Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- MS16-153 Elevation of CVE-2016-7295 KeenLab, Tencent
- MS16-151 Privilege CVE-2016-7259 Secunia Research at Flexera
- MS16-151 Privilege CVE-2016-7259 Sébastien Renaud of Quarkslab
- MS16-151 Privilege CVE-2016-7259 Richard Le Dé of Quarkslab
- MS16-151 Privilege CVE-2016-7260 Jfpan of IceSword Lab, Qihoo 360
- MS16-151 Privilege CVE-2016-7260 360
- MS16-149 Driver Information CVE-2016-7219 Taesoo Kim of SSLab, Georgia
- MS16-149 Driver Information CVE-2016-7219 Su Yong Kim of SSLab, Georgia
- MS16-149 Driver Information CVE-2016-7219 Sangho Lee of SSLab, Georgia
- MS16-149 Driver Information CVE-2016-7219 Byoungyoung Lee of SSLab, Georgia
- MS16-149 Elevation of CVE-2016-7292 Thomas Vanhoutte
- MS16-148 Information CVE-2016-7257 Steven Vittitoe of Google Project
- MS16-148 Security Feature CVE-2016-7262 Iliyan Velikov of PwC UK
- MS16-148 Memory Corruption CVE-2016-7263 JChen of Palo Alto Networks
- MS16-148 Information CVE-2016-7264 @j00sean
- MS16-148 Information CVE-2016-7265 Steven Seeley of Source Incite
- MS16-148 Security Feature CVE-2016-7266 Robert Riskin
- MS16-148 Security Feature CVE-2016-7267 Haifei Li of Intel Security
- MS16-148 Information CVE-2016-7268 @j00sean
- MS16-148 OLE DLL Side CVE-2016-7275 Weibo Wang of Qihoo 360 Skyeye
- MS16-148 Information CVE-2016-7276 Steven Vittitoe of Google Project
- MS16-148 Memory Corruption CVE-2016-7277 Jaanus Kääp of Clarified Security
- MS16-148 Memory Corruption CVE-2016-7289 FortiGuard Labs
- MS16-148 Information CVE-2016-7290 Steven Seeley of Source Incite
- MS16-148 Information CVE-2016-7291 Steven Seeley of Source Incite
- MS16-147 Remote Code CVE-2016-7274 Hossein Lotfi, Secunia Research
- MS16-146 Information CVE-2016-7257 Steven Vittitoe of Google Project
- MS16-146 Remote Code CVE-2016-7272 with Trend Micro’s Zero Day
- MS16-145 Memory Corruption CVE-2016-7181 of scip AG
- MS16-145 Memory Corruption CVE-2016-7279 Centre (NCSC)
- MS16-145 Information CVE-2016-7280 Masato Kinugawa of Cure53
- MS16-145 Memory Corruption CVE-2016-7286 Project Zero
- MS16-145 Memory Corruption CVE-2016-7287 Project Zero
- MS16-145 Memory Corruption CVE-2016-7288 Project Zero
- MS16-145 Memory Corruption CVE-2016-7296 Team working with POC/PwnFest
- MS16-145 Memory Corruption CVE-2016-7297 Lokihart working with POC/PwnFest
- MS16-145 Memory Corruption CVE-2016-7297 Micro’s Zero Day Initiative (ZDI)
- MS16-144 Memory Corruption CVE-2016-7202 working with Trend Micro’s Zero
- MS16-144 Memory Corruption CVE-2016-7202 Security-Assessment.com
- MS16-144 Information CVE-2016-7278 Steven Seeley of Source Incite
- MS16-144 Memory Corruption CVE-2016-7279 Centre (NCSC)
- MS16-144 Memory Corruption CVE-2016-7283 Security-Assessment.com
- MS16-144 Information CVE-2016-7284 Li Kemeng of Baidu Security Lab
- MS16-144 Memory Corruption CVE-2016-7287 Project Zero
- MS16-144 Memory Corruption CVE-2016-7293 Tigonlab
- MS16-142 Memory Corruption CVE-2016-7196 Kai Song of Tencent’s Xuanwu LAB
- MS16-142 Memory Corruption CVE-2016-7198 Liu Long of Qihoo 360
- MS16-142 Information CVE-2016-7227 Masato Kinugawa of Cure53
- MS16-142 Information CVE-2016-7239 Masato Kinugawa via Google VRP
- MS16-142 Remote Code CVE-2016-7241 Natalie Silvanovich of Google
- MS16-139 Elevation of CVE-2016-7216 James Forshaw of Google Project
- MS16-139 Elevation of CVE-2016-7216 Mateusz Jurczyk of Google Project
- MS16-138 Elevation of CVE-2016-7223 James Forshaw of Google Project
- MS16-138 Elevation of CVE-2016-7224 James Forshaw of Google Project
- MS16-138 Elevation of CVE-2016-7225 James Forshaw of Google Project
- MS16-138 Elevation of CVE-2016-7226 James Forshaw of Google Project
- MS16-137 Service Denial of CVE-2016-7237 Laurent Gaffie
- MS16-136 Elevation of CVE-2016-7250 Scott Sutherland of netSPI
- MS16-135 Disclosure CVE-2016-7214 KeenLab, Tencent
- MS16-135 Privilege CVE-2016-7215 working with Trend Micro’s Zero
- MS16-135 Information CVE-2016-7218 Peter Hlavaty (@zer0mem),
- MS16-135 Win32k Elevation of CVE-2016-7246 Anonymous working with Trend
- MS16-135 Privilege CVE-2016-7255 Analysis Group
- MS16-135 Privilege CVE-2016-7255 Analysis Group
- MS16-135 Privilege CVE-2016-7255 Feike Hacquebord, of Trend Micro
- MS16-135 Privilege CVE-2016-7255 Peter Pi of Trend Micro
- MS16-135 Privilege CVE-2016-7255 Brooks Li of Trend Micro
- MS16-134 Elevation of CVE-2016-0026 Daniel King, KeenLab, Tencent
- MS16-134 Elevation of CVE-2016-3332 KeenLab, Tencent
- MS16-134 Elevation of CVE-2016-3333 KeenLab, Tencent
- MS16-134 Elevation of CVE-2016-3334 KeenLab, Tencent
- MS16-134 Elevation of CVE-2016-3334 Daniel King, KeenLab, Tencent
- MS16-134 Elevation of CVE-2016-3335 KeenLab, Tencent
- MS16-134 Elevation of CVE-2016-3338 KeenLab, Tencent
- MS16-134 Elevation of CVE-2016-3340 KeenLab, Tencent
- MS16-134 Elevation of CVE-2016-3342 KeenLab, Tencent
- MS16-134 Elevation of CVE-2016-3343 KeenLab, Tencent
- MS16-134 Elevation of CVE-2016-7184 Daniel King, KeenLab, Tencent
- MS16-133 Memory Corruption CVE-2016-7213 JChen of Palo Alto Networks
- MS16-133 Memory Corruption CVE-2016-7228 JChen of Palo Alto Networks
- MS16-133 Memory Corruption CVE-2016-7229 JChen of Palo Alto Networks
- MS16-133 Memory Corruption CVE-2016-7230 Zero
- MS16-133 Memory Corruption CVE-2016-7231 JChen of Palo Alto Networks
- MS16-133 Memory Corruption CVE-2016-7232 working with VeriSign iDefense
- MS16-133 Memory Corruption CVE-2016-7232 working with VeriSign iDefense
- MS16-133 Information CVE-2016-7233 working with VeriSign iDefense
- MS16-133 Information CVE-2016-7233 working with VeriSign iDefense
- MS16-133 Memory Corruption CVE-2016-7234 working with VeriSign iDefense
- MS16-133 Memory Corruption CVE-2016-7234 working with VeriSign iDefense
- MS16-133 Memory Corruption CVE-2016-7235 working with VeriSign iDefense
- MS16-133 Memory Corruption CVE-2016-7235 working with VeriSign iDefense
- MS16-133 Memory Corruption CVE-2016-7236 working with VeriSign iDefense
- MS16-133 Denial of Service CVE-2016-7244 Security Researcher
- MS16-133 Memory Corruption CVE-2016-7245 Haifei Li of Intel Security
- MS16-132 Manager Memory CVE-2016-7205 Scott Bell of
- MS16-132 Manager Memory CVE-2016-7205 Kai Song of Tencent’s Xuanwu LAB
- MS16-132 Manager Memory CVE-2016-7205 SkyLined working with VeriSign
- MS16-132 Information CVE-2016-7210 Hossein Lotfi, Secunia Research
- MS16-132 Memory Corruption CVE-2016-7217 Liu Long of Qihoo 360
- MS16-132 Elevation of CVE-2016-7256 Kijong Son of KrCERT/CC in Korean
- MS16-130 Execution CVE-2016-7212 AG
- MS16-130 Elevation of CVE-2016-7221 Takashi Yoshikawa of Mitsui
- MS16-130 Elevation of CVE-2016-7222 Shanti Lindström Individual
- MS16-129 Memory Corruption CVE-2016-7195 Kai Song of Tencent’s Xuanwu LAB
- MS16-129 Memory Corruption CVE-2016-7196 Kai Song of Tencent’s Xuanwu LAB
- MS16-129 Memory Corruption CVE-2016-7198 Liu Long of Qihoo 360
- MS16-129 Memory Corruption CVE-2016-7200 Project Zero
- MS16-129 Memory Corruption CVE-2016-7200 Labs
- MS16-129 Memory Corruption CVE-2016-7201 Project Zero
- MS16-129 Memory Corruption CVE-2016-7202 working with Trend Micro’s Zero
- MS16-129 Memory Corruption CVE-2016-7202 working with Trend Micro’s Zero
- MS16-129 Memory Corruption CVE-2016-7202 Project Zero
- MS16-129 Memory Corruption CVE-2016-7202 Security-Assessment.com
- MS16-129 Memory Corruption CVE-2016-7203 Project Zero
- MS16-129 Information CVE-2016-7204 Abdulrahman Alqabandi (@qab)
- MS16-129 Memory Corruption CVE-2016-7208 Microsoft ChakraCore Team
- MS16-129 Information CVE-2016-7227 Masato Kinugawa of Cure53
- MS16-129 Information CVE-2016-7239 Masato Kinugawa via Google VRP
- MS16-129 Memory Corruption CVE-2016-7240 Project Zero
- MS16-129 Remote Code CVE-2016-7241 Natalie Silvanovich of Google
- MS16-129 Memory Corruption CVE-2016-7242 Labs
- MS16-129 Memory Corruption CVE-2016-7243 Nicolas Joly of MSRCE UK
- MS16-126 Information CVE-2016-3298 Will Metcalf and Kafeine of
- MS16-125 Hub Elevation of CVE-2016-7188 Zero
- MS16-124 Local Elevation of CVE-2016-0070 Fortinet’s FortiGuard Labs
- MS16-124 Local Elevation of CVE-2016-0070 Zero
- MS16-124 Local Elevation of CVE-2016-0070 Zero
- MS16-124 Local Elevation of CVE-2016-0073 Zero
- MS16-124 Local Elevation of CVE-2016-0075 Zero
