |
Hui Gao of Palo Alto Networks |
MS15-124 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6083 |
B6BEB4D5E828CF0CCB47BB24AAC22515, working with HP’s Zero Day Initiative |
MS15-124 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6134 |
SkyLined, working with HP’s Zero Day Initiative |
MS15-124 |
Scripting Engine Information Disclosure Vulnerability |
CVE-2015-6135 |
Simon Zuckerbraun, working with HP’s Zero Day Initiative |
MS15-124 |
Scripting Engine Information Disclosure Vulnerability |
CVE-2015-6136 |
Simon Zuckerbraun, working with HP’s Zero Day Initiative |
MS15-124 |
Microsoft Browser Elevation of Privilege Vulnerability |
CVE-2015-6139 |
Michal Bentkowski |
MS15-124 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6140 |
Bo Qu of Palo Alto Networks |
MS15-124 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6141 |
B6BEB4D5E828CF0CCB47BB24AAC22515, working with HP’s Zero Day Initiative |
MS15-124 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6142 |
Simon Zuckerbraun, working with HP’s Zero Day Initiative |
MS15-124 |
Microsoft Browser XSS Filter Bypass Vulnerability |
CVE-2015-6144 |
Masato Kinugawa |
MS15-124 |
Microsoft Browser XSS Filter Bypass Vulnerability |
CVE-2015-6144 |
Filedescriptor |
MS15-124 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6145 |
Cong Zhang and Yi Jiang, working with Beijing VRV Software Co., LTD. |
MS15-124 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6146 |
Bo Qu of Palo Alto Networks |
MS15-124 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6147 |
B6BEB4D5E828CF0CCB47BB24AAC22515, working with HP’s Zero Day Initiative |
MS15-124 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6148 |
A3F2160DCA1BDE70DA1D99ED267D5DC1EC336192, working with HP’s Zero Day Initiative |
MS15-124 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6149 |
B6BEB4D5E828CF0CCB47BB24AAC22515, working with HP’s Zero Day Initiative |
MS15-124 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6150 |
B6BEB4D5E828CF0CCB47BB24AAC22515, working with HP’s Zero Day Initiative |
MS15-124 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6151 |
Li Kemeng of Baidu Security Team(x-Team) , working with HP’s Zero Day Initiative |
MS15-124 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6152 |
Moritz Jodeit of Blue Frost Security |
MS15-124 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6153 |
Shi Ji (@Puzzor) of VARAS@IIE |
MS15-124 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6154 |
ChenDong Li and YunZe Ni of Tencent |
MS15-124 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6155 |
Zheng Huang of the Baidu Scloud XTeam, working with VeriSign iDefense Labs |
MS15-124 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6156 |
Anonymous contributor, working with VeriSign iDefense Labs |
MS15-124 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6157 |
Zheng Huang of the Baidu Scloud XTeam, working with VeriSign iDefense Labs |
MS15-124 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6158 |
Zheng Huang of the Baidu Scloud XTeam, working with VeriSign iDefense Labs |
MS15-124 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6159 |
Zheng Huang of the Baidu Scloud XTeam |
MS15-124 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6159 |
Jason Kratzer, working with HP’s Zero Day Initiative |
MS15-124 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6160 |
Garage4Hackers, working with HP’s Zero Day Initiative |
MS15-124 |
Internet Explorer ASLR Bypass |
CVE-2015-6161 |
Rh0 |
MS15-124 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6162 |
Wenxiang Qian of TencentQQBrowser |
November 2015 |
|
|
|
MS15-123 |
Server Input Validation Information Disclosure Vulnerability |
CVE-2015-6061 |
Fatih Ozavci - Sense of Security |
MS15-122 |
Windows Kerberos Security Feature Bypass |
CVE-2015-6095 |
Ian Haken of Synopsys Inc. |
MS15-119 |
Winsock Elevation of Privilege Vulnerability |
CVE-2015-2478 |
Alex Ionescu of Winsider Seminars & Solutions Inc. |
MS15-119 |
Winsock Elevation of Privilege Vulnerability |
CVE-2015-2478 |
Thomas Faber, of CrowdStrike Inc. |
MS15-118 |
.NET Elevation of Privilege Vulnerability |
CVE-2015-6099 |
John Page aka hyp3rlinx |
MS15-117 |
Windows NDIS Elevation of Privilege Vulnerability |
CVE-2015-6098 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-116 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-6038 |
Steven Seeley of Source Incite, working with HP’s Zero Day Initiative |
MS15-116 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-6091 |
Steven Vittitoe of Google Project Zero |
MS15-116 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-6092 |
Steven Vittitoe of Google Project Zero |
MS15-116 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-6093 |
SignalSEC Research, working with HP’s Zero Day Initiative |
MS15-116 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-6094 |
Steven Seeley of Source Incite, working with HP’s Zero Day Initiative |
MS15-116 |
Microsoft Outlook for Mac Spoofing Vulnerability |
CVE-2015-6123 |
Mark Robbins Rebelmail |
MS15-115 |
Windows Kernel Memory Elevation of Privilege Vulnerability |
CVE-2015-6100 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-115 |
Windows Kernel Memory Elevation of Privilege Vulnerability |
CVE-2015-6101 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-115 |
Windows Kernel Memory Information Disclosure Vulnerability |
CVE-2015-6102 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-115 |
Windows Graphics Memory Remote Code Execution Vulnerability |
CVE-2015-6103 |
Mateusz Jurczyk of Google Project Zero |
MS15-115 |
Windows Graphics Memory Remote Code Execution Vulnerability |
CVE-2015-6104 |
Mateusz Jurczyk of Google Project Zero |
MS15-115 |
Windows Kernel Security Feature Bypass Vulnerability |
CVE-2015-6113 |
James Forshaw of Google Project Zero |
MS15-114 |
Windows Journal Heap Overflow Vulnerability |
CVE-2015-6097 |
Jason Kratzer, working with VeriSign iDefense Labs |
MS15-113 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6064 |
Simon Zuckerbraun, working with HP’s Zero Day Initiative |
MS15-113 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6073 |
Kai Kang of Tencent's Xuanwu LAB |
MS15-113 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6078 |
Bo Qu of Palo Alto Networks |
MS15-113 |
Microsoft Browser ASLR Bypass |
CVE-2015-6088 |
JaeHun Jeong |
MS15-112 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6064 |
Simon Zuckerbraun, working with HP’s Zero Day Initiative |
MS15-112 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6065 |
Jason Kratzer, working with VeriSign iDefense Labs |
MS15-112 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6065 |
B6BEB4D5E828CF0CCB47BB24AAC22515, working with HP’s Zero Day Initiative |
MS15-112 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6066 |
Bo Qu of Palo Alto Networks |
MS15-112 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6068 |
Zheng Huang of the Baidu Scloud XTeam, working with VeriSign iDefense Labs |
MS15-112 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6069 |
Bo Qu of Palo Alto Networks |
MS15-112 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6070 |
Tongbo Luo of Palo Alto Networks |
MS15-112 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6070 |
Bo Qu of Palo Alto Networks |
MS15-112 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6071 |
Bo Qu of Palo Alto Networks |
MS15-112 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6072 |
Kai Kang of Tencent's Xuanwu LAB |
MS15-112 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6073 |
