CVE-2015-1671

Vulnerability Profile Updated 3 months ago
Download STIX
Preview STIX
CVE-2015-1671 is a vulnerability that affects the Microsoft Office package. The vulnerability allows an attacker to execute arbitrary code on a victim's machine if they open a specially crafted PowerPoint file. The flaw exists due to insufficient validation of user-supplied input, which could allow an attacker to control the execution flow of the program and perform unauthorized actions. The vulnerability was discovered and reported in April 2015 by researchers from TrendMicro. Microsoft released a security update to address the issue as part of its monthly Patch Tuesday updates on May 12th, 2015. Organizations and individuals were advised to apply the patch as soon as possible to prevent exploitation of the vulnerability. If left unpatched, the vulnerability could allow an attacker to take control of a victim's computer, steal sensitive data, install malware, or cause other damage. It highlights the importance of keeping software up-to-date with the latest security patches to protect against known vulnerabilities that can be exploited by attackers.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Associated Malware
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Associated Threat Actors
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Associated Vulnerabilities
To see the evidence that has resulted in this association, create a free account
IDTypeVotesProfile Description
No associations to display
Source Document References
Information about the CVE-2015-1671 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
SourceCreatedAtTitle
CERT-EU
a year ago
Close Quarters Encounters with Third Generation Malware Compels UK and Danish Municipalities to Remodel Vulnerability Management Safeguards