- MS16-124 Local Elevation of CVE-2016-0079 Zero
- MS16-123 Privilege CVE-2016-3266 Vulcan Team
- MS16-123 Manager Elevation CVE-2016-3341 Peter Hlavaty (@zer0mem),
- MS16-123 Elevation of CVE-2016-3376 Mateusz Jurczyk of Google Project
- MS16-123 Elevation of CVE-2016-3376 James Forshaw of Google Project
- MS16-123 Driver Local CVE-2016-7185 James Forshaw of Google Project
- MS16-123 Privilege CVE-2016-7211 IceSword Lab, Qihoo 360
- MS16-121 Memory Corruption CVE-2016-7193 Austrian MilCERT
- MS16-120 Parsing Information CVE-2016-3209 Mateusz Jurczyk of Google Project
- MS16-120 Disclosure CVE-2016-3262 Zero
- MS16-120 Disclosure CVE-2016-3263 Zero
- MS16-120 Privilege CVE-2016-3270 Vulcan Team
- MS16-120 Component RCE CVE-2016-3393 Anton Ivanov of Kaspersky Lab
- MS16-120 Parsing Elevation CVE-2016-7182 Mateusz Jurczyk of Google Project
- MS16-119 Information CVE-2016-3267 Wenxiang Qian of Tencent
- MS16-119 Memory Corruption CVE-2016-3331 Lab
- MS16-119 Memory Corruption CVE-2016-3382 Micro’s Zero Day Initiative (ZDI)
- MS16-119 Memory Corruption CVE-2016-3386 working with Trend Micro’s Zero
- MS16-119 Memory Corruption CVE-2016-3386 Project Zero
- MS16-119 Elevation of CVE-2016-3387 James Forshaw of Google Project
- MS16-119 Elevation of CVE-2016-3388 James Forshaw of Google Project
- MS16-119 Memory Corruption CVE-2016-3389 Microsoft ChakraCore Team
- MS16-119 Memory Corruption CVE-2016-3390 Microsoft ChakraCore Team
- MS16-119 Information CVE-2016-3391 Stefaan Truijen, working with
- MS16-119 Information CVE-2016-3391 Adrian Toma, working with NVISO
- MS16-119 Information CVE-2016-3391 Daan Raman, working with NVISO
- MS16-119 Information CVE-2016-3391 Arne Swinnen working with NVISO
- MS16-119 Security Feature CVE-2016-3392 Xiaoyin Liu
- MS16-119 Information CVE-2016-7189 Natalie Silvanovich of Google
- MS16-119 Memory Corruption CVE-2016-7190 Project Zero
- MS16-119 Memory Corruption CVE-2016-7194 Project Zero
- MS16-118 Information CVE-2016-3267 Wenxiang Qian of Tencent
- MS16-118 Information CVE-2016-3298 Will Metcalf and Kafeine of
- MS16-118 Memory Corruption CVE-2016-3331 Lab
- MS16-118 Memory Corruption CVE-2016-3382 Micro’s Zero Day Initiative (ZDI)
- MS16-118 Memory Corruption CVE-2016-3383 Zero Day Initiative (ZDI)
- MS16-118 Memory Corruption CVE-2016-3384 working with Trend Micro’s Zero
- MS16-118 Memory Corruption CVE-2016-3385 WSEC Analysis Team, working with
- MS16-118 Elevation of CVE-2016-3387 James Forshaw of Google Project
- MS16-118 Elevation of CVE-2016-3388 James Forshaw of Google Project
- MS16-118 Information CVE-2016-3391 Stefaan Truijen, working with
- MS16-118 Information CVE-2016-3391 Adrian Toma, working with NVISO
- MS16-118 Information CVE-2016-3391 Daan Raman, working with NVISO
- MS16-118 Information CVE-2016-3391 Arne Swinnen working with NVISO
- MS16-116 Memory Corruption CVE-2016-3376 with Trend Micro’s Zero Day
- MS16-116 Memory Corruption CVE-2016-3375 Team
- MS16-115 Information CVE-2016-3370 Ke Liu of Tencent’s Xuanwu Lab
- MS16-115 Information CVE-2016-3374 Roberto Suggi Liverani
- MS16-115 Information CVE-2016-3374 Steven Seeley of Source Incite
- MS16-114 Remote Code CVE-2016-3345 Inc
- MS16-114 Remote Code CVE-2016-3345 Oleg Kravtsov of Tuxera Inc
- MS16-112 Elevation of CVE-2016-3302 Auri A. Rahimzadeh of Auri’s
- MS16-111 Object Elevation of CVE-2016-3305 The Citrix Product Security Team
- MS16-111 Object Elevation of CVE-2016-3306 The Citrix Product Security Team
- MS16-111 Elevation of CVE-2016-3371 James Forshaw of Google Project
- MS16-111 Elevation of CVE-2016-3372 Marcin Wiazowski, individual
- MS16-111 Elevation of CVE-2016-3373 James Forshaw of Google Project
- MS16-110 Service CVE-2016-3369 Piotr Bania of Cisco Talos
- MS16-110 Execution CVE-2016-3368 Jonathan Brown of VMware, Inc
- MS16-108 Information CVE-2016-0138 Bassel Rachid of DH Corporation
- MS16-108 Information CVE-2016-0138 Lucie Brochu of DH Corporation
- MS16-108 Open Redirect CVE-2016-3378 John Page of ApparitionSec
- MS16-108 Elevation of CVE-2016-3379 Adrian Ivascu
- MS16-107 Microsoft APP-V CVE-2016-0137 Udi Yavo of enSilo
- MS16-107 Memory Corruption CVE-2016-3357 Zero
- MS16-107 Memory Corruption CVE-2016-3358 working with VeriSign iDefense
- MS16-107 Memory Corruption CVE-2016-3359 working with VeriSign iDefense
- MS16-107 Memory Corruption CVE-2016-3361 Steven Seeley of Source Incite
- MS16-107 Memory Corruption CVE-2016-3362 Steven Seeley of Source Incite
- MS16-107 Memory Corruption CVE-2016-3363 Steven Seeley of Source Incite
- MS16-107 Memory Corruption CVE-2016-3364 Eduardo Braun Prado
- MS16-107 Memory Corruption CVE-2016-3365 working with Trend Micro’s Zero
- MS16-107 Spoofing CVE-2016-3366 Incident Response Team of Certego
- MS16-106 Privilege CVE-2016-3348 Lab
- MS16-106 Disclosure CVE-2016-3354 Zero Day Initiative (ZDI)
- MS16-106 Disclosure CVE-2016-3355 via GeekPwn
- MS16-105 Memory Corruption CVE-2016-3247 Micro’s Zero Day Initiative (ZDI)
- MS16-105 Information CVE-2016-3291 Nathaniel Theis (XMPPwocky)
- MS16-105 Memory Corruption CVE-2016-3294 working with Trend Micro’s Zero
- MS16-105 Memory Corruption CVE-2016-3295 Trend Micro’s Zero Day Initiative
- MS16-105 Memory Corruption CVE-2016-3297 Liu Long of Qihoo 360
- MS16-105 Information CVE-2016-3325 SkyLined
- MS16-105 Memory Corruption CVE-2016-3330 F4B3CD of STARLAB
- MS16-105 Memory Corruption CVE-2016-3350 Microsoft ChakraCore Team
- MS16-105 Information CVE-2016-3351 Kafeine, Brooks Li of Trend Micro
- MS16-105 Memory Corruption CVE-2016-3377 working with Trend Micro’s Zero
- MS16-104 Memory Corruption CVE-2016-3247 Micro’s Zero Day Initiative (ZDI)
- MS16-104 Information CVE-2016-3291 Nathaniel Theis (XMPPwocky)
- MS16-104 Elevation of CVE-2016-3292 Trend Micro’s Zero Day Initiative
- MS16-104 Memory Corruption CVE-2016-3295 Trend Micro’s Zero Day Initiative
- MS16-104 Memory Corruption CVE-2016-3297 Liu Long of Qihoo 360
- MS16-104 Memory Corruption CVE-2016-3324 SkyLined
- MS16-104 Information CVE-2016-3325 SkyLined
- MS16-104 Information CVE-2016-3351 Kafeine, Brooks Li of Trend Micro
- MS16-104 Security Feature CVE-2016-3353 Trend Micro’s Zero Day Initiative
- MS16-104 Memory Corruption CVE-2016-3375 Team
- MS16-104 Memory Corruption CVE-2016-3376 with Trend Micro’s Zero Day
- MS16-104 Memory Corruption CVE-2016-3375 Trend Micro’s Zero Day Initiative
- MS16-104 Memory Corruption CVE-2016-3375 Micro’s Zero Day Initiative (ZDI)
- MS16-102 Remote Code CVE-2016-3319 Aleksandar Nikolic of Cisco Talos
- MS16-101 of Privilege CVE-2016-3237 Nabeel Ahmed of Dimension Data
- MS16-099 Memory Corruption CVE-2016-3313 Jaanus Kaap
- MS16-099 Memory Corruption CVE-2016-3313 Sébastien Morin of COSIG
- MS16-099 Information CVE-2016-3315 dannywei of Tencent’s Xuanwu Lab
- MS16-099 Memory Corruption CVE-2016-3316 Francis Provencher of COSIG
- MS16-099 Memory Corruption CVE-2016-3317 Inc
- MS16-099 Memory Corruption CVE-2016-3318 Trend Micro’s Zero Day Initiative
- MS16-098 Privilege CVE-2016-3308 Micro’s Zero Day Initiative (ZDI)
- MS16-098 Privilege CVE-2016-3308 with Trend Micro’s Zero Day
- MS16-098 Privilege CVE-2016-3309 working with Trend Micro’s Zero
- MS16-098 Privilege CVE-2016-3310 Fortiguard Labs
- MS16-098 Privilege CVE-2016-3311 Vulcan Team
- MS16-097 Component RCE CVE-2016-3301 Zero
- MS16-097 Component RCE CVE-2016-3303 Zero
- MS16-097 Component RCE CVE-2016-3304 Zero
- MS16-096 Memory Corruption CVE-2016-3289 Lab, working with Trend Micro’s
- MS16-096 Memory Corruption CVE-2016-3293 Xuanwu LAB
- MS16-096 Memory Corruption CVE-2016-3296 Microsoft ChakraCore Team
- MS16-096 Remote Code CVE-2016-3319 Aleksandar Nikolic of Cisco Talos
- MS16-096 Memory Corruption CVE-2016-3322 Lab, working with Trend Micro’s
- MS16-096 Information CVE-2016-3326 Trend Micro’s Zero Day Initiative
- MS16-096 Information CVE-2016-3327 Soroush Dalili of NCC Group
- MS16-096 Information CVE-2016-3329 Masato Kinugawa of Cure53
- MS16-095 Memory Corruption CVE-2016-3288 working with Google Project Zero
- MS16-095 Memory Corruption CVE-2016-3289 Lab, working with Trend Micro’s
- MS16-095 Memory Corruption CVE-2016-3290 Liu Long of Qihoo 360
- MS16-095 Memory Corruption CVE-2016-3293 Xuanwu LAB
- MS16-095 Information CVE-2016-3321 Yorick Koster of Securify B.V.