Kai Kang of Tencent's Xuanwu LAB |
MS15-112 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6075 |
0011, working with HP’s Zero Day Initiative |
MS15-112 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6076 |
Anonymous, working with HP’s Zero Day Initiative |
MS15-112 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6077 |
0016EECD9D7159A949DAD3BC17E0A939, working with HP’s Zero Day Initiative, and Linan Hao of Qihoo 360 |
MS15-112 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6077 |
Linan Hao of Qihoo 360 Vulcan Team |
MS15-112 |
Microsoft Browser Memory Corruption Vulnerability |
CVE-2015-6078 |
Bo Qu of Palo Alto Networks |
MS15-112 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6079 |
Zheng Huang of the Baidu Scloud XTeam |
MS15-112 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6080 |
Zheng Huang of the Baidu Scloud XTeam |
MS15-112 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6081 |
B6BEB4D5E828CF0CCB47BB24AAC22515, working with HP’s Zero Day Initiative |
MS15-112 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6082 |
Zheng Huang of the Baidu Scloud XTeam |
MS15-112 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6084 |
Zheng Huang of the Baidu Scloud XTeam, working with VeriSign iDefense Labs |
MS15-112 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6085 |
Jason Kratzer, working with VeriSign iDefense Labs |
MS15-112 |
Internet Explorer Information Disclosure Vulnerability |
CVE-2015-6086 |
Ashfaq Ansari, working with HP’s Zero Day Initiative |
MS15-112 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6087 |
Bo Qu of Palo Alto Networks |
MS15-112 |
Scripting Engine Memory Corruption Vulnerability |
CVE-2015-6089 |
Yuki Chen of Qihoo 360 Vulcan Team |
MS15-099 |
Microsoft Office Malformed EPS File Vulnerability |
CVE-2015-2545 |
Genwei Jiang of FireEye, Inc. |
SA3108638 |
N/A |
CVE-2015-5307 |
Ben Serebrin of Google |
October 2015 |
|
|
|
MS15-111 |
Windows Kernel Memory Corruption Vulnerability |
CVE-2015-2549 |
dbc282f4f2f7d2466fa0078bf8034d99 |
MS15-111 |
Windows Elevation of Privilege Vulnerability |
CVE-2015-2550 |
Ashutosh Mehra, working with HP’s Zero Day Initiative |
MS15-111 |
Windows Mount Point Elevation of Privilege Vulnerability |
CVE-2015-2553 |
James Forshaw of Google Project Zero |
MS15-111 |
Windows Object Reference Elevation of Privilege Vulnerability |
CVE-2015-2554 |
James Forshaw of Google Project Zero |
MS15-110 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-2555 |
3S Labs, working with HP’s Zero Day Initiative |
MS15-110 |
Microsoft Sharepoint Information Disclosure Vulnerability |
CVE-2015-2556 |
Jakub Palaczynski of ING Services Polska |
MS15-110 |
Microsoft Office Memory Corruption Vulnerabilties |
CVE-2015-2557 |
kdot, working with HP’s Zero Day Initiative |
MS15-110 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-2558 |
3S Labs, working with HP’s Zero Day Initiative |
MS15-109 |
Toolbar Use After Free Vulnerability |
CVE-2015-2515 |
Heige (a.k.a. SuperHei) from Knownsec 404 Security Team |
MS15-109 |
Microsoft Tablet Input Band Use After Free Vulnerability |
CVE-2015-2548 |
Heige (a.k.a. SuperHei) from Knownsec 404 Security Team and Hui Gao of Palo Alto Networks |
MS15-108 |
Scripting Engine Memory Corruption Vulnerability |
CVE-2015-2482 |
Skylined, working with HP’s Zero Day Initiative |
MS15-108 |
VBScript and JScript ASLR Bypass |
CVE-2015-6052 |
Bill Finlayson, Vectra Networks |
MS15-108 |
Scripting Engine Memory Corruption Vulnerability |
CVE-2015-6055 |
Simon Zuckerbraun, working with HP’s Zero Day Initiative |
MS15-108 |
Scripting Engine Memory Corruption Vulnerability |
CVE-2015-6055 |
An anonymous researcher, working with HP’s Zero Day Initiative |
MS15-108 |
Scripting Engine Information Disclosure Vulnerability |
CVE-2015-6059 |
Takeshi Terada of Mitsui Bussan Secure Directions, Inc. |
MS15-107 |
Microsoft Edge XSS Filter Bypass |
CVE-2015-6058 |
Noriaki Iwasaki of Cyber Defense Institute, Inc. |
MS15-107 |
Microsoft Edge XSS Filter Bypass |
CVE-2015-6058 |
Masato Kinugawa, Individual |
MS15-107 |
Microsoft Edge Information Disclosure Vulnerability |
CVE-2015-6057 |
Mario Heiderich of Cure53 |
MS15-106 |
Scripting Engine Memory Corruption Vulnerability |
CVE-2015-2482 |
Skylined, working with HP’s Zero Day Initiative |
MS15-106 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6042 |
Garage4Hackers, working with HP’s Zero Day Initiative |
MS15-106 |
Internet Explorer Elevation of Privilege Vulnerability |
CVE-2015-6044 |
Jack Tang of Trend Micro |
MS15-106 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6045 |
Zheng Huang of the Baidu Scloud XTeam, working with HP’s Zero Day Initiative |
MS15-106 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6045 |
Kai Kang of Tencent's Xuanwu LAB |
MS15-106 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6046 |
Jason Kratzer, working with VeriSign iDefense Labs |
MS15-106 |
Internet Explorer Elevation of Privilege Vulnerability |
CVE-2015-6047 |
Ashutosh Mehra, working with HP’s Zero Day Initiative |
MS15-106 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6048 |
Tongbo Luo of Palo Alto Networks |
MS15-106 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6048 |
Hui Gao of Palo Alto Networks |
MS15-106 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6048 |
Dhanesh Kizhakkinan of FireEye, Inc. |
MS15-106 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6049 |
Heige (a.k.a. SuperHei) from Knownsec 404 Security Team |
MS15-106 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-6050 |
Zheng Huang of the Baidu Scloud XTeam, working with HP’s Zero Day Initiative |
MS15-106 |
Internet Explorer Elevation of Privilege Vulnerability |
CVE-2015-6051 |
Ashutosh Mehra, working with HP’s Zero Day Initiative |
MS15-106 |
VBScript and JScript ASLR Bypass |
CVE-2015-6052 |
Bill Finlayson, Vectra Networks |
MS15-106 |
Internet Explorer Information Disclosure Vulnerability |
CVE-2015-6053 |
CK, working with HP’s Zero Day Initiative |
MS15-106 |
Scripting Engine Memory Corruption Vulnerability |
CVE-2015-6055 |
An anonymous researcher, working with HP’s Zero Day Initiative |
MS15-106 |
Scripting Engine Memory Corruption Vulnerability |
CVE-2015-6056 |
Aakash Jain and Dhanesh Kizhakkinan of FireEye, Inc. |
MS15-106 |
Scripting Engine Information Disclosure Vulnerability |
CVE-2015-6059 |
Takeshi Terada of Mitsui Bussan Secure Directions, Inc. |
MS15-106 |
Scripting Engine Memory Corruption Vulnerability |
CVE-2015-6184 |
Zheng Huang of the Baidu Scloud XTeam, working with HP’s Zero Day Initiative |
MS15-106 |
Defense-in-depth |
------------------- |
Mario Heiderich of Cure53 |
September 2015 |
|
|
|
MS15-103 |
Exchange Information Disclosure Vulnerability |
CVE-2015-2505 |
John Page of hyp3rlinx |
MS15-103 |
Exchange Spoofing Vulnerability |
CVE-2015-2543 |
Abdulrahman Alqabandi |
MS15-103 |
Exchange Spoofing Vulnerability |
CVE-2015-2544 |
Justin Khoo of FreshInbox |
MS15-102 |
Windows Task Management Elevation of Privilege Vulnerability |
CVE-2015-2524 |
James Forshaw of Google Project Zero |
MS15-102 |
Windows Task File Deletion Elevation of Privilege Vulnerability |
CVE-2015-2525 |
James Forshaw of Google Project Zero |
MS15-102 |
Windows Task Management Elevation of Privilege Vulnerability |
CVE-2015-2528 |
James Forshaw of Google Project Zero |
MS15-101 |
.NET Elevation of Privilege Vulnerability |
CVE-2015-2504 |
Yorick Koster of Securify B.V. |
MS15-101 |
MVC Denial of Service Vulnerability |
CVE-2015-2526 |
Roberto Suggi Liverani of NCIA (NATO Communications and Information Agency) |
