Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-1671

KEV EPSS 86.97% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2015-1671

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Windows DirectWrite library, as used in Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2; Office 2007 SP3 and 2010 SP2; Live Meeting 2007 Console; Lync 2010; Lync 2010 Attendee; Lync 2013 SP1; Lync Basic 2013 SP1; Silverlight 5 before 5.1.40416.00; and Silverlight 5 Developer Runtime before 5.1.40416.00, allows remote attackers to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability."
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows DirectWrite TrueType字体分析漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows DirectWrite library是美国微软(Microsoft)公司的一个文本布局和字体渲染API,它支持OpenType字体、GDI和Direct2D技术等。 多款Microsoft产品的Windows DirectWrite库中存在远程执行代码漏洞,该漏洞源于程序无法正确处理TrueType字体。成功利用此漏洞的攻击者可以完全控制受影响的系统。以下产品及版本受到影响:Microsoft Windows,.NET Framework 3.0 SP2版本,3.5版
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2015-1671

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2015-1671

登录查看更多情报信息。

Same Patch Batch · n/a · 2015-05-13 · 95 CVEs total

CVE-2015-3061Adobe Reader和Acrobat 安全漏洞
CVE-2015-3058Adobe Reader和Acrobat 信息泄露漏洞
CVE-2015-3056Adobe Reader和Acrobat 缓冲区溢出漏洞
CVE-2015-3052Adobe Reader和Acrobat 缓冲区溢出漏洞
CVE-2015-3051Adobe Reader和Acrobat 缓冲区溢出漏洞
CVE-2015-3050Adobe Reader和Acrobat 缓冲区溢出漏洞
CVE-2015-3049Adobe Reader和Acrobat 缓冲区溢出漏洞
CVE-2015-3048Adobe Reader和Acrobat 缓冲区溢出漏洞
CVE-2015-3053Adobe Reader和Acrobat 释放后重用漏洞
CVE-2015-3060Adobe Reader和Acrobat 安全绕过漏洞
CVE-2015-3059Adobe Reader和Acrobat 释放后重用漏洞
CVE-2015-3062Adobe Reader和Acrobat 安全漏洞
CVE-2015-3063Adobe Reader和Acrobat 安全漏洞
CVE-2015-3064Adobe Reader和Acrobat 安全漏洞
CVE-2015-3065Adobe Reader和Acrobat 安全漏洞
CVE-2015-3066Adobe Reader和Acrobat 安全漏洞
CVE-2015-3067Adobe Reader和Acrobat 安全漏洞
CVE-2015-3068Adobe Reader和Acrobat 安全漏洞
CVE-2015-3069Adobe Reader和Acrobat 安全漏洞
CVE-2015-3070Adobe Reader和Acrobat 缓冲区溢出漏洞

Showing top 20 of 95 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2015-1671

No comments yet


Leave a comment