- MS16-095 Memory Corruption CVE-2016-3322 Lab, working with Trend Micro’s
- MS16-095 Information CVE-2016-3326 Trend Micro’s Zero Day Initiative
- MS16-095 Information CVE-2016-3327 Soroush Dalili of NCC Group
- MS16-095 Information CVE-2016-3329 Masato Kinugawa of Cure53
- MS16-092 Security Feature CVE-2016-3258 James Forshaw of Google Project
- MS16-092 Information CVE-2016-3272 Herbert Bos of Vrije Universiteit
- MS16-091 Disclosure CVE-2016-3255 NCC Group
- MS16-090 Privilege CVE-2016-3249 bee13oy of CloverSec Labs
- MS16-090 Privilege CVE-2016-3250 Vulcan Team
- MS16-090 Information CVE-2016-3251 zhong_sf and pgboy of Qihoo 360
- MS16-090 Privilege CVE-2016-3252 IceSword Lab, Qihoo 360
- MS16-090 Privilege CVE-2016-3254 Vulcan Team
- MS16-090 Elevation of CVE-2016-3286 zhong_sf and pgboy of Qihoo 360
- MS16-088 Memory Corruption CVE-2016-3278 Xiaoning Li of Intel Labs
- MS16-088 Feature Bypass CVE-2016-3279 Haifei Li of Intel Security
- MS16-088 Memory Corruption CVE-2016-3280 Lucas Leong of Trend Micro
- MS16-088 Memory Corruption CVE-2016-3281 Jaanus Kääp of Clarified Security
- MS16-088 Memory Corruption CVE-2016-3282 Jaanus Kääp of Clarified Security
- MS16-088 Memory Corruption CVE-2016-3283 Jaanus Kääp of Clarified Security
- MS16-088 Memory Corruption CVE-2016-3284 Alexey Belyakov, Individual
- MS16-087 Spooler Remote Code CVE-2016-3238 Nicolas Beauchesne of Vectra
- MS16-087 Spooler Elevation CVE-2016-3239 Shanti Lindström, Individual
- MS16-085 Security Feature CVE-2016-3244 Lab
- MS16-085 Security Feature CVE-2016-3244 Micro
- MS16-085 Security Feature CVE-2016-3244 Xuanwu LAB
- MS16-085 Memory Corruption CVE-2016-3246 Zero Day Initiative (ZDI)
- MS16-085 Memory Corruption CVE-2016-3248 Microsoft ChakraCore Team
- MS16-085 Memory Corruption CVE-2016-3259 Jaehun Jeong (n3sk), Individual
- MS16-085 Memory Corruption CVE-2016-3264 working with Trend Micro’s Zero
- MS16-085 Memory Corruption CVE-2016-3265 Security Research Team
- MS16-085 Memory Corruption CVE-2016-3269 Security Research Team
- MS16-085 Memory Corruption CVE-2016-3271 Trend Micro’s Zero Day Initiative
- MS16-085 Information CVE-2016-3273 Masato Kinugawa of Cure53
- MS16-085 Spoofing CVE-2016-3274 Telekom Nyrt
- MS16-085 Spoofing CVE-2016-3276 QQBrowser
- MS16-085 Information CVE-2016-3277 Henry Li (zenhumany) of Trend
- MS16-084 Memory Corruption CVE-2016-3240 Hui Gao of Palo Alto Networks
- MS16-084 Memory Corruption CVE-2016-3241 working with Trend Micro’s Zero
- MS16-084 Memory Corruption CVE-2016-3242 working with Trend Micro’s Zero
- MS16-084 Memory Corruption CVE-2016-3243 Lab
- MS16-084 Security Feature CVE-2016-3245 Masato Kinugawa of Cure53
- MS16-084 Memory Corruption CVE-2016-3259 Jaehun Jeong (n3sk), Individual
- MS16-084 Memory Corruption CVE-2016-3260 Offensive Security Research Team
- MS16-084 Information CVE-2016-3261 Li Kemeng, Baidu Security Lab
- MS16-084 Memory Corruption CVE-2016-3264 working with Trend Micro’s Zero
- MS16-084 Information CVE-2016-3273 Masato Kinugawa of Cure53
- MS16-084 Information CVE-2016-3277 Henry Li (zenhumany) of Trend
- MS16-081 Denial of Service CVE-2016-3226 Ondrej Sevecek of GOPAS
- MS16-080 Information CVE-2016-3201 Jaanus Kääp of Clarified Security
- MS16-080 Code Execution CVE-2016-3203 Ke Liu of Tencent’s Xuanwu Lab
- MS16-080 Code Execution CVE-2016-3203 Zero Day Initiative (ZDI)
- MS16-080 Information CVE-2016-3215 Ke Liu of Tencent’s Xuanwu Lab
- MS16-080 Information CVE-2016-3215 kdot working with Trend Micro’s
- MS16-079 Information CVE-2016-0028 Louis-Paul Dareau of ProcessOut
- MS16-078 Hub Elevation of CVE-2016-3231 Micro’s Zero Day Initiative (ZDI)
- MS16-078 Hub Elevation of CVE-2016-3231 Qihoo 360 Vulcan Team
- MS16-077 Privilege CVE-2016-3213 Security GmbH
- MS16-077 Privilege CVE-2016-3213 Tencent’s Xuanwu Lab
- MS16-074 Information CVE-2016-3216 Zero
- MS16-074 Privilege CVE-2016-3219 Zero
- MS16-074 of Privilege CVE-2016-3220 Zero
- MS16-073 Privilege CVE-2016-3218 Vulcan Team
- MS16-073 Privilege CVE-2016-3221 Lab
- MS16-072 Elevation of CVE-2016-3223 NabeelAhmed of Dimension Data
- MS16-072 Elevation of CVE-2016-3223 Tom Gilis of Dimension Data
- MS16-070 Memory Corruption CVE-2016-0025 YangKang of 360 QEX Team
- MS16-070 Memory Corruption CVE-2016-3233 iDefense
- MS16-070 Memory Corruption CVE-2016-0025 LiYaDong of 360 QEX Team
- MS16-070 Information CVE-2016-3234 Dhanesh Kizhakkinan of FireEye
- MS16-070 OLE DLL Side CVE-2016-3235 Yorick Koster of Securify B.V.
- MS16-069 Memory Corruption CVE-2016-3205 Networks
- MS16-069 Memory Corruption CVE-2016-3206 Networks
- MS16-069 Memory Corruption CVE-2016-3207 Networks
- MS16-068 Security Feature CVE-2016-3198 Mario Heiderich of Cure53
- MS16-068 Memory Corruption CVE-2016-3199 Micro’s Zero Day Initiative (ZDI)
- MS16-068 Information CVE-2016-3201 Jaanus Kääp of Clarified Security
- MS16-068 Code Execution CVE-2016-3203 Zero Day Initiative (ZDI)
- MS16-068 Memory Corruption CVE-2016-3214 Offensive Security Research Team
- MS16-068 Information CVE-2016-3215 Ke Liu of Tencent’s Xuanwu Lab
- MS16-068 Information CVE-2016-3215 kdot working with Trend Micro’s
- MS16-068 Memory Corruption CVE-2016-3222 working with Trend Micro’s Zero
- MS16-068 Memory Corruption CVE-2016-3222 Xuanwu Lab
- MS16-063 Memory Corruption CVE-2016-0199 SkyLined working with iDefense
- MS16-063 Memory Corruption CVE-2016-0200 working with Trend Micro’s Zero
- MS16-063 Memory Corruption CVE-2016-3205 Networks
- MS16-063 Memory Corruption CVE-2016-3206 Networks
- MS16-063 Memory Corruption CVE-2016-3207 Networks
- MS16-063 Memory Corruption CVE-2016-3210 Security
- MS16-063 Memory Corruption CVE-2016-3211 Micro’s Zero Day Initiative (ZDI)
- MS16-063 XSS Filter CVE-2016-3212 Masato Kinugawa of Cure53
- MS16-063 Privilege CVE-2016-3299 Tencent’s Xuanwu Lab
- MS16-067 Redirection CVE-2016-0190 Sandeep Kumar of Citrix Systems
- MS16-066 Integrity Security CVE-2016-0181 Rafal Wojtczuk of Bromium
- MS16-062 Privilege CVE-2016-0171 with Google Project Zero
- MS16-062 Privilege CVE-2016-0173 with Google Project Zero
- MS16-062 Privilege CVE-2016-0173 with Trend Micro’s Zero Day
- MS16-062 Privilege CVE-2016-0174 working with Trend Micro’s Zero
- MS16-062 Disclosure CVE-2016-0175 working with Trend Micro’s Zero
- MS16-062 Subsystem Elevation CVE-2016-0176 working with Trend Micro’s Zero
- MS16-062 Subsystem Elevation CVE-2016-0176 working with Trend Micro’s Zero
- MS16-062 Privilege CVE-2016-0196 Inc.
- MS16-062 Privilege CVE-2016-0196 with Trend Micro’s Zero Day
- MS16-061 Engine Elevation of CVE-2016-0178 Evgeny Kotkov of VisualSVN
- MS16-061 Engine Elevation of CVE-2016-0178 Ivan Zhakov of VisualSVN
- MS16-060 Elevation of CVE-2016-0180 Loren Robinson of CrowdStrike,
- MS16-060 Elevation of CVE-2016-0180 Alex Ionescu of CrowdStrike, Inc.
- MS16-059 Center Remote Code CVE-2016-0185 Trend Micro’s Zero Day Initiative
- MS16-057 Remote Code CVE-2016-0179 Shi Ji (@Puzzor) of VARAS@IIE
- MS16-056 Corruption CVE-2016-0182 VeriSign iDefense Labs
- MS16-056 Corruption CVE-2016-0182 Bingchang Liu of VARAS@IIE
- MS16-055 Information CVE-2016-0168 Zero
- MS16-055 Information CVE-2016-0169 Zero
- MS16-055 Component RCE CVE-2016-0170 Zero
- MS16-055 Free RCE CVE-2016-0184 Micro
- MS16-054 Memory Corruption CVE-2016-0126 with Beyond Security’s SecuriTeam
- MS16-054 Memory Corruption CVE-2016-0126 Team
- MS16-054 Memory Corruption CVE-2016-0140 working with VeriSign iDefense
- MS16-054 Office Graphics RCE CVE-2016-0183 Lucas Leong of Trend Micro
- MS16-053 Memory Corruption CVE-2016-0187 Kai Kang
- MS16-052 Memory Corruption CVE-2016-0186 working with Trend Micro’s Zero
- MS16-052 Memory Corruption CVE-2016-0186 Trend Micro’s Zero Day Initiative
- MS16-052 Memory Corruption CVE-2016-0191 Micro’s Zero Day Initiative (ZDI)
- MS16-052 Memory Corruption CVE-2016-0192 Lab, working with Trend Micro’s
- MS16-052 Memory Corruption CVE-2016-0193 KeenLab working with Trend
- MS16-051 Memory Corruption CVE-2016-0187 Kai Kang
- MS16-051 Memory Corruption CVE-2016-0192 Lab, working with Trend Micro’s
- MS16-051 Information CVE-2016-0194 Trend Micro’s Zero Day Initiative
- MS16-049 Service CVE-2016-0150 Inc.
- MS16-049 Service CVE-2016-0150 Noam Mazor of Imperva
- MS16-048 Security Feature CVE-2016-0151 James Forshaw of Google Project
- MS16-047 Downgrade CVE-2016-0128 Samba Team, which also helped
- MS16-046 Elevation of CVE-2016-0135 Tenable Network Security
- MS16-045 Execution CVE-2016-0088 Security Team
- MS16-045 Execution CVE-2016-0088 Thomas Garnier
- MS16-045 Disclosure CVE-2016-0089 Security Team
- MS16-045 Disclosure CVE-2016-0089 Thomas Garnier
- MS16-045 Disclosure CVE-2016-0090 Security Team
- MS16-045 Disclosure CVE-2016-0090 Thomas Garnier
- MS16-044 Code Execution CVE-2016-0153 Security IPS Vulnerability
- MS16-042 Memory Corruption CVE-2016-0122 Sébastien Morin of COSIG
- MS16-042 Memory Corruption CVE-2016-0127 Lucas Leong of Trend Micro
- MS16-042 Memory Corruption CVE-2016-0136 working with VeriSign iDefense
- MS16-042 Memory Corruption CVE-2016-0139 Steven Seeley of Source Incite
- MS16-041 Remote Code CVE-2016-0148 Yorick Koster of Securify B.V.
- MS16-041 Remote Code CVE-2016-0148 rgod, working with Trend Micro’s
- MS16-040 Code Execution CVE-2016-0147 Nicolas Grégoire of Agarri
- MS16-039 Privilege CVE-2016-0143 with Google Project Zero
- MS16-039 Corruption CVE-2016-0145 Zero
- MS16-039 Privilege CVE-2016-0165 Kaspersky Lab
- MS16-039 Privilege CVE-2016-0167 Inc.
- MS16-038 Memory Corruption CVE-2016-0154 Liu Long of Qihoo 360
- MS16-038 Memory Corruption CVE-2016-0155 Liu Long of Qihoo 360
- MS16-038 Memory Corruption CVE-2016-0156 Shi Ji (@Puzzor) of VARAS@IIE
- MS16-038 Memory Corruption CVE-2016-0156 Liu Long of Qihoo 360
- MS16-038 Memory Corruption CVE-2016-0157 working with HP’s Zero Day
- MS16-038 Elevation of CVE-2016-0158 lokihardt, working with HP’s Zero
- MS16-038 Information CVE-2016-0161 QianWen Xiang of Tencent
- MS16-037 Memory Corruption CVE-2016-0154 Team
- MS16-037 Memory Corruption CVE-2016-0159 working with HP’s Zero Day
- MS16-037 Code Execution CVE-2016-0160 Sandro Poppi
- MS16-037 Information CVE-2016-0162 Ladislav Janko, working with ESET
- MS16-037 Memory Corruption CVE-2016-0164 Lab
- MS16-037 Memory Corruption CVE-2016-0166 Micro, working with HP’s Zero Day
- MS16-035 Security Feature CVE-2016-0132 Anders Abel of Kentor
- MS16-034 Privilege CVE-2016-0093 with Google Project Zero
- MS16-034 Privilege CVE-2016-0094 with Google Project Zero
- MS16-034 Privilege CVE-2016-0095 Information Center
- MS16-034 Privilege CVE-2016-0095 working with HP’s Zero Day
- MS16-034 Privilege CVE-2016-0096 Lab, Qihoo 360
- MS16-033 Elevation of CVE-2016-0133 Andy Davis, NCC Group
- MS16-032 Elevation of CVE-2016-0099 James Forshaw of Google Project
- MS16-031 of Privilege CVE-2016-0087 Meysam Firozi @R00tkitSmm
- MS16-030 Remote Code CVE-2016-0091 Anonymous, working with HP’s Zero
- MS16-030 Remote Code CVE-2016-0092 Anonymous, working with HP’s Zero
- MS16-029 Memory Corruption CVE-2016-0021 Richard Warren of NCC Group
- MS16-029 Feature Bypass CVE-2016-0057 Eric Clausing of AV-TEST GmbH
- MS16-029 Feature Bypass CVE-2016-0057 Ulf Loesche of AV-TEST GmbH
- MS16-029 Feature Bypass CVE-2016-0057 Maik Morgenstern of AV-TEST GmbH
- MS16-029 Feature Bypass CVE-2016-0057 Andreas Marx of AV-TEST GmbH
- MS16-029 Memory Corruption CVE-2016-0134 Jack Tang of Trend Micro
- MS16-023 Memory Corruption CVE-2016-0102 Liu Long of Qihoo 360
- MS16-028 Execution CVE-2016-0117 Mark Yason, IBM X-Force
- MS16-028 Execution CVE-2016-0118 working with HP’s Zero Day
- MS16-027 Parsing Remote Code CVE-2016-0101 Bruno Martinez
- MS16-026 Parsing CVE-2016-0120 Zero
- MS16-026 Parsing CVE-2016-0121 Zero
- MS16-025 Remote Code CVE-2016-0100 Yorick Koster of Securify B.V.