MS15-100 |
Windows Media Center RCE Vulnerability |
CVE-2015-2509 |
Aaron Luo, Kenney Lu, and Ziv Chang of TrendMicro |
MS15-099 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-2520 |
Steven Vittitoe of Google Project Zero |
MS15-099 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-2521 |
Steven Vittitoe of Google Project Zero |
MS15-099 |
Microsoft SharePoint XSS Spoofing Vulnerability |
CVE-2015-2522 |
This vulnerability was discovered by Fortinet's FortiGuard Labs. |
MS15-099 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-2523 |
Steven Vittitoe of Google Project Zero |
MS15-099 |
Microsoft Office Malformed EPS File Vulnerability |
CVE-2015-2545 |
Genwei Jiang of FireEye, Inc. |
MS15-098 |
Windows Journal RCE Vulnerability |
CVE-2015-2513 |
Phil Blankenship of BeyondTrust Inc |
MS15-098 |
Windows Journal DoS Vulnerability |
CVE-2015-2514 |
Kai Lu of Fortinet's FortiGuard Labs |
MS15-098 |
Windows Journal DoS Vulnerability |
CVE-2015-2516 |
Kai Lu of Fortinet's FortiGuard Labs |
MS15-097 |
OpenType Font Parsing Vulnerability |
CVE-2015-2506 |
Piotr Bania and Andrea Allievi of Cisco Talos |
MS15-097 |
Font Driver Elevation of Privilege Vulnerability |
CVE-2015-2507 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-097 |
Font Driver Elevation of Privilege Vulnerability |
CVE-2015-2508 |
James Forshaw of Google Project Zero |
MS15-097 |
Graphics Component Buffer Overflow Vulnerability |
CVE-2015-2510 |
Steven Vittitoe of Google Project Zero |
MS15-097 |
Font Driver Elevation of Privilege Vulnerability |
CVE-2015-2511 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-097 |
Font Driver Elevation of Privilege Vulnerability |
CVE-2015-2512 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-097 |
Win32k Memory Corruption Elevation of Privilege Vulnerability |
CVE-2015-2517 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-097 |
Win32k Memory Corruption Elevation of Privilege Vulnerability |
CVE-2015-2518 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-097 |
Win32k Elevation of Privilege Vulnerability |
CVE-2015-2527 |
James Forshaw of Google Project Zero |
MS15-097 |
Kernel ASLR Bypass Vulnerability |
CVE-2015-2529 |
Matt Tait of Google Project Zero |
MS15-097 |
Win32k Memory Corruption Elevation of Privilege Vulnerability |
CVE-2015-2546 |
Wang Yu of FireEye, Inc. |
MS15-097 |
Defense-in-depth |
------------------- |
lokihardt@ASRT, working with HP’s Zero Day Initiative |
MS15-096 |
Active Directory Denial of Service Vulnerability |
CVE-2015-2535 |
Andrew Bartlett of Catalyst and the Samba Team |
MS15-095 |
Memory Corruption Vulnerability |
CVE-2015-2485 |
0016EECD9D7159A949DAD3BC17E0A939, working with HP’s Zero Day Initiative |
MS15-095 |
Memory Corruption Vulnerability |
CVE-2015-2486 |
0016EECD9D7159A949DAD3BC17E0A939, working with HP’s Zero Day Initiative |
MS15-094 |
Information Disclosure Vulnerability |
CVE-2015-2483 |
Shi Ji (@Puzzor) of VARAS@IIE |
MS15-094 |
Tampering Vulnerability |
CVE-2015-2484 |
Haifei Li of Intel Security IPS Research Team |
MS15-094 |
Memory Corruption Vulnerability |
CVE-2015-2485 |
0016EECD9D7159A949DAD3BC17E0A939, working with HP’s Zero Day Initiative |
MS15-094 |
Memory Corruption Vulnerability |
CVE-2015-2486 |
0016EECD9D7159A949DAD3BC17E0A939, working with HP’s Zero Day Initiative |
MS15-094 |
Memory Corruption Vulnerability |
CVE-2015-2487 |
Pawel Wylecial, working with HP’s Zero Day Initiative |
MS15-094 |
Elevation of Privilege Vulnerability |
CVE-2015-2489 |
5AECDBC12A3C178E19CF1E3CB5EDAA89, working with HP’s Zero Day Initiative |
MS15-094 |
Memory Corruption Vulnerability |
CVE-2015-2490 |
Bo Qu of Palo Alto Networks |
MS15-094 |
Memory Corruption Vulnerability |
CVE-2015-2491 |
Heige (a.k.a. SuperHei) from Knownsec 404 Security Team |
MS15-094 |
Memory Corruption Vulnerability |
CVE-2015-2492 |
Bo Qu of Palo Alto Networks |
MS15-094 |
Memory Corruption Vulnerability |
CVE-2015-2492 |
Dhanesh Kizhakkinan of FireEye, Inc. |
MS15-094 |
Scripting Engine Memory Corruption Vulnerability |
CVE-2015-2493 |
Bo Qu of Palo Alto Networks |
MS15-094 |
Memory Corruption Vulnerability |
CVE-2015-2494 |
Kai Song (exp-sky) of Tencent's Xuanwu LAB |
MS15-094 |
Memory Corruption Vulnerability |
CVE-2015-2498 |
B6BEB4D5E828CF0CCB47BB24AAC22515, working with HP’s Zero Day Initiative |
MS15-094 |
Memory Corruption Vulnerability |
CVE-2015-2499 |
B6BEB4D5E828CF0CCB47BB24AAC22515, working with HP’s Zero Day Initiative |
MS15-094 |
Memory Corruption Vulnerability |
CVE-2015-2500 |
B6BEB4D5E828CF0CCB47BB24AAC22515, working with HP’s Zero Day Initiative |
MS15-094 |
Memory Corruption Vulnerability |
CVE-2015-2501 |
Sean Verity, working with HP’s Zero Day Initiative |
MS15-094 |
Memory Corruption Vulnerability |
CVE-2015-2541 |
0016EECD9D7159A949DAD3BC17E0A939, working with HP’s Zero Day Initiative |
MS15-094 |
Defense-in-depth |
------------------- |
Yang Yu (@tombkeeper) of Tencent's Xuanwu Lab |
August 2015 |
|
|
|
MS15-093 |
Memory Corruption Vulnerability |
CVE-2015-2502 |
Clement Lecigne of Google Inc. |
MS15-092 |
RyuJIT Optimization Elevation of Privilege Vulnerability |
CVE-2015-2479 |
Nick Craver & Marc Gravell of Stack Overflow |
MS15-091 |
Memory Corruption Vulnerability |
CVE-2015-2441 |
Liu Long of the Qihoo 360 Vulcan Team |
MS15-090 |
Windows Registry Elevation of Privilege Vulnerability |
CVE-2015-2429 |
Ashutosh Mehra, working with HP’s Zero Day Initiative |
MS15-090 |
Windows Filesystem Elevation of Privilege Vulnerability |
CVE-2015-2430 |
Ashutosh Mehra, working with HP’s Zero Day Initiative |
MS15-087 |
UDDI Services Elevation of Privilege Vulnerability |
CVE-2015-2475 |
François-Xavier Stellamans from NCI Agency - Cyber Security / NCIRC |
MS15-084 |
MSXML Information Disclosure Vulnerability |
CVE-2015-2440 |
Ucha Gobejishvili, working with HP’s Zero Day Initiative |
MS15-083 |
Server Message Block Memory Corruption Vulnerability |
CVE-2015-2474 |
Tenable Network Security |
MS15-081 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-1642 |
This vulnerability was discovered by Fortinet's FortiGuard Labs |
MS15-081 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-1642 |
Yong Chuan Koh (@yongchuank) of MWR Labs (@mwrlabs) |
MS15-081 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-1642 |
s3tm3m@gmail.com, working with VeriSign iDefense Labs |
MS15-081 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-2467 |
Steven Vittitoe of Google Project Zero |
MS15-081 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-2468 |
Steven Vittitoe of Google Project Zero |
MS15-081 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-2469 |
Steven Vittitoe of Google Project Zero |
MS15-081 |
Microsoft Office Integer Underflow Vulnerability |
CVE-2015-2470 |
Steven Vittitoe of Google Project Zero |
MS15-081 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-2477 |
Steven Vittitoe of Google Project Zero |
MS15-081 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-2445 |
Jack Tang of Trend Micro |
MS15-080 |
Microsoft Office Graphics Component Remote Code Execution Vulnerability |
CVE-2015-2431 |
Steven Vittitoe of Google Project Zero |
MS15-080 |
OpenType Font Parsing Vulnerability |
CVE-2015-2432 |
Mateusz Jurczyk of Google Project Zero |
MS15-080 |
Kernel ASLR Bypass Vulnerability |
CVE-2015-2433 |
Matt Tait of Google Inc. |
MS15-080 |
TrueType Font Parsing Vulnerability |
CVE-2015-2435 |
KeenTeam's Jihui Lu and Peter Hlavaty, working with HP’s Zero Day Initiative |
MS15-080 |
Windows CSRSS Elevation of Privilege Vulnerability |
