Lucene search

K
attackerkbAttackerKBAKB:34C3032D-A8A5-4F21-A748-308568ADF6E9
HistoryJan 13, 2015 - 12:00 a.m.

CVE-2015-0016

2015-01-1300:00:00
attackerkb.com
18

0.266 Low

EPSS

Percentile

96.8%

Directory traversal vulnerability in the TS WebProxy (aka TSWbPrxy) component in Microsoft Windows Vista SP2, Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via a crafted pathname in an executable file, as demonstrated by a transition from Low Integrity to Medium Integrity, aka β€œDirectory Traversal Elevation of Privilege Vulnerability.”

Recent assessments:

gwillcox-r7 at November 22, 2020 3:44am UTC reported:

Reported as exploited in the wild as part of Google’s 2020 0day vulnerability spreadsheet they made available at <https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=1869060786&gt;. Original tweet announcing this spreadsheet with the 2020 findings can be found at <https://twitter.com/maddiestone/status/1329837665378725888&gt;

Assessed Attacker Value: 0
Assessed Attacker Value: 0Assessed Attacker Value: 0