- MS16-024 Memory Corruption CVE-2016-0102 Liu Long of Qihoo 360
- MS16-024 Memory Corruption CVE-2016-0105 Lab
- MS16-024 Memory Corruption CVE-2016-0109 Lab, working with HP’s Zero Day
- MS16-024 Memory Corruption CVE-2016-0110 Lab
- MS16-024 Memory Corruption CVE-2016-0111 Lab
- MS16-024 Memory Corruption CVE-2016-0116 The Microsoft ChakraCore Team
- MS16-024 Memory Corruption CVE-2016-0123 working with HP’s Zero Day
- MS16-024 Memory Corruption CVE-2016-0124 Initiative
- MS16-024 Information CVE-2016-0125 Richard Shupak
- MS16-024 Information CVE-2016-0125 Hariram Balasundaram
- MS16-024 Information CVE-2016-0125 Yashvier Kosaraju
- MS16-024 Memory Corruption CVE-2016-0129 The Microsoft ChakraCore Team
- MS16-024 Memory Corruption CVE-2016-0130 The Microsoft ChakraCore Team
- MS16-023 Memory Corruption CVE-2016-0103 Lab
- MS16-023 Memory Corruption CVE-2016-0104 Lab
- MS16-023 Memory Corruption CVE-2016-0105 Lab
- MS16-023 Memory Corruption CVE-2016-0106 Initiative
- MS16-023 Memory Corruption CVE-2016-0107 Hui Gao of Palo Alto Networks
- MS16-023 Memory Corruption CVE-2016-0107 working with HP’s Zero Day
- MS16-023 Memory Corruption CVE-2016-0107 Tigonlab
- MS16-023 Memory Corruption CVE-2016-0108 Barbella, working with Google
- MS16-023 Memory Corruption CVE-2016-0109 Lab, working with HP’s Zero Day
- MS16-023 Memory Corruption CVE-2016-0110 Lab
- MS16-023 Memory Corruption CVE-2016-0111 Project Zero
- MS16-023 Memory Corruption CVE-2016-0111 Google Project Zero
- MS16-023 Memory Corruption CVE-2016-0112 Initiative
- MS16-023 Memory Corruption CVE-2016-0112 Initiative
- MS16-023 Memory Corruption CVE-2016-0113 Lab, working with HP’s Zero Day
- MS16-023 Memory Corruption CVE-2016-0114 HP’s Zero Day Initiative
- MS16-018 Privilege CVE-2016-0048 fanxiaocao and pjf of Qihoo 360
- MS16-016 Privilege CVE-2016-0051 Tamás Koczka of Tresorit
- MS16-015 Memory Corruption CVE-2016-0022 Lucas Leong of Trend Micro
- MS16-015 Memory Corruption CVE-2016-0052 Lucas Leong of Trend Micro
- MS16-015 Memory Corruption CVE-2016-0053 Lucas Leong of Trend Micro
- MS16-015 Memory Corruption CVE-2016-0055 Labs
- MS16-015 Memory Corruption CVE-2016-0056 with Beyond Security’s SecuriTeam
- MS16-015 SharePoint XSS CVE-2016-0039 GmbH (Vulnerability Lab)
- MS16-014 of Privilege CVE-2016-0040 Meysam Firozi @R00tkitSmm
- MS16-014 of Privilege CVE-2016-0040 Institute of Technology
- MS16-014 of Privilege CVE-2016-0040 Institute of Technology
- MS16-014 of Privilege CVE-2016-0040 Institute of Technology
- MS16-014 Code Execution CVE-2016-0041 CyberPoint SRT
- MS16-014 Code Execution CVE-2016-0041 Yorick Koster of Securify B.V.
- MS16-014 Remote Code CVE-2016-0042 Richard Warren of NCC Group
- MS16-014 Security Feature CVE-2016-0049 Nabeel Ahmed of Dimension Data
- MS16-014 Security Feature CVE-2016-0049 Gilis of Dimension Data
- MS16-013 Memory Corruption CVE-2016-0038 Labs
- MS16-012 Reader CVE-2016-0046 working with HP’s Zero Day
- MS16-012 Library Buffer CVE-2016-0058 Atte Kettunen of OUSPG
- MS16-011 Memory Corruption CVE-2016-0060 Initiative
- MS16-011 Memory Corruption CVE-2016-0061 Day Initiative
- MS16-011 Memory Corruption CVE-2016-0062 Lab, working with HP’s Zero Day
- MS16-011 Microsoft Edge ASLR CVE-2016-0080 Zhang Yunhai of NSFOCUS
- MS16-009 Information CVE-2016-0059 Kai Lu of Fortinet’s FortiGuard
- MS16-009 Information CVE-2016-0059 Steven Seeley of Source Incite
- MS16-009 Memory Corruption CVE-2016-0060 Initiative
- MS16-009 Memory Corruption CVE-2016-0061 Day Initiative
- MS16-009 Memory Corruption CVE-2016-0062 Lab, working with HP’s Zero Day
- MS16-009 Memory Corruption CVE-2016-0063 Day Initiative
- MS16-009 Memory Corruption CVE-2016-0064 Jack Tang of Trend Micro
- MS16-009 Elevation of CVE-2016-0068 Masato Kinugawa of Cure53
- MS16-009 Elevation of CVE-2016-0069 Yosuke HASEGAWA of Secure Sky
- MS16-009 Memory Corruption CVE-2016-0071 Inc.
- MS16-009 Memory Corruption CVE-2016-0072 working with HP’s Zero Day
- MS16-009 Spoofing CVE-2016-0077 Kacper Rybczyński
- MS16-010 Spoofing CVE-2016-0029 Abdulrahman Alqabandi
- MS16-010 Spoofing CVE-2016-0030 Alexandru Coltuneac
- MS16-010 Spoofing CVE-2016-0031 Nirmal Kirubakaran, Individual
- MS16-010 Spoofing CVE-2016-0032 Ysrael Gurt of BugSec
- MS16-008 Elevation of CVE-2016-0006 James Forshaw of Google Project
- MS16-008 Elevation of CVE-2016-0007 James Forshaw of Google Project
- MS16-007 Elevation of CVE-2016-0014 Stefan Kanthak of Me, myself & IT
- MS16-007 Heap Corruption RCE CVE-2016-0015 Zero
- MS16-007 Loading Remote Code CVE-2016-0016 Steven Vittitoe of Google Project
- MS16-007 Loading Remote Code CVE-2016-0018 parvez@greyhathacker.net
- MS16-007 Loading Remote Code CVE-2016-0018 Security IPS Vulnerability
- MS16-007 Desktop Protocol CVE-2016-0019 Gal Goldshtein of Citadel
- MS16-007 Desktop Protocol CVE-2016-0019 Viktor Minin of Citadel
- MS16-007 MAPI LoadLibrary CVE-2016-0020 Ashutosh Mehra, working with
- MS16-006 Remote Code CVE-2016-0034 Anton Ivanov and Costin Raiu of
- MS16-005 ASLR Bypass CVE-2016-0008 working with VeriSign iDefense
- MS16-005 Execution CVE-2016-0009 Kerem Gümrükcü
- MS16-004 Memory Corruption CVE-2016-0010 Labs
- MS16-004 ASLR bypass CVE-2016-0012 IBM X-Forcer researcher Tom
- MS16-004 ASLR bypass CVE-2016-0012 IBM X-Forcer researcher Elad
- MS16-004 SharePoint Security CVE-2015-6117 Jonas Nilsson of Disruptive
- MS16-004 Memory Corruption CVE-2016-0035 working with HP’s Zero Day
- MS16-003 Memory Corruption CVE-2016-0002 with VeriSign iDefense Labs
- MS16-002 Memory Corruption CVE-2016-0003 Initiative
- MS16-002 Memory Corruption CVE-2016-0003 Shi Ji (@Puzzor) of VARAS@IIE
- MS16-002 Memory Corruption CVE-2016-0024 CESG
- MS16-001 Memory Corruption CVE-2016-0002 with VeriSign iDefense Labs
- MS17-022 Information CVE-2017-0022 Brooks Li and Joseph C Chen, Trend Micro
- MS17-022 Information CVE-2017-0022 Will Metcalf and Kafeine of Proofpoint
- MS17-021 Information CVE-2017-0042 Abdulrahman Alqabandi (@qab)
- MS17-020 Maker Cross-Site CVE-2017-0045 John Page (hyp3rlinx), ApparitionSec
- MS17-018 of Privilege CVE-2017-0024 with POC/PwnFest
- MS17-018 of Privilege CVE-2017-0024 POC/PwnFest
- MS17-018 of Privilege CVE-2017-0024 POC/PwnFest
- MS17-018 of Privilege CVE-2017-0026 with POC/PwnFest
- MS17-018 of Privilege CVE-2017-0026 POC/PwnFest
- MS17-018 of Privilege CVE-2017-0026 POC/PwnFest
- MS17-018 of Privilege CVE-2017-0056 Peter Hlavaty (@zer0mem), KeenLab, Tencent
- MS17-018 of Privilege CVE-2017-0056 pgboy and zhong_sf of Qihoo 360 Vulcan Team
- MS17-018 of Privilege CVE-2017-0078 pgboy and zhong_sf of Qihoo 360 Vulcan Team
- MS17-018 of Privilege CVE-2017-0079 pgboy and zhong_sf of Qihoo 360 Vulcan Team
- MS17-018 of Privilege CVE-2017-0080 pgboy and zhong_sf of Qihoo 360 Vulcan Team
- MS17-018 of Privilege CVE-2017-0081 pgboy and zhong_sf of Qihoo 360 Vulcan Team
- MS17-018 of Privilege CVE-2017-0082 pgboy and zhong_sf of Qihoo 360 Vulcan Team
- MS17-017 Elevation of CVE-2017-0101 Peter Hlavaty (@zer0mem), KeenLab, Tencent
- MS17-017 Elevation of CVE-2017-0103 James Forshaw of Google Project Zero
- MS17-017 Elevation of CVE-2017-0103 Mateusz Jurczyk of Google Project Zero
- MS17-016 Elevation of CVE-2017-0055 David Fernandez of Sidertia Solutions
- MS17-015 Elevation of CVE-2017-0110 Gabruel Lima (@gabrielpato)
- MS17-014 Memory CVE-2017-0006 Yangkang & Liyadong & Wanglu of Qihoo 360 Qex
- MS17-014 Memory CVE-2017-0019 Tony Loi of Fortinet's FortiGuard Labs
- MS17-014 Memory CVE-2017-0019 Steven Vittitoe of Google Project Zero
- MS17-014 Memory CVE-2017-0020 Qiang Liu, McAfee
- MS17-014 Information CVE-2017-0027 Jaanus Kääp of Clarified Security
- MS17-014 Denial of CVE-2017-0029 David Wind of XSEC infosec GmbH
- MS17-014 Memory CVE-2017-0030 @j00sean
- MS17-014 Memory CVE-2017-0031 @j00sean
- MS17-014 Memory CVE-2017-0052 Yangkang & Liyadong & Wanglu of Qihoo 360 Qex
- MS17-014 Memory CVE-2017-0053 Haifei Li of Intel Security
- MS17-014 Information CVE-2017-0105 Fortinet’s FortiGuard Labs
- MS17-014 SharePoint XSS CVE-2017-0107 Cheah Khai Ee, (@MercurialSec)
