
CVE-2015-0016
- Reference to the description:
- Description:
- Directory traversal vulnerability in the TS WebProxy (aka TSWbPrxy) component in Microsoft Windows Vista SP2, Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to gain privileges via a crafted pathname in an executable file, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Directory Traversal Elevation of Privilege Vulnerability."
- Last updated date:
- 02/10/2025
Reports

ACTIVELY EXPLOITED
- Type:
- exploitation
- Confidence:
- HIGH
- Date of publishing:
- 01/13/2015
- Reference url to background
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-004
- Type:
- exploitation
- Confidence:
- HIGH
- Date of publishing:
- 05/25/2022
- Reference url to background
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 10/12/2018
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 10/12/2018
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 10/12/2018
- Reference url to background
- Type:
- exploit
- Confidence:
- HIGH
- Date of publishing:
- 08/27/2021