CVE-2015-2456: Detailed Vulnerability Analysis and Overview

Status: Modified - Last modified: 21-11-2024 Published: 15-08-2015

CVE-2015-2456
Vulnerability Scoring

9.3
/10

Attack Complexity Details

  • Attack Complexity: Analysis in progress
  • Attack Vector: NETWORK
  • Privileges Required: None

CIA Impact Definition

  • Confidentiality:
  • Integrity:
  • Availability:

CVE-2015-2456 Vulnerability Summary

Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Windows 10, Office 2007 SP3 and 2010 SP2, Live Meeting 2007 Console, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, Lync Basic 2013 SP1, Silverlight before 5.1.40728, and .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, and 4.6 allow remote attackers to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability," a different vulnerability than CVE-2015-2455.

Access Complexity Graph for CVE-2015-2456

Impact Analysis for CVE-2015-2456

CVE-2015-2456: Detailed Information and External References

EPSS

0.10634

EPSS %

0.95310

References

0.10634

CWE

CWE-20

CAPEC

0.10634

Vulnerable Configurations

Protect Your Infrastructure: Combat Critical CVE Threats

Stay updated with real-time CVE vulnerabilities and take action to secure your systems. Enhance your cybersecurity posture with the latest threat intelligence and mitigation techniques. Develop the skills necessary to defend against CVEs and secure critical infrastructures. Advance your expertise with certifications like Certified Ethical Hacker (CEH) and CISSP ISC2. These certifications equip you with proactive strategies to address vulnerabilities and strengthen your organization's defenses against emerging cyber threats. Gain the tools and certifications to stay ahead of evolving CVE threats.

Join the top cybersecurity professionals safeguarding today's infrastructures.

Recently Published CVEs