- MS17-014 Certificate CVE-2017-0129 Jerry Decime, Hewlett Packard Enterprise
- MS17-013 Elevation of CVE-2017-0001 Peter Hlavaty (@zer0mem), KeenLab, Tencent
- MS17-013 Elevation of CVE-2017-0005 Lockheed Martin Computer Incident Response Team
- MS17-013 Component Remote CVE-2017-0014 Hossein Lotfi, Secunia Research at Flexera
- MS17-013 Elevation of CVE-2017-0025 Lokihart working with POC/PwnFest
- MS17-013 Information CVE-2017-0038 Mateusz Jurczyk of Google Project Zero
- MS17-013 Elevation of CVE-2017-0047 bee13oy of CloverSec Labs, working with Trend
- MS17-013 Disclosure CVE-2017-0060 Mateusz Jurczyk of Google Project Zero
- MS17-013 Information CVE-2017-0061 Mateusz Jurczyk of Google Project Zero
- MS17-013 Disclosure CVE-2017-0062 Mateusz Jurczyk of Google Project Zero
- MS17-013 Information CVE-2017-0063 Mateusz Jurczyk of Google Project Zero
- MS17-013 Information CVE-2017-0073 Symeon Paraschoudis of SensePost
- MS17-013 Component Remote CVE-2017-0108 Mateusz Jurczyk of Google Project Zero
- MS17-012 Security Feature CVE-2017-0007 Matt Nelson (@enigma0x3)
- MS17-012 Loading Remote CVE-2017-0039 lywang of Tencent’s Xuanwu LAB
- MS17-012 Information CVE-2017-0057 Martin Knafve - http://martinknafve.com/
- MS17-012 Elevation of CVE-2017-0100 James Forshaw of Google Project Zero
- MS17-012 Memory CVE-2017-0104 Fortinet’s FortiGuard Labs
- MS17-011 Code Execution CVE-2017-0072 Mateusz Jurczyk of Google Project Zero
- MS17-011 Code Execution CVE-2017-0083 Mateusz Jurczyk of Google Project Zero
- MS17-011 Code Execution CVE-2017-0084 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0085 Mateusz Jurczyk of Google Project Zero
- MS17-011 Code Execution CVE-2017-0086 Mateusz Jurczyk of Google Project Zero
- MS17-011 Code Execution CVE-2017-0087 Mateusz Jurczyk of Google Project Zero
- MS17-011 Code Execution CVE-2017-0088 Mateusz Jurczyk of Google Project Zero
- MS17-011 Code Execution CVE-2017-0089 Mateusz Jurczyk of Google Project Zero
- MS17-011 Code Execution CVE-2017-0090 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0091 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0092 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0111 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0112 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0113 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0114 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0115 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0116 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0117 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0118 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0119 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0120 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0121 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0122 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0123 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0124 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0125 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0126 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0127 Mateusz Jurczyk of Google Project Zero
- MS17-011 Information CVE-2017-0128 Mateusz Jurczyk of Google Project Zero
- MS17-009 Memory CVE-2017-0023 Henry Li (zenhumany) of Trend Micro
- MS17-008 Remote Code CVE-2017-0021 Saruhan Karademir
- MS17-008 Remote Code CVE-2017-0021 Jordan Rabet, Microsoft Offensive Security
- MS17-008 Switch Denial of CVE-2017-0051 Peter Hlavaty (@zer0mem), KeenLab, Tencent
- MS17-008 of Service CVE-2017-0074 Virtualization Team
- MS17-008 of Service CVE-2017-0074 Team
- MS17-008 Code Execution CVE-2017-0075 Research Team
- MS17-008 of Service CVE-2017-0076 Mitigations Team
- MS17-008 Remote Code CVE-2017-0095 Jonathan Bar Or, Windows Defender ATP Research
- MS17-008 Information CVE-2017-0096 Jordan Rabet, Microsoft Offensive Security
- MS17-008 of Service CVE-2017-0097 MSRC Vulnerabilities and Mitigations Team
- MS17-008 of Service CVE-2017-0097 Lakewood Communications
- MS17-008 of Service CVE-2017-0099 Research Team
- MS17-008 Code Execution CVE-2017-0109 MSRC Vulnerabilities and Mitigations Team
- MS17-007 Information CVE-2017-0009 Scott Bell of Security-Assessment.com
- MS17-007 Memory CVE-2017-0010 Zhang Hanming of Qihoo 360 Vulcan Team
- MS17-007 Memory CVE-2017-0010 Dhanesh Kizhakkinan of FireEye Inc
- MS17-007 Information CVE-2017-0011 Suto, working with Trend Micro’s Zero Day
- MS17-007 Browser Spoofing CVE-2017-0012 Zhang Lin, http://xsseng.com
- MS17-007 Memory CVE-2017-0015 Lokihart working with POC/PwnFest
- MS17-007 Memory CVE-2017-0015 Simon Zuckerbraun, working with Trend Micro’s
- MS17-007 Memory CVE-2017-0015 Qixun Zhao of Qihoo 360 Skyeye Labs
- MS17-007 Information CVE-2017-0017 Masato Kinugawa of Cure53
- MS17-007 Memory CVE-2017-0032 Hao Linan of Qihoo 360 Vulcan Team
- MS17-007 Memory CVE-2017-0032 Anonymous, working with Trend Micro’s Zero Day
- MS17-007 Memory CVE-2017-0032 Qixun Zhao of Qihoo 360 Skyeye Labs
- MS17-007 Memory CVE-2017-0034 Zhong Zhaochen (@asnine) of Neusoft
- MS17-007 Memory CVE-2017-0035 Dhanesh Kizhakkinan of FireEye Inc
- MS17-007 Browser Memory CVE-2017-0037 Ivan Fratric working with Google Project Zero
- MS17-007 Information CVE-2017-0065 https://www.linkedin.com/in/henri-aho-497abab6/
- MS17-007 Browser Security CVE-2017-0066 Jun Kokatsu (@shhnjk)
- MS17-007 Memory CVE-2017-0067 Dhanesh Kizhakkinan of FireEye Inc
- MS17-007 Memory CVE-2017-0067 Gary Kwong
- MS17-007 Memory CVE-2017-0067 bee13oy of CloverSec Labs, working with Trend
- MS17-007 Memory CVE-2017-0067 Henry Li (zenhumany) of Trend Micro
- MS17-007 Information CVE-2017-0068 Jun Kokatsu (@shhnjk)
- MS17-007 Spoofing CVE-2017-0069 Jun Kokatsu (@shhnjk)
- MS17-007 Memory CVE-2017-0070 Lokihart of Google Project Zero
- MS17-007 Memory CVE-2017-0071 Lokihart of Google Project Zero
- MS17-007 Memory CVE-2017-0094 bee13oy of CloverSec Labs, working with Trend
- MS17-007 Memory CVE-2017-0131 Dhanesh Kizhakkinan of FireEye Inc
- MS17-007 Memory CVE-2017-0132 Microsoft Chakra Core Team
- MS17-007 Memory CVE-2017-0133 Dhanesh Kizhakkinan of FireEye Inc
- MS17-007 Security Feature CVE-2017-0134 Research Team
- MS17-007 Security Feature CVE-2017-0135 Xiaoyin Liu (@general_nfs)
- MS17-007 Memory CVE-2017-0136 Michael Holman, Microsoft Chakra Core Team
- MS17-007 Memory CVE-2017-0137 Nicolas Joly of MSRCE UK
- MS17-007 Memory CVE-2017-0138 Scott Bell of Security-Assessment.com
- MS17-007 Security Feature CVE-2017-0140 Yorick Koster of Securify B.V.
- MS17-007 Memory CVE-2017-0141 Semmle Inc
- MS17-007 Memory CVE-2017-0150 Microsoft ChakraCore Team
- MS17-007 Memory CVE-2017-0151 Microsoft ChakraCore Team
- MS17-006 Information CVE-2017-0009 Scott Bell of Security-Assessment.com
- MS17-006 Explorer Memory CVE-2017-0018 working with Trend Micro's Zero Day Initiative
- MS17-006 Browser Memory CVE-2017-0037 Ivan Fratric working with Google Project Zero
- MS17-006 Memory CVE-2017-0040 Scott Bell of Security-Assessment.com
- MS17-006 Information CVE-2017-0049 Scott Bell of Security-Assessment.com
- MS17-006 Information CVE-2017-0059 Ivan Fratric of Google Project Zero
- MS17-006 Memory CVE-2017-0130 Scott Bell of Security-Assessment.com
- MS17-004 Subsystem CVE-2017-0004 Nicolás Economou of Core Security
- MS17-004 Subsystem CVE-2017-0004 Laurent Gaffie
- MS17-002 Memory CVE-2017-0003 Tony Loi of Fortinet’s FortiGuard Labs
- MS15-135 Elevation of Privilege CVE-2015-6171 Google Project Zero
- MS15-135 Elevation of Privilege CVE-2015-6173 Google Project Zero
- MS15-135 Elevation of Privilege CVE-2015-6174 Google Project Zero
- MS15-135 Elevation of Privilege CVE-2015-6175 ChenDong Li of Tencent
- MS15-134 Information Disclosure CVE-2015-6127 Francisco Falcon of Core Security
- MS15-134 Media Center Library CVE-2015-6131 Zhang YunHai of NSFOCUS Security Team
- MS15-134 Remote Code Execution CVE-2015-6128 Steven Vittitoe of Google Project Zero
- MS15-134 Remote Code Execution CVE-2015-6128 Parvez Anwar
- MS15-132 Remote Code Execution CVE-2015-6132 Yorick Koster of Securify B.V.