CVE-2015-2453 |
Liang Yin of Tencent PC Manager |
MS15-080 |
Windows KMD Security Feature Bypass Vulnerability |
CVE-2015-2454 |
Ashutosh Mehra, working with HP’s Zero Day Initiative |
MS15-080 |
TrueType Font Parsing Vulnerability |
CVE-2015-2455 |
Mateusz Jurczyk of Google Project Zero |
MS15-080 |
TrueType Font Parsing Vulnerability |
CVE-2015-2455 |
KeenTeam's Jihui Lu and Peter Hlavaty, working with HP’s Zero Day Initiative |
MS15-080 |
TrueType Font Parsing Vulnerability |
CVE-2015-2456 |
Mateusz Jurczyk of Google Project Zero |
MS15-080 |
OpenType Font Parsing Vulnerability |
CVE-2015-2458 |
Mateusz Jurczyk of Google Project Zero |
MS15-080 |
OpenType Font Parsing Vulnerability |
CVE-2015-2459 |
Mateusz Jurczyk of Google Project Zero |
MS15-080 |
OpenType Font Parsing Vulnerability |
CVE-2015-2460 |
Mateusz Jurczyk of Google Project Zero |
MS15-080 |
OpenType Font Parsing Vulnerability |
CVE-2015-2461 |
Mateusz Jurczyk of Google Project Zero |
MS15-080 |
OpenType Font Parsing Vulnerability |
CVE-2015-2462 |
Mateusz Jurczyk of Google Project Zero |
MS15-080 |
TrueType Font Parsing Vulnerability |
CVE-2015-2463 |
Mateusz Jurczyk of Google Project Zero |
MS15-080 |
TrueType Font Parsing Vulnerability |
CVE-2015-2464 |
Mateusz Jurczyk of Google Project Zero |
MS15-079 |
Memory Corruption Vulnerability |
CVE-2015-2442 |
Linan Hao of the Qihoo 360 Vulcan Team |
MS15-079 |
Memory Corruption Vulnerability |
CVE-2015-2443 |
An anonymous researcher, working with HP’s Zero Day Initiative |
MS15-079 |
Memory Corruption Vulnerability |
CVE-2015-2444 |
Moritz Jodeit of Blue Frost Security |
MS15-079 |
Security Feature Bypass Vulnerability |
CVE-2015-2445 |
Jack Tang of Trend Micro |
MS15-079 |
Memory Corruption Vulnerability |
CVE-2015-2446 |
Heige (a.k.a. SuperHei) from Knownsec 404 Security Team and Bo Qu of Palo Alto Networks |
MS15-079 |
Memory Corruption Vulnerability |
CVE-2015-2447 |
sweetchip@GRAYHASH |
MS15-079 |
Memory Corruption Vulnerability |
CVE-2015-2448 |
An anonymous researcher, working with HP’s Zero Day Initiative |
MS15-079 |
Security Feature Bypass Vulnerability |
CVE-2015-2449 |
Linan Hao of the Qihoo 360 Vulcan Team |
MS15-079 |
Memory Corruption Vulnerability |
CVE-2015-2450 |
0016EECD9D7159A949DAD3BC17E0A939, working with HP’s Zero Day Initiative |
MS15-079 |
Memory Corruption Vulnerability |
CVE-2015-2451 |
0016EECD9D7159A949DAD3BC17E0A939, working with HP’s Zero Day Initiative |
MS15-079 |
Memory Corruption Vulnerability |
CVE-2015-2452 |
0016EECD9D7159A949DAD3BC17E0A939, working with HP’s Zero Day Initiative |
July 2015 |
|
|
|
MS15-078 |
OpenType Font Driver Vulnerability |
CVE-2015-2426 |
Mateusz Jurczyk of Google Project Zero |
MS15-078 |
OpenType Font Driver Vulnerability |
CVE-2015-2426 |
Genwei Jiang of FireEye, Inc. |
MS15-078 |
OpenType Font Driver Vulnerability |
CVE-2015-2426 |
Moony Li of TrendMicro Company |
MS15-077 |
ATMFD.DLL Memory Corruption Vulnerability |
CVE-2015-2387 |
Google Project Zero and Morgan Marquis-Boire |
MS15-076 |
Windows RPC Elevation of Privilege Vulnerability |
CVE-2015-2370 |
James Forshaw of Google Project Zero |
MS15-075 |
OLE Elevation of Privilege Vulnerability |
CVE-2015-2416 |
Nicolas Joly @n_joly |
MS15-075 |
OLE Elevation of Privilege Vulnerability |
CVE-2015-2417 |
Nicolas Joly @n_joly |
MS15-074 |
Windows Installer EoP Vulnerability |
CVE-2015-2371 |
Mariusz Mlynski working with HP’s Zero Day Initiative |
MS15-073 |
Win32k Elevation of Privilege Vulnerability |
CVE-2015-2363 |
enSilo |
MS15-073 |
Win32k Elevation of Privilege Vulnerability |
CVE-2015-2363 |
Peng Qiu of 360Vulcan Team |
MS15-073 |
Win32k Elevation of Privilege Vulnerability |
CVE-2015-2365 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-073 |
Win32k Elevation of Privilege Vulnerability |
CVE-2015-2366 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-073 |
Win32k Information Disclosure Vulnerability |
CVE-2015-2367 |
WanderingGlitch of HP’s Zero Day Initiative |
MS15-073 |
Win32k Information Disclosure Vulnerability |
CVE-2015-2381 |
Matt Tait of Google Project Zero |
MS15-073 |
Win32k Information Disclosure Vulnerability |
CVE-2015-2382 |
Matt Tait of Google Project Zero |
MS15-072 |
Graphics Component EOP Vulnerability |
CVE-2015-2364 |
Nicolas Joly @n_joly |
MS15-070 |
Microsoft Excel ASLR Bypass Vulnerability |
CVE-2015-2375 |
3S Labs working with HP’s Zero Day Initiative |
MS15-070 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-2376 |
3S Labs, working with HP’s Zero Day Initiative |
MS15-070 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-2377 |
3S Labs, working with HP’s Zero Day Initiative |
MS15-070 |
Microsoft Excel DLL Remote Code Execution Vulnerability |
CVE-2015-2378 |
M1x7e1(ShiXiaoLei) of SafeyeTeam |
MS15-070 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-2379 |
Steven Vittitoe of Google Project Zero |
MS15-070 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-2380 |
Steven Vittitoe of Google Project Zero |
MS15-070 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-2415 |
Jack Tang of Trend Micro |
MS15-070 |
Microsoft Office Remote Code Execution Vulnerability |
CVE-2015-2424 |
The Labs Team of iSIGHT Partners |
MS15-070 |
Microsoft Office Remote Code Execution Vulnerability |
CVE-2015-2424 |
Edward Fjellskål of Telenor CERT |
MS15-069 |
Windows DLL Remote Code Execution Vulnerability |
CVE-2015-2368 |
Ashutosh Mehra, working with HP’s Zero Day Initiative |
MS15-069 |
DLL Planting Remote Code Execution Vulnerability |
CVE-2015-2369 |
Haifei Li of McAfee Labs IPS Team |
MS15-068 |
Hyper-V Buffer Overflow Vulnerability |
CVE-2015-2361 |
Thomas Garnier of Microsoft |
MS15-068 |
Hyper-V System Data Structure Vulnerability |
CVE-2015-2362 |
Thomas Garnier of Microsoft |
MS15-066 |
VBScript Memory Corruption Vulnerability |
CVE-2015-2372 |
Bo Qu of Palo Alto Networks |
MS15-066 |
VBScript Memory Corruption Vulnerability |
CVE-2015-2372 |
bilou, working with VeriSign iDefense Labs |
MS15-065 |
Internet Explorer Information Disclosure Vulnerability |
CVE-2015-1729 |
Mashiro YAMADA |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1733 |
JaeHun Jeong (@n3sk) of WINS, WSEC Analysis Team |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1738 |
Li Kemeng of Baidu Anti-virus Team |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1767 |
An anonymous researcher, working with HP’s Zero Day Initiative |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1767 |
Zheng Huang of the Baidu Scloud XTeam, working with HP’s Zero Day Initiative |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2383 |
Jason Kratzer, working with VeriSign iDefense Labs |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2383 |
Sky, working with HP’s Zero Day Initiative |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2383 |
Liu Long of the Qihoo 360 Vulcan Team |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2383 |
Jihui Lu of KeenTeam (@K33nTeam) |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2384 |
Liu Long of the Qihoo 360 Vulcan Team |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2385 |
Liu Long of the Qihoo 360 Vulcan Team |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2385 |
ChenDong Li of Tencent |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2388 |
B6BEB4D5E828CF0CCB47BB24AAC22515, working with HP’s Zero Day Initiative |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2389 |
Linan Hao of the Qihoo 360 Vulcan Team |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2390 |
Linan Hao of the Qihoo 360 Vulcan Team |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2391 |
