Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-6132

EPSS 73.00% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2015-6132

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle library loading, which allows local users to gain privileges via a crafted application, aka "Windows Library Loading Remote Code Execution Vulnerability."
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows库加载远程执行代码漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。 Microsoft Windows中存在远程执行代码漏洞,该漏洞源于程序在加载库前不正确地验证输入。攻击者可利用该漏洞完全控制受影响的系统。以下版本受到影响:Microsoft Windows Vista SP2,Windows Server 2008 SP2和R2 SP1,Windows 7 SP1,Windows 8,Windows 8.1,Windows Server 2012 Gold和R2,Window
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2015-6132

#POC DescriptionSource LinkShenlong Link
1Microsoft Office / COM Object DLL Planting https://github.com/hexx0r/CVE-2015-6132POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2015-6132

登录查看更多情报信息。

Same Patch Batch · n/a · 2015-12-09 · 58 CVEs total

CVE-2015-6157Microsoft Internet Explorer 信息泄漏漏洞
CVE-2015-6171Microsoft Windows核心内存特权提升漏洞
CVE-2015-6174Microsoft Windows核心内存特权提升漏洞
CVE-2015-6173Microsoft Windows核心内存特权提升漏洞
CVE-2015-6172Microsoft Office RCE漏洞
CVE-2015-6175Microsoft Windows核心内存特权提升漏洞
CVE-2015-6161Microsoft浏览器ASLR绕过漏洞
CVE-2015-6160Microsoft Internet Explorer 内存损坏漏洞
CVE-2015-6159Microsoft浏览器内存损坏漏洞
CVE-2015-6158Microsoft浏览器内存损坏漏洞
CVE-2015-6162Microsoft Internet Explorer 内存损坏漏洞
CVE-2015-6156Microsoft Internet Explorer 内存损坏漏洞
CVE-2015-6155Microsoft浏览器内存损坏漏洞
CVE-2015-6154Microsoft浏览器内存损坏漏洞
CVE-2015-6153Microsoft浏览器内存损坏漏洞
CVE-2015-6152Microsoft Internet Explorer 内存损坏漏洞
CVE-2015-6151Microsoft浏览器内存损坏漏洞
CVE-2015-6150Microsoft Internet Explorer 内存损坏漏洞
CVE-2015-6149Microsoft Internet Explorer 内存损坏漏洞
CVE-2015-6148Microsoft浏览器内存损坏漏洞

Showing top 20 of 58 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2015-6132

No comments yet


Leave a comment