- MS15-132 Remote Code Execution CVE-2015-6132 Steven Vittitoe of Google Project Zero
- MS15-131 Microsoft Office Memory CVE-2015-6040 Steven Vittitoe of Google Project Zero
- MS15-131 Microsoft Office Memory CVE-2015-6118 Kai Lu of Fortinet's FortiGuard Labs
- MS15-131 Microsoft Office Memory CVE-2015-6122 Steven Vittitoe of Google Project Zero
- MS15-131 Microsoft Office RCE CVE-2015-6172 Haifei Li
- MS15-131 Microsoft Office Memory CVE-2015-6177 Kai Lu of Fortinet's FortiGuard Labs
- MS15-130 Windows Integer Underflow CVE-2015-6130 Hossein Lotfi, Secunia Research (now part
- MS15-129 Information Disclosure CVE-2015-6165 Marcin 'Icewall' Noga of Cisco Talos
- MS15-128 Graphics Memory Corruption CVE-2015-6106 Steven Vittitoe of Google Project Zero
- MS15-128 Graphics Memory Corruption CVE-2015-6107 Steven Vittitoe of Google Project Zero
- MS15-126 Information Disclosure CVE-2015-6135 Day Initiative
- MS15-126 Scripting Engine Memory CVE-2015-6136 Simon Zuckerbraun, working with HP’s Zero
- MS15-126 Scripting Engine Memory CVE-2015-6136 An anonymous researcher, working with
- MS15-126 Scripting Engine Memory CVE-2015-6136 Yuki Chen of Qihoo 360Vulcan Team
- MS15-126 Scripting Engine Memory CVE-2015-6137 Anonymous contributor, working with
- MS15-125 Elevation of Privilege CVE-2015-6139 Michal Bentkowski
- MS15-125 Microsoft Browser Memory CVE-2015-6140 Bo Qu of Palo Alto Networks
- MS15-125 Microsoft Browser Memory CVE-2015-6142 Simon Zuckerbraun, working with HP’s Zero
- MS15-125 Microsoft Browser Memory CVE-2015-6142 Zheng Huang of the Baidu Scloud XTeam,
- MS15-125 Microsoft Browser Memory CVE-2015-6148 A3F2160DCA1BDE70DA1D99ED267D5DC1EC336192,
- MS15-125 Microsoft Browser Memory CVE-2015-6151 Li Kemeng of Baidu Security Team(x-Team)
- MS15-125 Microsoft Edge Memory CVE-2015-6153 Shi Ji (@Puzzor) of VARAS@IIE
- MS15-125 Microsoft Browser Memory CVE-2015-6154 ChenDong Li and YunZe Ni of Tencent
- MS15-125 Microsoft Browser Memory CVE-2015-6155 Zheng Huang of the Baidu Scloud XTeam,
- MS15-125 Microsoft Browser Memory CVE-2015-6158 Zheng Huang of the Baidu Scloud XTeam,
- MS15-125 Microsoft Browser Memory CVE-2015-6159 Zheng Huang of the Baidu Scloud XTeam
- MS15-125 Microsoft Browser Memory CVE-2015-6159 Jason Kratzer, working with HP’s Zero Day
- MS15-125 Microsoft Browser ASLR CVE-2015-6161 Rh0
- MS15-125 Microsoft Edge Memory CVE-2015-6168 SkyLined, working with HP’s Zero Day
- MS15-125 Microsoft Edge Spoofing CVE-2015-6169 Stephan Brunner
- MS15-125 Microsoft Edge Elevation CVE-2015-6170 Mario Heiderich of Cure53
- MS15-125 Microsoft Edge XSS Filter CVE-2015-6176 Masato Kinugawa
- MS15-124 Internet Explorer Memory CVE-2015-6083 Hui Gao of Palo Alto Networks
- MS15-124 Internet Explorer Memory CVE-2015-6083 B6BEB4D5E828CF0CCB47BB24AAC22515, working
- MS15-124 Internet Explorer Memory CVE-2015-6134 SkyLined, working with HP’s Zero Day
- MS15-124 Information Disclosure CVE-2015-6135 Day Initiative
- MS15-124 Information Disclosure CVE-2015-6136 Day Initiative
- MS15-124 Elevation of Privilege CVE-2015-6139 Michal Bentkowski
- MS15-124 Microsoft Browser Memory CVE-2015-6140 Bo Qu of Palo Alto Networks
- MS15-124 Microsoft Browser Memory CVE-2015-6141 B6BEB4D5E828CF0CCB47BB24AAC22515, working
- MS15-124 Microsoft Browser Memory CVE-2015-6142 Simon Zuckerbraun, working with HP’s Zero
- MS15-124 Filter Bypass CVE-2015-6144 Masato Kinugawa
- MS15-124 Filter Bypass CVE-2015-6144 Filedescriptor
- MS15-124 Internet Explorer Memory CVE-2015-6145 Cong Zhang and Yi Jiang, working with
- MS15-124 Internet Explorer Memory CVE-2015-6146 Bo Qu of Palo Alto Networks
- MS15-124 Internet Explorer Memory CVE-2015-6147 B6BEB4D5E828CF0CCB47BB24AAC22515, working
- MS15-124 Microsoft Browser Memory CVE-2015-6148 A3F2160DCA1BDE70DA1D99ED267D5DC1EC336192,
- MS15-124 Internet Explorer Memory CVE-2015-6149 B6BEB4D5E828CF0CCB47BB24AAC22515, working
- MS15-124 Internet Explorer Memory CVE-2015-6150 B6BEB4D5E828CF0CCB47BB24AAC22515, working
- MS15-124 Microsoft Browser Memory CVE-2015-6151 Li Kemeng of Baidu Security Team(x-Team)
- MS15-124 Internet Explorer Memory CVE-2015-6152 Moritz Jodeit of Blue Frost Security
- MS15-124 Microsoft Browser Memory CVE-2015-6153 Shi Ji (@Puzzor) of VARAS@IIE
- MS15-124 Microsoft Browser Memory CVE-2015-6154 ChenDong Li and YunZe Ni of Tencent
- MS15-124 Microsoft Browser Memory CVE-2015-6155 Zheng Huang of the Baidu Scloud XTeam,
- MS15-124 Internet Explorer Memory CVE-2015-6156 Anonymous contributor, working with
- MS15-124 Internet Explorer Memory CVE-2015-6157 Zheng Huang of the Baidu Scloud XTeam,
- MS15-124 Microsoft Browser Memory CVE-2015-6158 Zheng Huang of the Baidu Scloud XTeam,
- MS15-124 Microsoft Browser Memory CVE-2015-6159 Zheng Huang of the Baidu Scloud XTeam
- MS15-124 Microsoft Browser Memory CVE-2015-6159 Jason Kratzer, working with HP’s Zero Day
- MS15-124 Internet Explorer Memory CVE-2015-6160 Garage4Hackers, working with HP’s Zero
- MS15-124 Internet Explorer ASLR CVE-2015-6161 Rh0
- MS15-124 Internet Explorer Memory CVE-2015-6162 Wenxiang Qian of TencentQQBrowser
- MS15-123 Information Disclosure CVE-2015-6061 Fatih Ozavci - Sense of Security
- MS15-122 Windows Kerberos Security CVE-2015-6095 Ian Haken of Synopsys Inc.
- MS15-119 Winsock Elevation of CVE-2015-2478 Alex Ionescu of Winsider Seminars &
- MS15-119 Winsock Elevation of CVE-2015-2478 Thomas Faber, of CrowdStrike Inc.
- MS15-118 .NET Elevation of CVE-2015-6099 John Page aka hyp3rlinx
- MS15-117 Windows NDIS Elevation of CVE-2015-6098 Nils Sommer of bytegeist, working with
- MS15-116 Microsoft Office Memory CVE-2015-6038 Steven Seeley of Source Incite, working
- MS15-116 Microsoft Office Memory CVE-2015-6091 Steven Vittitoe of Google Project Zero
- MS15-116 Microsoft Office Memory CVE-2015-6092 Steven Vittitoe of Google Project Zero
- MS15-116 Microsoft Office Memory CVE-2015-6093 SignalSEC Research, working with
- MS15-116 Microsoft Office Memory CVE-2015-6094 Steven Seeley of Source Incite, working
- MS15-116 Microsoft Outlook for Mac CVE-2015-6123 Mark Robbins Rebelmail
- MS15-115 Elevation of Privilege CVE-2015-6100 Google Project Zero
- MS15-115 Elevation of Privilege CVE-2015-6101 Google Project Zero
- MS15-115 Information Disclosure CVE-2015-6102 Google Project Zero
- MS15-115 Remote Code Execution CVE-2015-6103 Mateusz Jurczyk of Google Project Zero
- MS15-115 Remote Code Execution CVE-2015-6104 Mateusz Jurczyk of Google Project Zero
- MS15-115 Feature Bypass CVE-2015-6113 James Forshaw of Google Project Zero
- MS15-114 Windows Journal Heap CVE-2015-6097 Jason Kratzer, working with VeriSign
- MS15-113 Microsoft Browser Memory CVE-2015-6064 Simon Zuckerbraun, working with HP’s Zero
- MS15-113 Microsoft Browser Memory CVE-2015-6073 Kai Kang of Tencent's Xuanwu LAB
- MS15-113 Microsoft Browser Memory CVE-2015-6078 Bo Qu of Palo Alto Networks
- MS15-113 Microsoft Browser ASLR CVE-2015-6088 JaeHun Jeong
- MS15-112 Microsoft Browser Memory CVE-2015-6064 Simon Zuckerbraun, working with HP’s Zero
- MS15-112 Internet Explorer Memory CVE-2015-6065 Jason Kratzer, working with VeriSign
- MS15-112 Internet Explorer Memory CVE-2015-6065 B6BEB4D5E828CF0CCB47BB24AAC22515, working
- MS15-112 Internet Explorer Memory CVE-2015-6066 Bo Qu of Palo Alto Networks
- MS15-112 Internet Explorer Memory CVE-2015-6068 Zheng Huang of the Baidu Scloud XTeam,
- MS15-112 Internet Explorer Memory CVE-2015-6069 Bo Qu of Palo Alto Networks
- MS15-112 Internet Explorer Memory CVE-2015-6070 Tongbo Luo of Palo Alto Networks
- MS15-112 Internet Explorer Memory CVE-2015-6070 Bo Qu of Palo Alto Networks
- MS15-112 Internet Explorer Memory CVE-2015-6071 Bo Qu of Palo Alto Networks
- MS15-112 Internet Explorer Memory CVE-2015-6072 Kai Kang of Tencent's Xuanwu LAB
- MS15-112 Microsoft Browser Memory CVE-2015-6073 Kai Kang of Tencent's Xuanwu LAB
- MS15-112 Internet Explorer Memory CVE-2015-6075 0011, working with HP’s Zero Day
- MS15-112 Internet Explorer Memory CVE-2015-6076 Anonymous, working with HP’s Zero Day
- MS15-112 Corruption Vulnerability CVE-2015-6077 with HP’s Zero Day Initiative, and Linan
- MS15-112 Internet Explorer Memory CVE-2015-6077 Linan Hao of Qihoo 360 Vulcan Team
- MS15-112 Microsoft Browser Memory CVE-2015-6078 Bo Qu of Palo Alto Networks
- MS15-112 Internet Explorer Memory CVE-2015-6079 Zheng Huang of the Baidu Scloud XTeam
- MS15-112 Internet Explorer Memory CVE-2015-6080 Zheng Huang of the Baidu Scloud XTeam
- MS15-112 Internet Explorer Memory CVE-2015-6081 B6BEB4D5E828CF0CCB47BB24AAC22515, working
- MS15-112 Internet Explorer Memory CVE-2015-6082 Zheng Huang of the Baidu Scloud XTeam
- MS15-112 Internet Explorer Memory CVE-2015-6084 Zheng Huang of the Baidu Scloud XTeam,
- MS15-112 Internet Explorer Memory CVE-2015-6085 Jason Kratzer, working with VeriSign
- MS15-112 Information Disclosure CVE-2015-6086 Initiative
- MS15-112 Internet Explorer Memory CVE-2015-6087 Bo Qu of Palo Alto Networks
- MS15-112 Scripting Engine Memory CVE-2015-6089 Yuki Chen of Qihoo 360 Vulcan Team
- MS15-099 Microsoft Office Malformed CVE-2015-2545 Genwei Jiang of FireEye, Inc.
- MS15-111 Windows Kernel Memory CVE-2015-2549 dbc282f4f2f7d2466fa0078bf8034d99
- MS15-111 Windows Elevation of CVE-2015-2550 Ashutosh Mehra, working with HP’s Zero
- MS15-111 Elevation of Privilege CVE-2015-2553 James Forshaw of Google Project Zero
- MS15-111 Elevation of Privilege CVE-2015-2554 James Forshaw of Google Project Zero
- MS15-110 Microsoft Office Memory CVE-2015-2555 3S Labs, working with HP’s Zero Day
- MS15-110 Information Disclosure CVE-2015-2556 Jakub Palaczynski of ING Services Polska
- MS15-110 Microsoft Office Memory CVE-2015-2557 kdot, working with HP’s Zero Day
- MS15-110 Microsoft Office Memory CVE-2015-2558 3S Labs, working with HP’s Zero Day
- MS15-109 Toolbar Use After Free CVE-2015-2515 Heige (a.k.a. SuperHei) from Knownsec 404
- MS15-109 Band Use After Free CVE-2015-2548 Security Team and Hui Gao of Palo Alto
- MS15-108 Scripting Engine Memory CVE-2015-2482 Skylined, working with HP’s Zero Day
- MS15-108 VBScript and JScript ASLR CVE-2015-6052 Bill Finlayson, Vectra Networks
- MS15-108 Scripting Engine Memory CVE-2015-6055 Simon Zuckerbraun, working with HP’s Zero
- MS15-108 Scripting Engine Memory CVE-2015-6055 An anonymous researcher, working with
- MS15-108 Information Disclosure CVE-2015-6059 Directions, Inc.
- MS15-107 Microsoft Edge XSS Filter CVE-2015-6058 Noriaki Iwasaki of Cyber Defense
- MS15-107 Microsoft Edge XSS Filter CVE-2015-6058 Masato Kinugawa, Individual
- MS15-107 Microsoft Edge Information CVE-2015-6057 Mario Heiderich of Cure53
- MS15-106 Scripting Engine Memory CVE-2015-2482 Skylined, working with HP’s Zero Day
- MS15-106 Internet Explorer Memory CVE-2015-6042 Garage4Hackers, working with HP’s Zero
- MS15-106 Elevation of Privilege CVE-2015-6044 Jack Tang of Trend Micro
- MS15-106 Internet Explorer Memory CVE-2015-6045 Zheng Huang of the Baidu Scloud XTeam,
- MS15-106 Internet Explorer Memory CVE-2015-6045 Kai Kang of Tencent's Xuanwu LAB
- MS15-106 Internet Explorer Memory CVE-2015-6046 Jason Kratzer, working with VeriSign
- MS15-106 Elevation of Privilege CVE-2015-6047 Day Initiative
- MS15-106 Internet Explorer Memory CVE-2015-6048 Tongbo Luo of Palo Alto Networks
- MS15-106 Internet Explorer Memory CVE-2015-6048 Hui Gao of Palo Alto Networks
- MS15-106 Internet Explorer Memory CVE-2015-6048 Dhanesh Kizhakkinan of FireEye, Inc.
- MS15-106 Internet Explorer Memory CVE-2015-6049 Heige (a.k.a. SuperHei) from Knownsec 404
- MS15-106 Internet Explorer Memory CVE-2015-6050 Zheng Huang of the Baidu Scloud XTeam,
- MS15-106 Elevation of Privilege CVE-2015-6051 Day Initiative
- MS15-106 VBScript and JScript ASLR CVE-2015-6052 Bill Finlayson, Vectra Networks
- MS15-106 Information Disclosure CVE-2015-6053 CK, working with HP’s Zero Day Initiative
- MS15-106 Scripting Engine Memory CVE-2015-6055 An anonymous researcher, working with
- MS15-106 Scripting Engine Memory CVE-2015-6056 Aakash Jain and Dhanesh Kizhakkinan of
- MS15-106 Information Disclosure CVE-2015-6059 Directions, Inc.