Jack Tang of Trend Micro Inc. |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2397 |
AA32AF9897C15779037CD4FC1C1C13D7, working with HP’s Zero Day Initiative |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2397 |
A3F2160DCA1BDE70DA1D99ED267D5DC1EC336192, working with HP’s Zero Day Initiative |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2397 |
Bo Qu of Palo Alto Networks |
MS15-065 |
Internet Explorer XSS Filter Bypass Vulnerability |
CVE-2015-2398 |
Mario Heiderich |
MS15-065 |
Internet Explorer XSS Filter Bypass Vulnerability |
CVE-2015-2398 |
Carlos Munoz of WhiteHat Security (former) and Trustwave SpiderLabs (current) |
MS15-065 |
Internet Explorer Elevation of Privilege Vulnerability |
CVE-2015-2402 |
Ashutosh Mehra, working with HP’s Zero Day Initiative |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2403 |
ca0nguyen, working with HP’s Zero Day Initiative |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2404 |
4cbad7dc77d1a1af7d66b5ded6cd92a5, working with HP’s Zero Day Initiative |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2406 |
B6BEB4D5E828CF0CCB47BB24AAC22515, working with HP’s Zero Day Initiative |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2408 |
Zheng Huang of Baidu Scloud XTeam, working with HP’s Zero Day Initiative |
MS15-065 |
Internet Explorer Information Disclosure Vulnerability |
CVE-2015-2410 |
A Google Inc. employee |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2411 |
JeongHoon Shin |
MS15-065 |
Internet Explorer Information Disclosure Vulnerability |
CVE-2015-2412 |
Ashutosh Mehra, working with HP’s Zero Day Initiative |
MS15-065 |
Internet Explorer Information Disclosure Vulnerability |
CVE-2015-2413 |
Hiroshi Suzuki of Internet Initiative Japan Inc. |
MS15-065 |
Internet Explorer Information Disclosure Vulnerability |
CVE-2015-2414 |
Angelo Prado, Director, Product Security at Salesforce |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2422 |
Bo Qu of Palo Alto Networks |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2425 |
Bill Finlayson, Vectra Networks |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2425 |
Dhanesh Kizhakkinan of FireEye, Inc. |
MS15-065 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-2425 |
Peter Pi of TrendMicro |
3074162 |
MSRT Race Condition Vulnerability |
CVE-2015-2418 |
James Forshaw of Google Project Zero |
June 2015 |
|
|
|
MS15-063 |
Windows LoadLibrary EoP Vulnerability |
CVE-2015-1758 |
Takashi Yoshikawa of Mitsui Bussan Secure Directions, Inc. |
MS15-062 |
ADFS XSS Elevation of Privilege Vulnerability |
CVE-2015-1757 |
“John Hollenberger” and “Tate Hansen from FishNet Security” |
MS15-061 |
Microsoft Windows Kernel Information Disclosure Vulnerability |
CVE-2015-1719 |
Guo Pengfei of Qihoo 360 |
MS15-061 |
Microsoft Windows Kernel Use After Free Vulnerability |
CVE-2015-1720 |
KK of Tencent’s Xuanwu LAB |
MS15-061 |
Win32k Null Pointer Dereference Vulnerability |
CVE-2015-1721 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-061 |
Microsoft Windows Kernel Bitmap Handling Use After Free Vulnerability |
CVE-2015-1722 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-061 |
Microsoft Windows Station Use After Free Vulnerability |
CVE-2015-1723 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-061 |
Microsoft Windows Kernel Object Use After Free Vulnerability |
CVE-2015-1724 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-061 |
Win32k Buffer Overflow Vulnerability |
CVE-2015-1725 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-061 |
Microsoft Windows Kernel Brush Object Use After Free Vulnerability |
CVE-2015-1726 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-061 |
Win32k Pool Buffer Overflow Vulnerability |
CVE-2015-1727 |
Nils Sommer of bytegeist, working with Google Project Zero |
MS15-061 |
Win32k Elevation of Privilege Vulnerability |
CVE-2015-2360 |
Maxim Golovkin, Kaspersky Lab |
MS15-061 |
Win32k Elevation of Privilege Vulnerability |
CVE-2015-2360 |
enSilo Research Team |
MS15-059 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-1759 |
Ben Hawkes of Google Project Zero |
MS15-059 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-1760 |
Ben Hawkes of Google Project Zero |
MS15-059 |
Microsoft Office Uninitialized Memory Use Vulnerability |
CVE-2015-1770 |
Yong Chuan Koh (@yongchuank) MWR Labs (@mwrlabs) |
MS15-057 |
Windows Media Player RCE via DataObject Vulnerability |
CVE-2015-1728 |
bilou, working with VeriSign iDefense Labs |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1687 |
Pengfei Guo of Qihoo 360 |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1730 |
SkyLined, working with VeriSign iDefense Labs |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1731 |
Zheng Huang of Baidu Scloud XTeam |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1732 |
Linan Hao of the Qihoo 360 Vulcan Team |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1735 |
Zheng Huang of Baidu Scloud XTeam working with HP’s Zero Day Initiative |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1736 |
Bo Qu of Palo Alto Networks |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1736 |
An anonymous researcher, working with HP’s Zero Day Initiative |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1737 |
Dhanesh Kizhakkinan of FireEye, Inc. |
MS15-056 |
Internet Explorer Elevation of Privilege Vulnerability |
CVE-2015-1739 |
Thomas Vanhoutte working with HP’s Zero Day Initiative |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1740 |
Chen Zhang (demi6od) of NSFOCUS Security Team |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1740 |
Heige (a.k.a. SuperHei) from Knownsec 404 Security Team |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1740 |
Bo Qu of Palo Alto Networks |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1741 |
Chen Zhang (demi6od) of NSFOCUS Security Team |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1742 |
Chen Zhang (demi6od) of NSFOCUS Security Team |
MS15-056 |
Internet Explorer Elevation of Privilege Vulnerability |
CVE-2015-1743 |
Haifei Li of McAfee Labs IPS Team |
MS15-056 |
Internet Explorer Elevation of Privilege Vulnerability |
CVE-2015-1743 |
Yuki Chen of Qihoo 360/Vulcan 360 Team working with HP’s Zero Day Initiative |
MS15-056 |
Internet Explorer Elevation of Privilege Vulnerability |
CVE-2015-1743 |
Thomas Vanhoutte, working with HP’s Zero Day Initiative |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1744 |
Bo Qu of Palo Alto Networks |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1744 |
National Engineering Laboratory for Mobile Internet System and Application Security, China |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1745 |
Yuki Chen of Qihoo 360 working with HP’s Zero Day Initiative |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1747 |
lokihardt@ASRT working with HP’s Zero Day Initiative |
MS15-056 |
Internet Explorer Elevation of Privilege Vulnerability |
CVE-2015-1748 |
lokihardt@ASRT working with HP’s Zero Day Initiative |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1750 |
Bo Qu of Palo Alto Networks |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1751 |
Jason Kratzer, working with VeriSign iDefense Labs |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1752 |
Kai Song (exp-sky) of Tencent's Xuanwu LAB |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1752 |
Henry Li of Trend Micro |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1753 |
Jihui Lu of KeenTeam (@K33nTeam) |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1754 |
