7.4 High
AI Score
Confidence
Low
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.266 Low
EPSS
Percentile
96.6%
Directory traversal vulnerability in the TS WebProxy (aka TSWbPrxy) component in Microsoft Windows Vista SP2, Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via a crafted pathname in an executable file, as demonstrated by a transition from Low Integrity to Medium Integrity, aka “Directory Traversal Elevation of Privilege Vulnerability.”
CPE | Name | Operator | Version |
---|---|---|---|
windows_7 | eq | - sp1 | |
windows_server_2008 | eq | r2 sp1 | |
windows_server_2012 | eq | 2.0.114 | |
windows_vista | eq | - sp2 |
blog.trendmicro.com/trendlabs-security-intelligence/cve-2015-0016-escaping-the-internet-explorer-sandbox/
packetstormsecurity.com/files/130201/MS15-004-Microsoft-Remote-Desktop-Services-Web-Proxy-IE-Sandbox-Escape.html
secunia.com/advisories/62076
www.securityfocus.com/bid/71965
www.securitytracker.com/id/1031524
docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-004
exchange.xforce.ibmcloud.com/vulnerabilities/99515
exchange.xforce.ibmcloud.com/vulnerabilities/99516
www.exploit-db.com/exploits/35983