- MS15-106 Scripting Engine Memory CVE-2015-6184 Zheng Huang of the Baidu Scloud XTeam,
- MS15-103 Exchange Information CVE-2015-2505 John Page of hyp3rlinx
- MS15-103 Exchange Spoofing CVE-2015-2543 Abdulrahman Alqabandi
- MS15-103 Exchange Spoofing CVE-2015-2544 Justin Khoo of FreshInbox
- MS15-102 Elevation of Privilege CVE-2015-2524 James Forshaw of Google Project Zero
- MS15-102 Elevation of Privilege CVE-2015-2525 James Forshaw of Google Project Zero
- MS15-102 Elevation of Privilege CVE-2015-2528 James Forshaw of Google Project Zero
- MS15-101 .NET Elevation of CVE-2015-2504 Yorick Koster of Securify B.V.
- MS15-101 MVC Denial of Service CVE-2015-2526 Roberto Suggi Liverani of NCIA (NATO
- MS15-100 Windows Media Center RCE CVE-2015-2509 Aaron Luo, Kenney Lu, and Ziv Chang of
- MS15-099 Microsoft Office Memory CVE-2015-2520 Steven Vittitoe of Google Project Zero
- MS15-099 Microsoft Office Memory CVE-2015-2521 Steven Vittitoe of Google Project Zero
- MS15-099 Microsoft SharePoint XSS CVE-2015-2522 This vulnerability was discovered by
- MS15-099 Microsoft Office Memory CVE-2015-2523 Steven Vittitoe of Google Project Zero
- MS15-099 Microsoft Office Malformed CVE-2015-2545 Genwei Jiang of FireEye, Inc.
- MS15-098 Windows Journal RCE CVE-2015-2513 Phil Blankenship of BeyondTrust Inc
- MS15-098 Windows Journal DoS CVE-2015-2514 Kai Lu of Fortinet's FortiGuard Labs
- MS15-098 Windows Journal DoS CVE-2015-2516 Kai Lu of Fortinet's FortiGuard Labs
- MS15-097 OpenType Font Parsing CVE-2015-2506 Piotr Bania and Andrea Allievi of Cisco
- MS15-097 Font Driver Elevation of CVE-2015-2507 Nils Sommer of bytegeist, working with
- MS15-097 Font Driver Elevation of CVE-2015-2508 James Forshaw of Google Project Zero
- MS15-097 Graphics Component Buffer CVE-2015-2510 Steven Vittitoe of Google Project Zero
- MS15-097 Font Driver Elevation of CVE-2015-2511 Nils Sommer of bytegeist, working with
- MS15-097 Font Driver Elevation of CVE-2015-2512 Nils Sommer of bytegeist, working with
- MS15-097 Elevation of Privilege CVE-2015-2517 Google Project Zero
- MS15-097 Elevation of Privilege CVE-2015-2518 Google Project Zero
- MS15-097 Win32k Elevation of CVE-2015-2527 James Forshaw of Google Project Zero
- MS15-097 Kernel ASLR Bypass CVE-2015-2529 Matt Tait of Google Project Zero
- MS15-097 Elevation of Privilege CVE-2015-2546 Wang Yu of FireEye, Inc.
- MS15-096 Active Directory Denial of CVE-2015-2535 Andrew Bartlett of Catalyst and the Samba
- MS15-095 Memory Corruption CVE-2015-2485 0016EECD9D7159A949DAD3BC17E0A939, working
- MS15-095 Memory Corruption CVE-2015-2486 0016EECD9D7159A949DAD3BC17E0A939, working
- MS15-094 Information Disclosure CVE-2015-2483 Shi Ji (@Puzzor) of VARAS@IIE
- MS15-094 Tampering Vulnerability CVE-2015-2484 Haifei Li of Intel Security IPS Research
- MS15-094 Memory Corruption CVE-2015-2485 0016EECD9D7159A949DAD3BC17E0A939, working
- MS15-094 Memory Corruption CVE-2015-2486 0016EECD9D7159A949DAD3BC17E0A939, working
- MS15-094 Memory Corruption CVE-2015-2487 Pawel Wylecial, working with HP’s Zero
- MS15-094 Elevation of Privilege CVE-2015-2489 5AECDBC12A3C178E19CF1E3CB5EDAA89, working
- MS15-094 Memory Corruption CVE-2015-2490 Bo Qu of Palo Alto Networks
- MS15-094 Memory Corruption CVE-2015-2491 Heige (a.k.a. SuperHei) from Knownsec 404
- MS15-094 Memory Corruption CVE-2015-2492 Bo Qu of Palo Alto Networks
- MS15-094 Memory Corruption CVE-2015-2492 Dhanesh Kizhakkinan of FireEye, Inc.
- MS15-094 Scripting Engine Memory CVE-2015-2493 Bo Qu of Palo Alto Networks
- MS15-094 Memory Corruption CVE-2015-2494 Kai Song (exp-sky) of Tencent's Xuanwu
- MS15-094 Memory Corruption CVE-2015-2498 B6BEB4D5E828CF0CCB47BB24AAC22515, working
- MS15-094 Memory Corruption CVE-2015-2499 B6BEB4D5E828CF0CCB47BB24AAC22515, working
- MS15-094 Memory Corruption CVE-2015-2500 B6BEB4D5E828CF0CCB47BB24AAC22515, working
- MS15-094 Memory Corruption CVE-2015-2501 Sean Verity, working with HP’s Zero Day
- MS15-094 Memory Corruption CVE-2015-2541 0016EECD9D7159A949DAD3BC17E0A939, working
- MS15-093 Memory Corruption CVE-2015-2502 Clement Lecigne of Google Inc.
- MS15-092 Elevation of Privilege CVE-2015-2479 Overflow
- MS15-091 Memory Corruption CVE-2015-2441 Liu Long of the Qihoo 360 Vulcan Team
- MS15-090 Windows Registry Elevation CVE-2015-2429 Ashutosh Mehra, working with HP’s Zero
- MS15-090 Elevation of Privilege CVE-2015-2430 Day Initiative
- MS15-087 UDDI Services Elevation of CVE-2015-2475 François-Xavier Stellamans from NCI
- MS15-084 MSXML Information CVE-2015-2440 Ucha Gobejishvili, working with HP’s Zero
- MS15-083 Memory Corruption CVE-2015-2474 Tenable Network Security
- MS15-081 Microsoft Office Memory CVE-2015-1642 This vulnerability was discovered by
- MS15-081 Microsoft Office Memory CVE-2015-1642 Yong Chuan Koh (@yongchuank) of MWR Labs
- MS15-081 Microsoft Office Memory CVE-2015-1642 s3tm3m@gmail.com, working with VeriSign
- MS15-081 Microsoft Office Memory CVE-2015-2467 Steven Vittitoe of Google Project Zero
- MS15-081 Microsoft Office Memory CVE-2015-2468 Steven Vittitoe of Google Project Zero
- MS15-081 Microsoft Office Memory CVE-2015-2469 Steven Vittitoe of Google Project Zero
- MS15-081 Microsoft Office Integer CVE-2015-2470 Steven Vittitoe of Google Project Zero
- MS15-081 Microsoft Office Memory CVE-2015-2477 Steven Vittitoe of Google Project Zero
- MS15-081 Microsoft Office Memory CVE-2015-2445 Jack Tang of Trend Micro
- MS15-080 Component Remote Code CVE-2015-2431 Steven Vittitoe of Google Project Zero
- MS15-080 OpenType Font Parsing CVE-2015-2432 Mateusz Jurczyk of Google Project Zero
- MS15-080 Kernel ASLR Bypass CVE-2015-2433 Matt Tait of Google Inc.
- MS15-080 TrueType Font Parsing CVE-2015-2435 KeenTeam's Jihui Lu and Peter Hlavaty,
- MS15-080 Windows CSRSS Elevation of CVE-2015-2453 Liang Yin of Tencent PC Manager
- MS15-080 Feature Bypass CVE-2015-2454 Day Initiative
- MS15-080 TrueType Font Parsing CVE-2015-2455 Mateusz Jurczyk of Google Project Zero
- MS15-080 TrueType Font Parsing CVE-2015-2455 KeenTeam's Jihui Lu and Peter Hlavaty,
- MS15-080 TrueType Font Parsing CVE-2015-2456 Mateusz Jurczyk of Google Project Zero
- MS15-080 OpenType Font Parsing CVE-2015-2458 Mateusz Jurczyk of Google Project Zero
- MS15-080 OpenType Font Parsing CVE-2015-2459 Mateusz Jurczyk of Google Project Zero
- MS15-080 OpenType Font Parsing CVE-2015-2460 Mateusz Jurczyk of Google Project Zero
- MS15-080 OpenType Font Parsing CVE-2015-2461 Mateusz Jurczyk of Google Project Zero
- MS15-080 OpenType Font Parsing CVE-2015-2462 Mateusz Jurczyk of Google Project Zero
- MS15-080 TrueType Font Parsing CVE-2015-2463 Mateusz Jurczyk of Google Project Zero
- MS15-080 TrueType Font Parsing CVE-2015-2464 Mateusz Jurczyk of Google Project Zero
- MS15-079 Memory Corruption CVE-2015-2442 Linan Hao of the Qihoo 360 Vulcan Team
- MS15-079 Memory Corruption CVE-2015-2443 An anonymous researcher, working with
- MS15-079 Memory Corruption CVE-2015-2444 Moritz Jodeit of Blue Frost Security
- MS15-079 Security Feature Bypass CVE-2015-2445 Jack Tang of Trend Micro
- MS15-079 Vulnerability CVE-2015-2446 Security Team and Bo Qu of Palo Alto
- MS15-079 Memory Corruption CVE-2015-2447 sweetchip@GRAYHASH
- MS15-079 Memory Corruption CVE-2015-2448 An anonymous researcher, working with
- MS15-079 Security Feature Bypass CVE-2015-2449 Linan Hao of the Qihoo 360 Vulcan Team
- MS15-079 Memory Corruption CVE-2015-2450 0016EECD9D7159A949DAD3BC17E0A939, working
- MS15-079 Memory Corruption CVE-2015-2451 0016EECD9D7159A949DAD3BC17E0A939, working
- MS15-079 Memory Corruption CVE-2015-2452 0016EECD9D7159A949DAD3BC17E0A939, working
- MS15-078 OpenType Font Driver CVE-2015-2426 Mateusz Jurczyk of Google Project Zero
- MS15-078 OpenType Font Driver CVE-2015-2426 Genwei Jiang of FireEye, Inc.