Jack Tang of Trend Micro |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1755 |
0016EECD9D7159A949DAD3BC17E0A939 working with HP’s Zero Day Initiative |
MS15-056 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1755 |
Jason Kratzer, working with VeriSign iDefense Labs |
MS15-056 |
Defense-in-depth |
------------------- |
רומן זאיקין |
MS15-056 |
Defense-in-depth |
------------------- |
An anonymous researcher, working with Beyond Security’s SecuriTeam Secure Disclosure team and Ashutosh Mehra working with HP’s Zero Day Initiative |
Special thanks for working with Microsoft to make Internet Explorer more secure. |
------------------- |
Xiaoyin Liu @general_nfs |
|
May 2015 |
|
|
|
MS15-054 |
Microsoft Management Console File Format Denial of Service Vulnerability |
CVE-2015-1681 |
Michael Heerklotz, working with HP’s Zero Day Initiative |
MS15-053 |
VBScript ASLR Bypass |
CVE-2015-1684 |
SkyLined, working with HP’s Zero Day Initiative |
MS15-053 |
VBScript and JScript ASLR Bypass |
CVE-2015-1686 |
Bill Finlayson of BeyondTrust Inc |
MS15-052 |
Windows Kernel Security Feature Bypass Vulnerability |
CVE-2015-1674 |
lokihardt@ASRT, working with HP’s Zero Day Initiative |
MS15-051 |
Microsoft Windows Kernel Memory Disclosure Vulnerability |
CVE-2015-1676 |
WanderingGlitch of HP’s Zero Day Initiative |
MS15-051 |
Microsoft Windows Kernel Memory Disclosure Vulnerability |
CVE-2015-1677 |
WanderingGlitch of HP’s Zero Day Initiative |
MS15-051 |
Microsoft Windows Kernel Memory Disclosure Vulnerability |
CVE-2015-1678 |
WanderingGlitch of HP’s Zero Day Initiative |
MS15-051 |
Microsoft Windows Kernel Memory Disclosure Vulnerability |
CVE-2015-1679 |
WanderingGlitch of HP’s Zero Day Initiative |
MS15-051 |
Microsoft Windows Kernel Memory Disclosure Vulnerability |
CVE-2015-1680 |
WanderingGlitch of HP’s Zero Day Initiative |
MS15-049 |
Microsoft Silverlight Out of Browser Application Vulnerability |
CVE-2015-1715 |
Exodus Intelligence |
MS15-048 |
.NET XML Decryption Denial of Service Vulnerability |
CVE-2015-1672 |
John Heasman of DocuSign |
MS15-048 |
Windows Forms Elevation of Privilege Vulnerability |
CVE-2015-1673 |
Kalle Niemitalo |
MS15-046 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-1682 |
3S Labs, working with HP’s Zero Day Initiative |
MS15-046 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-1683 |
Jack Tang of Trend Micro |
MS15-046 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-1683 |
Kai Lu of Fortinet's FortiGuard Labs |
MS15-045 |
Windows Journal Remote Code Execution Vulnerability |
CVE-2015-1675 |
Bill Finlayson of Beyond Trust, Inc. |
MS15-045 |
Windows Journal Remote Code Execution Vulnerability |
CVE-2015-1695 |
Adith Sudhakar, VMware |
MS15-045 |
Windows Journal Remote Code Execution Vulnerability |
CVE-2015-1696 |
Rohit Mothe of VeriSign iDefense Labs |
MS15-045 |
Windows Journal Remote Code Execution Vulnerability |
CVE-2015-1697 |
Rohit Mothe of VeriSign iDefense Labs |
MS15-045 |
Windows Journal Remote Code Execution Vulnerability |
CVE-2015-1698 |
Adith Sudhakar, VMware |
MS15-045 |
Windows Journal Remote Code Execution Vulnerability |
CVE-2015-1698 |
Rohit Mothe of VeriSign iDefense Labs |
MS15-045 |
Windows Journal Remote Code Execution Vulnerability |
CVE-2015-1699 |
Steven Seeley of Source Incite |
MS15-044 |
OpenType Font Parsing Vulnerability |
CVE-2015-1670 |
Mateusz Jurczyk of Google Project Zero |
MS15-044 |
TrueType Font Parsing Vulnerability |
CVE-2015-1671 |
Dan Caselden of FireEye, Inc. |
MS15-043 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1658 |
Jason Kratzer, working with VeriSign iDefense Labs |
MS15-043 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1658 |
National Engineering Laboratory for Mobile Internet System and Application Security, China |
MS15-043 |
VBScript ASLR Bypass |
CVE-2015-1684 |
SkyLined, working with HP’s Zero Day Initiative |
MS15-043 |
Internet Explorer ASLR Bypass |
CVE-2015-1685 |
Hao Linan of 360 Vulcan Team |
MS15-043 |
Internet Explorer ASLR Bypass |
CVE-2015-1685 |
Dhanesh Kizhakkinan of FireEye, Inc. |
MS15-043 |
Internet Explorer ASLR Bypass |
CVE-2015-1685 |
Li Kemeng of Baidu Scloud XTeam |
MS15-043 |
VBScript and JScript ASLR Bypass |
CVE-2015-1686 |
Bill Finlayson of BeyondTrust Inc |
MS15-043 |
Internet Explorer Elevation of Privilege Vulnerability |
CVE-2015-1688 |
Ashutosh Mehra |
MS15-043 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1689 |
Jihui Lu of KeenTeam (@K33nTeam) |
MS15-043 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1691 |
Jihui Lu of KeenTeam (@K33nTeam) |
MS15-043 |
Internet Explorer Clipboard Information Disclosure Vulnerability |
CVE-2015-1692 |
Daniel Trebbien |
MS15-043 |
Internet Explorer Clipboard Information Disclosure Vulnerability |
CVE-2015-1692 |
Vincent Lee of TELUS Security Labs |
MS15-043 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1694 |
Jack Tang of Trend Micro |
MS15-043 |
Internet Explorer Elevation of Privilege Vulnerability |
CVE-2015-1703 |
Akitsugu |
MS15-043 |
Internet Explorer Elevation of Privilege Vulnerability |
CVE-2015-1704 |
Mario Heiderich |
MS15-043 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1705 |
Bo Qu of Palo Alto Networks |
MS15-043 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1706 |
Zheng Huang of Baidu Scloud XTeam working with HP’s Zero Day Initiative |
MS15-043 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1708 |
Bo Qu of Palo Alto Networks |
MS15-043 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1709 |
Jack Tang of Trend Micro |
MS15-043 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1709 |
Zheng Huang of Baidu Scloud XTeam working with HP’s Zero Day Initiative |
MS15-043 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1710 |
Dhanesh Kizhakkinan of FireEye, Inc. |
MS15-043 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1711 |
Bo Qu of Palo Alto Networks |
MS15-043 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1712 |
sweetchip@GRAYHASH |
MS15-043 |
Internet Explorer Elevation of Privilege Vulnerability |
CVE-2015-1713 |
Ashutosh Mehra |
MS15-043 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1714 |
sweetchip@GRAYHASH, working with HP’s Zero Day Initiative |
MS15-043 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1717 |
0016EECD9D7159A949DAD3BC17E0A939, working with HP’s Zero Day Initiative |
MS15-043 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1718 |
Jihui Lu of KeenTeam (@K33nTeam) |
April 2015 |
|
|
|
MS15-042 |
Windows Hyper-V DoS Vulnerability |
CVE-2015-1647 |
Dmitry Alikov of Veeam Software AG |
MS15-039 |
MSXML3 Same Origin Policy SFB vulnerability |
CVE-2015-1646 |
Hormazd Billimoria, Xiaoran Wang, Sergey Gorbaty, Anton Rager, and Jonathan Brossard of Salesforce.com |
MS15-038 |
NtCreateTransactionManager Type Confusion Vulnerability |
CVE-2015-1643 |
James Forshaw of Google Project Zero |
MS15-038 |
Windows MS-DOS Device Name Elevation of Privilege Vulnerability |
CVE-2015-1644 |
James Forshaw of Google Project Zero |
MS15-037 |
Task Scheduler Elevation of Privilege Vulnerability |
CVE-2015-0098 |
Renato Ettisberger of IOprotect GmbH |
MS15-035 |
EMF Processing Remote Code Execution Vulnerability |
CVE-2015-1645 |
Hossein Lotfi, Secunia Research |
MS15-034 |
HTTP.sys Remote Code Execution Vulnerability |
CVE-2015-1635 |
The Citrix Security Response Team |
MS15-033 |
Microsoft Outlook App for Mac XSS Vulnerability |
CVE-2015-1639 |
Rakesh Dharmavaram |
MS15-033 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-1641 |
The Labs Team of iSIGHT Partners |
MS15-033 |
Microsoft Office Component Use After Free Vulnerability |
CVE-2015-1649 |
Jack Tang of Trend Micro |
MS15-033 |
Microsoft Office Component Use After Free Vulnerability |
CVE-2015-1649 |
Dan Caselden of FireEye, Inc. |
MS15-033 |
Microsoft Office Component Use After Free Vulnerability |
CVE-2015-1650 |
3S Labs, working with HP’s Zero Day Initiative |
MS15-033 |
Defense-in-depth change in this bulletin |
------------------- |
Chris Parmer of Plotly |
MS15-033 |
Microsoft Office Component Use After Free Vulnerability |
CVE-2015-1651 |
Ben Hawkes of Google Project Zero |
MS15-032 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1652 |
0016EECD9D7159A949DAD3BC17E0A939, working with HP’s Zero Day Initiative |
MS15-032 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1657 |
Jihui Lu of KeenTeam (@K33nTeam) |
MS15-032 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1659 |
Jason Kratzer, working with HP’s Zero Day Initiative |
MS15-032 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1660 |
Arthur Gerkis, working with HP’s Zero Day Initiative |
MS15-032 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1661 |
AbdulAziz Hariri, working with HP’s Zero Day Initiative |
MS15-032 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1665 |
AMol NAik & Garage4Hackers, working with HP’s Zero Day Initiative |
MS15-032 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1666 |
b0nd@garage4hackers@, working with HP’s Zero Day Initiative |
MS15-032 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1667 |
ca0nguyen, working with HP’s Zero Day Initiative |
MS15-032 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1668 |
Omair, working with HP’s Zero Day Initiative |
March 2015 |
|
|
|
MS15-029 |
JPEG XR Parser Information Disclosure Vulnerability |
CVE-2015-0076 |
Michal Zalewski of Google Inc. |
MS15-028 |
Task Scheduler Security Feature Bypass Vulnerability |
CVE-2015-0084 |
James Forshaw of Google Project Zero |
MS15-027 |
NETLOGON Spoofing Vulnerability |
CVE-2015-0005 |
This vulnerability was discovered and researched by Alberto Solino from Core Security. The publication of this advisory was coordinated by Joaquín Rodríguez Varela from the Core Advisories Team. |
MS15-026 |
OWA Modified Canary Parameter Cross Site Scripting Vulnerability |
CVE-2015-1628 |
Francisco Correa |
MS15-026 |
ExchangeDLP Cross Site Scripting Vulnerability |
CVE-2015-1629 |
Adi Ivascu |
MS15-026 |
Audit Report Cross Site Scripting Vulnerability |
CVE-2015-1630 |
Adi Ivascu |
MS15-026 |
Exchange Forged Meeting Request Spoofing Vulnerability |
CVE-2015-1631 |
Nicolai Grodum |
MS15-026 |
Exchange Error Message Cross Site Scripting Vulnerability |
CVE-2015-1632 |
Darius Petrescu |
MS15-025 |
Registry Virtualization Elevation of Privilege Vulnerability |
CVE-2015-0073 |
James Forshaw of Google Project Zero |
MS15-024 |
Malformed PNG Parsing Information Disclosure Vulnerability |
CVE-2015-0080 |
Michal Zalewski of Google Inc. |
MS15-023 |
Microsoft Windows Kernel Memory Disclosure Vulnerability |
CVE-2015-0077 |
WanderingGlitch, working with HP’s Zero Day Initiative |
MS15-023 |
Win32k Elevation of Privilege Vulnerability |
CVE-2015-0078 |
James Forshaw of Google Project Zero |
MS15-023 |
Win32k Elevation of Privilege Vulnerability |
CVE-2015-0078 |
Ashutosh Mehra of Adobe Systems Inc. |
MS15-023 |
Microsoft Windows Kernel Memory Disclosure Vulnerability |
CVE-2015-0094 |
WanderingGlitch, working with HP’s Zero Day Initiative |
MS15-023 |
Microsoft Windows Kernel Memory Disclosure Vulnerability |
CVE-2015-0095 |
KK of Xuanwu Lab of Tencent |
MS15-022 |
Microsoft Office Component Use After Free Vulnerability |
CVE-2015-0085 |
3S Labs, working with HP’s Zero Day Initiative |
MS15-022 |
Microsoft Office Memory Corruption Vulnerability |
CVE-2015-0086 |
Ben Hawkes of Google Project Zero |
MS15-022 |
Microsoft Word Local Zone Remote Code Execution Vulnerability |
CVE-2015-0097 |
Eduardo Prado, working with Beyond Security’s SecuriTeam Secure Disclosure team |
MS15-022 |
Microsoft SharePoint XSS Vulnerability |
CVE-2015-1633 |
Adi Ivascu |
MS15-022 |
Microsoft SharePoint XSS Vulnerability |
CVE-2015-1636 |
Adi Ivascu |
MS15-021 |
Adobe Font Driver Denial of Service Vulnerability |
CVE-2015-0074 |
Mateusz Jurczyk of Google Project Zero |
MS15-021 |
Adobe Font Driver Information Disclosure Vulnerability |
CVE-2015-0087 |
Mateusz Jurczyk of Google Project Zero |
MS15-021 |
Adobe Font Driver Remote Code Execution Vulnerability |
CVE-2015-0088 |
Mateusz Jurczyk of Google Project Zero |
MS15-021 |
Adobe Font Driver Information Disclosure Vulnerability |
CVE-2015-0089 |
Mateusz Jurczyk of Google Project Zero |
MS15-021 |
Adobe Font Driver Remote Code Execution Vulnerability |
CVE-2015-0090 |
Mateusz Jurczyk of Google Project Zero |
MS15-021 |
Adobe Font Driver Remote Code Execution Vulnerability |
CVE-2015-0091 |
Mateusz Jurczyk of Google Project Zero |
MS15-021 |
Adobe Font Driver Remote Code Execution Vulnerability |
CVE-2015-0092 |
Mateusz Jurczyk of Google Project Zero |
MS15-021 |
Adobe Font Driver Remote Code Execution Vulnerability |
CVE-2015-0092 |
s3tm3m, working with HP’s Zero Day Initiative |
MS15-021 |
Adobe Font Driver Remote Code Execution Vulnerability |
CVE-2015-0093 |
Mateusz Jurczyk of Google Project Zero |
MS15-020 |
WTS Remote Code Execution Vulnerability |
CVE-2015-0081 |
Garage4Hackers, working with HP’s Zero Day Initiative |
MS15-020 |
WTS Remote Code Execution Vulnerability |
CVE-2015-0081 |
Francis Provencher of Protek Research Lab’s |
MS15-020 |
DLL Planting Remote Code Execution Vulnerability |
CVE-2015-0096 |
Michael Heerklotz, working with HP’s Zero Day Initiative |
MS15-019 |
VBScript Memory Corruption Vulnerability |
CVE-2015-0032 |
Bo Qu of Palo Alto Networks |
MS15-018 |
VBScript Memory Corruption Vulnerability |
CVE-2015-0032 |
Bo Qu of Palo Alto Networks |
MS15-018 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0056 |
0016EECD9D7159A949DAD3BC17E0A939, working with HP’s Zero Day Initiative |
MS15-018 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0056 |
Jihui Lu of KeenTeam (@K33nTeam) |
MS15-018 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0099 |
SkyLined, working with HP’s Zero Day Initiative |
MS15-018 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0100 |
ca0nguyen, working with HP’s Zero Day Initiative |
MS15-018 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1622 |
SkyLined, working with HP’s Zero Day Initiative |
MS15-018 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1622 |
AMol NAik, working with HP’s Zero Day Initiative |
MS15-018 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1623 |
0016EECD9D7159A949DAD3BC17E0A939, working with HP’s Zero Day Initiative |
MS15-018 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1624 |
Arthur Gerkis, working with HP’s Zero Day Initiative |
MS15-018 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1625 |
Bo Qu of Palo Alto Networks |
MS15-018 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1626 |
ca0nguyen, working with HP’s Zero Day Initiative |
MS15-018 |
Internet Explorer Elevation of Privilege Vulnerability |
CVE-2015-1627 |
Ashutosh Mehra |
MS15-018 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-1634 |
An anonymous researcher, working with Beyond Security’s SecuriTeam Secure Disclosure team |
MS15-018 |
Defense-in-depth change in this bulletin |
------------------- |
Michal Zalewski of Google Project Zero |
MS15-018 |
Defense-in-depth change in this bulletin |
------------------- |
Zhang YunHai, NSFOCUS Security Team |
MS15-018 |
Defense-in-depth change in this bulletin |
------------------- |
Noriaki Iwasaki of Cyber Defense Institute, Inc. |
February 2015 |
|
|
|
MS15-016 |
TIFF Processing Information Disclosure Vulnerability |
CVE-2015-0061 |
Michal Zalewski of Google Inc. |
MS15-015 |
Windows Create Process Elevation of Privilege Vulnerability |
CVE-2015-0062 |
James Forshaw of Google Project Zero |
MS15-014 |
Group Policy Security Feature Bypass Vulnerability |
CVE-2015-0009 |
Luke Jennings |
MS15-012 |
Excel Remote Code Execution Vulnerability |
CVE-2015-0063 |
Fermin J. Serna of the Google Security Team |
MS15-012 |
Office Remote Code Execution Vulnerability |
CVE-2015-0064 |
Ben Hawkes of Google Project Zero |
MS15-012 |
OneTableDocumentStream Remote Code Execution Vulnerability |
CVE-2015-0065 |
Ben Hawkes of Google Project Zero |
MS15-011 |
Group Policy Remote Code Execution Vulnerability |
CVE-2015-0008 |
Jeff Schmidt of JAS Global Advisors |
MS15-011 |
Group Policy Remote Code Execution Vulnerability |
CVE-2015-0008 |
Dr. Arnoldo Muller-Molina of simMachines |
MS15-011 |
Group Policy Remote Code Execution Vulnerability |
CVE-2015-0008 |
The Internet Corporation for Assigned Names and Numbers (ICANN) |
MS15-010 |
Win32k Elevation of Privilege Vulnerability |
CVE-2015-0003 |
Marcin Wiazowski, working with HP’s Zero Day Initiative |
MS15-010 |
CNG Security Feature Bypass Vulnerability |
CVE-2015-0010 |
James Forshaw of Google Project Zero |
MS15-010 |
Win32k Elevation of Privilege Vulnerability |
CVE-2015-0057 |
Udi Yavo, CTO of enSilo |
MS15-010 |
Windows Cursor Object Double Free Vulnerability |
CVE-2015-0058 |
n3phos, working with HP’s Zero Day Initiative |
MS15-010 |
TrueType Font Parsing Remote Code Execution Vulnerability |
CVE-2015-0059 |
Cris Neckar of Divergent Security |
MS15-010 |
Windows Font Driver Denial of Service Vulnerability |
CVE-2015-0060 |
Cris Neckar of Divergent Security |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0017 |
Aniway.Anyway@gmail.com, working with HP’s Zero Day Initiative |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0017 |
Adlab of Venustech |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0018 |
Bo Qu of Palo Alto Networks |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0019 |
Bo Qu of Palo Alto Networks |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0020 |
Liu Long of Qihoo 360 |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0021 |
Liu Long of Qihoo 360 |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0022 |
Yujie Wen of Qihoo 360 |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0023 |
José A. Vázquez of VeriSign iDefense Labs |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0025 |
An anonymous researcher, working with HP’s Zero Day Initiative |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0026 |
Chen Zhang (demi6od) of NSFOCUS Security Team |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0027 |
Jason Kratzer, working with HP’s Zero Day Initiative |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0028 |
Yujie Wen of Qihoo 360 |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0029 |
Yuki Chen of Qihoo 360 |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0030 |
Chen Zhang (demi6od) of NSFOCUS Security Team |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0031 |
Aniway.Anyway@gmail.com, working with HP’s Zero Day Initiative |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0035 |
Sky, working with HP’s Zero Day Initiative |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0035 |
Pawel Wylecial, working with HP’s Zero Day Initiative |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0035 |
Li Kemeng of Baidu Anti-virus Team |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0036 |
An anonymous researcher, working with HP’s Zero Day Initiative |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0037 |
sweetchip@GRAYHASH, working with HP’s Zero Day Initiative |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0038 |
An anonymous researcher, working with HP’s Zero Day Initiative |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0038 |
Dhanesh Kizhakkinan of FireEye, Inc. |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0038 |
Bo Qu of Palo Alto Networks |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0039 |
Jihui Lu of KeenTeam (@K33nTeam) |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0040 |
SkyLined, working with HP’s Zero Day Initiative |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0041 |
0016EECD9D7159A949DAD3BC17E0A939, working with HP’s Zero Day Initiative |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0041 |
An anonymous researcher, working with HP’s Zero Day Initiative |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0041 |
Li Kemeng of Baidu Anti-virus Team |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0042 |
Omair working with HP’s Zero Day Initiative |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0043 |
Omair working with HP’s Zero Day Initiative |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0044 |
ca0nguyen, working with HP’s Zero Day Initiative |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0045 |
ca0nguyen, working with HP’s Zero Day Initiative |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0045 |
Bo Qu of Palo Alto Networks |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0046 |
Stephen Fewer of Harmony Security, working with HP’s Zero Day Initiative |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0048 |
SkyLined |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0049 |
SkyLined |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0050 |
SkyLined |
MS15-009 |
Internet Explorer ASLR Bypass Vulnerability |
CVE-2015-0051 |
SkyLined |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0052 |
SkyLined |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0053 |
SkyLined, working with HP’s Zero Day Initiative |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0053 |
Tao Qiu of Huawei's IT Infrastructure & Security Dept, BP & IT |
MS15-009 |
Internet Explorer Elevation of Privilege Vulnerability |
CVE-2015-0055 |
James Forshaw of Google Project Zero |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0066 |
Edward Torkington of NCC Group |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0066 |
Jihui Lu of KeenTeam (@K33nTeam) |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0067 |
Peter Vreugdenhil of exodusintel.com |
MS15-009 |
Internet Explorer Memory Corruption Vulnerability |
CVE-2015-0068 |
Bo Qu of Palo Alto Networks |
MS15-009 |
Internet Explorer ASLR Bypass Vulnerability |
CVE-2015-0069 |
Jack Tang of Trend Micro |
MS15-009 |
Internet Explorer ASLR Bypass Vulnerability |
CVE-2015-0071 |
The Labs Team of iSIGHT Partners |
MS15-009 |
Internet Explorer ASLR Bypass Vulnerability |
CVE-2015-0071 |
Clement Lecigne of Google Inc. |
January 2015 |
|
|
|
MS15-008 |
WebDAV Elevation of Privilege Vulnerability |
CVE-2015-0011 |
James Forshaw of Google Project Zero |
MS15-006 |
Windows Error Reporting Security Feature Bypass Vulnerability |
CVE-2015-0001 |
Alex Ionescu of Winsider Seminars & Solutions Inc. and CrowdStrike Inc. |
MS15-005 |
NLA Security Feature Bypass Vulnerability |
CVE-2015-0006 |
Jonas Vestberg of Sentor |
MS15-004 |
Directory Traversal Elevation of Privilege Vulnerability |
CVE-2015-0016 |
Liam O’Murchu of Symantec |
MS15-002 |
Windows Telnet Service Buffer Overflow Vulnerability |
CVE-2015-0014 |
Daiyuu Nobori and Christopher Hiroshi Higuchi SMITH of the University of Tsukuba |