- MS15-078 OpenType Font Driver CVE-2015-2426 Moony Li of TrendMicro Company
- MS15-077 ATMFD.DLL Memory CVE-2015-2387 Google Project Zero and Morgan
- MS15-076 Windows RPC Elevation of CVE-2015-2370 James Forshaw of Google Project Zero
- MS15-075 OLE Elevation of Privilege CVE-2015-2416 Nicolas Joly @n_joly
- MS15-075 OLE Elevation of Privilege CVE-2015-2417 Nicolas Joly @n_joly
- MS15-074 Windows Installer EoP CVE-2015-2371 Mariusz Mlynski working with HP’s Zero
- MS15-073 Win32k Elevation of CVE-2015-2363 enSilo
- MS15-073 Win32k Elevation of CVE-2015-2363 Peng Qiu of 360Vulcan Team
- MS15-073 Win32k Elevation of CVE-2015-2365 Nils Sommer of bytegeist, working with
- MS15-073 Win32k Elevation of CVE-2015-2366 Nils Sommer of bytegeist, working with
- MS15-073 Win32k Information CVE-2015-2367 WanderingGlitch of HP’s Zero Day
- MS15-073 Win32k Information CVE-2015-2381 Matt Tait of Google Project Zero
- MS15-073 Win32k Information CVE-2015-2382 Matt Tait of Google Project Zero
- MS15-072 Graphics Component EOP CVE-2015-2364 Nicolas Joly @n_joly
- MS15-070 Microsoft Excel ASLR CVE-2015-2375 3S Labs working with HP’s Zero Day
- MS15-070 Microsoft Office Memory CVE-2015-2376 3S Labs, working with HP’s Zero Day
- MS15-070 Microsoft Office Memory CVE-2015-2377 3S Labs, working with HP’s Zero Day
- MS15-070 Code Execution CVE-2015-2378 M1x7e1(ShiXiaoLei) of SafeyeTeam
- MS15-070 Microsoft Office Memory CVE-2015-2379 Steven Vittitoe of Google Project Zero
- MS15-070 Microsoft Office Memory CVE-2015-2380 Steven Vittitoe of Google Project Zero
- MS15-070 Microsoft Office Memory CVE-2015-2415 Jack Tang of Trend Micro
- MS15-070 Code Execution CVE-2015-2424 The Labs Team of iSIGHT Partners
- MS15-070 Code Execution CVE-2015-2424 Edward Fjellskål of Telenor CERT
- MS15-069 Windows DLL Remote Code CVE-2015-2368 Ashutosh Mehra, working with HP’s Zero
- MS15-069 DLL Planting Remote Code CVE-2015-2369 Haifei Li of McAfee Labs IPS Team
- MS15-068 Hyper-V Buffer Overflow CVE-2015-2361 Thomas Garnier of Microsoft
- MS15-068 Hyper-V System Data CVE-2015-2362 Thomas Garnier of Microsoft
- MS15-066 VBScript Memory Corruption CVE-2015-2372 Bo Qu of Palo Alto Networks
- MS15-066 VBScript Memory Corruption CVE-2015-2372 bilou, working with VeriSign iDefense
- MS15-065 Information Disclosure CVE-2015-1729 Mashiro YAMADA
- MS15-065 Internet Explorer Memory CVE-2015-1733 JaeHun Jeong (@n3sk) of WINS, WSEC
- MS15-065 Internet Explorer Memory CVE-2015-1738 Li Kemeng of Baidu Anti-virus Team
- MS15-065 Internet Explorer Memory CVE-2015-1767 An anonymous researcher, working with
- MS15-065 Internet Explorer Memory CVE-2015-1767 Zheng Huang of the Baidu Scloud XTeam,
- MS15-065 Internet Explorer Memory CVE-2015-2383 Jason Kratzer, working with VeriSign
- MS15-065 Internet Explorer Memory CVE-2015-2383 Sky, working with HP’s Zero Day
- MS15-065 Internet Explorer Memory CVE-2015-2383 Liu Long of the Qihoo 360 Vulcan Team
- MS15-065 Internet Explorer Memory CVE-2015-2383 Jihui Lu of KeenTeam (@K33nTeam)
- MS15-065 Internet Explorer Memory CVE-2015-2384 Liu Long of the Qihoo 360 Vulcan Team
- MS15-065 Internet Explorer Memory CVE-2015-2385 Liu Long of the Qihoo 360 Vulcan Team
- MS15-065 Internet Explorer Memory CVE-2015-2385 ChenDong Li of Tencent
- MS15-065 Internet Explorer Memory CVE-2015-2388 B6BEB4D5E828CF0CCB47BB24AAC22515, working
- MS15-065 Internet Explorer Memory CVE-2015-2389 Linan Hao of the Qihoo 360 Vulcan Team
- MS15-065 Internet Explorer Memory CVE-2015-2390 Linan Hao of the Qihoo 360 Vulcan Team
- MS15-065 Internet Explorer Memory CVE-2015-2391 Jack Tang of Trend Micro Inc.
- MS15-065 Internet Explorer Memory CVE-2015-2397 AA32AF9897C15779037CD4FC1C1C13D7, working
- MS15-065 Internet Explorer Memory CVE-2015-2397 A3F2160DCA1BDE70DA1D99ED267D5DC1EC336192,
- MS15-065 Internet Explorer Memory CVE-2015-2397 Bo Qu of Palo Alto Networks
- MS15-065 Filter Bypass CVE-2015-2398 Mario Heiderich
- MS15-065 Filter Bypass CVE-2015-2398 (former) and Trustwave SpiderLabs
- MS15-065 Elevation of Privilege CVE-2015-2402 Day Initiative
- MS15-065 Internet Explorer Memory CVE-2015-2403 ca0nguyen, working with HP’s Zero Day
- MS15-065 Internet Explorer Memory CVE-2015-2404 4cbad7dc77d1a1af7d66b5ded6cd92a5, working
- MS15-065 Internet Explorer Memory CVE-2015-2406 B6BEB4D5E828CF0CCB47BB24AAC22515, working
- MS15-065 Internet Explorer Memory CVE-2015-2408 Zheng Huang of Baidu Scloud XTeam,
- MS15-065 Information Disclosure CVE-2015-2410 A Google Inc. employee
- MS15-065 Internet Explorer Memory CVE-2015-2411 JeongHoon Shin
- MS15-065 Information Disclosure CVE-2015-2412 Day Initiative
- MS15-065 Information Disclosure CVE-2015-2413 Japan Inc.
- MS15-065 Information Disclosure CVE-2015-2414 at Salesforce
- MS15-065 Internet Explorer Memory CVE-2015-2422 Bo Qu of Palo Alto Networks
- MS15-065 Internet Explorer Memory CVE-2015-2425 Bill Finlayson, Vectra Networks
- MS15-065 Internet Explorer Memory CVE-2015-2425 Dhanesh Kizhakkinan of FireEye, Inc.
- MS15-065 Internet Explorer Memory CVE-2015-2425 Peter Pi of TrendMicro
- 3074162 MSRT Race Condition CVE-2015-2418 James Forshaw of Google Project Zero
- MS15-063 Windows LoadLibrary EoP CVE-2015-1758 Takashi Yoshikawa of Mitsui Bussan Secure
- MS15-062 ADFS XSS Elevation of CVE-2015-1757 “John Hollenberger” and “Tate Hansen from
- MS15-061 Information Disclosure CVE-2015-1719 Guo Pengfei of Qihoo 360
- MS15-061 Use After Free CVE-2015-1720 KK of Tencent’s Xuanwu LAB
- MS15-061 Win32k Null Pointer CVE-2015-1721 Nils Sommer of bytegeist, working with
- MS15-061 Bitmap Handling Use After CVE-2015-1722 Google Project Zero
- MS15-061 Use After Free CVE-2015-1723 Google Project Zero
- MS15-061 Object Use After Free CVE-2015-1724 Google Project Zero
- MS15-061 Win32k Buffer Overflow CVE-2015-1725 Nils Sommer of bytegeist, working with
- MS15-061 Brush Object Use After CVE-2015-1726 Google Project Zero
- MS15-061 Win32k Pool Buffer CVE-2015-1727 Nils Sommer of bytegeist, working with
- MS15-061 Win32k Elevation of CVE-2015-2360 Maxim Golovkin, Kaspersky Lab
- MS15-061 Win32k Elevation of CVE-2015-2360 enSilo Research Team
- MS15-059 Microsoft Office Memory CVE-2015-1759 Ben Hawkes of Google Project Zero
- MS15-059 Microsoft Office Memory CVE-2015-1760 Ben Hawkes of Google Project Zero
- MS15-059 Uninitialized Memory Use CVE-2015-1770 (@mwrlabs)
- MS15-057 via DataObject CVE-2015-1728 Labs
- MS15-056 Internet Explorer Memory CVE-2015-1687 Pengfei Guo of Qihoo 360
- MS15-056 Internet Explorer Memory CVE-2015-1730 SkyLined, working with VeriSign iDefense
- MS15-056 Internet Explorer Memory CVE-2015-1731 Zheng Huang of Baidu Scloud XTeam
- MS15-056 Internet Explorer Memory CVE-2015-1732 Linan Hao of the Qihoo 360 Vulcan Team
- MS15-056 Internet Explorer Memory CVE-2015-1735 Zheng Huang of Baidu Scloud XTeam working
- MS15-056 Internet Explorer Memory CVE-2015-1736 Bo Qu of Palo Alto Networks
- MS15-056 Internet Explorer Memory CVE-2015-1736 An anonymous researcher, working with
- MS15-056 Internet Explorer Memory CVE-2015-1737 Dhanesh Kizhakkinan of FireEye, Inc.
- MS15-056 Elevation of Privilege CVE-2015-1739 Day Initiative
- MS15-056 Internet Explorer Memory CVE-2015-1740 Chen Zhang (demi6od) of NSFOCUS Security
- MS15-056 Internet Explorer Memory CVE-2015-1740 Heige (a.k.a. SuperHei) from Knownsec 404
- MS15-056 Internet Explorer Memory CVE-2015-1740 Bo Qu of Palo Alto Networks
- MS15-056 Internet Explorer Memory CVE-2015-1741 Chen Zhang (demi6od) of NSFOCUS Security
- MS15-056 Internet Explorer Memory CVE-2015-1742 Chen Zhang (demi6od) of NSFOCUS Security
- MS15-056 Elevation of Privilege CVE-2015-1743 Haifei Li of McAfee Labs IPS Team
- MS15-056 Elevation of Privilege CVE-2015-1743 working with HP’s Zero Day Initiative
- MS15-056 Elevation of Privilege CVE-2015-1743 Day Initiative
- MS15-056 Internet Explorer Memory CVE-2015-1744 Bo Qu of Palo Alto Networks
- MS15-056 Corruption Vulnerability CVE-2015-1744 Mobile Internet System and Application
- MS15-056 Internet Explorer Memory CVE-2015-1745 Yuki Chen of Qihoo 360 working with
- MS15-056 Internet Explorer Memory CVE-2015-1747 lokihardt@ASRT working with HP’s Zero Day
- MS15-056 Elevation of Privilege CVE-2015-1748 Initiative
- MS15-056 Internet Explorer Memory CVE-2015-1750 Bo Qu of Palo Alto Networks
- MS15-056 Internet Explorer Memory CVE-2015-1751 Jason Kratzer, working with VeriSign
- MS15-056 Internet Explorer Memory CVE-2015-1752 Kai Song (exp-sky) of Tencent's Xuanwu
- MS15-056 Internet Explorer Memory CVE-2015-1752 Henry Li of Trend Micro
- MS15-056 Internet Explorer Memory CVE-2015-1753 Jihui Lu of KeenTeam (@K33nTeam)
- MS15-056 Internet Explorer Memory CVE-2015-1754 Jack Tang of Trend Micro
- MS15-056 Internet Explorer Memory CVE-2015-1755 0016EECD9D7159A949DAD3BC17E0A939 working
- MS15-056 Internet Explorer Memory CVE-2015-1755 Jason Kratzer, working with VeriSign
- MS15-054 Console File Format Denial CVE-2015-1681 Day Initiative
- MS15-053 VBScript ASLR Bypass CVE-2015-1684 SkyLined, working with HP’s Zero Day
- MS15-053 VBScript and JScript ASLR CVE-2015-1686 Bill Finlayson of BeyondTrust Inc
- MS15-052 Feature Bypass CVE-2015-1674 Day Initiative
- MS15-051 Memory Disclosure CVE-2015-1676 Initiative
- MS15-051 Memory Disclosure CVE-2015-1677 Initiative
- MS15-051 Memory Disclosure CVE-2015-1678 Initiative
- MS15-051 Memory Disclosure CVE-2015-1679 Initiative
- MS15-051 Memory Disclosure CVE-2015-1680 Initiative
- MS15-049 of Browser Application CVE-2015-1715 Exodus Intelligence
- MS15-048 .NET XML Decryption Denial CVE-2015-1672 John Heasman of DocuSign
- MS15-048 Windows Forms Elevation of CVE-2015-1673 Kalle Niemitalo
- MS15-046 Microsoft Office Memory CVE-2015-1682 3S Labs, working with HP’s Zero Day
- MS15-046 Microsoft Office Memory CVE-2015-1683 Jack Tang of Trend Micro
- MS15-046 Microsoft Office Memory CVE-2015-1683 Kai Lu of Fortinet's FortiGuard Labs
- MS15-045 Code Execution CVE-2015-1675 Bill Finlayson of Beyond Trust, Inc.
- MS15-045 Code Execution CVE-2015-1695 Adith Sudhakar, VMware
- MS15-045 Code Execution CVE-2015-1696 Rohit Mothe of VeriSign iDefense Labs
- MS15-045 Code Execution CVE-2015-1697 Rohit Mothe of VeriSign iDefense Labs
- MS15-045 Code Execution CVE-2015-1698 Adith Sudhakar, VMware
- MS15-045 Code Execution CVE-2015-1698 Rohit Mothe of VeriSign iDefense Labs
- MS15-045 Code Execution CVE-2015-1699 Steven Seeley of Source Incite
- MS15-044 OpenType Font Parsing CVE-2015-1670 Mateusz Jurczyk of Google Project Zero
- MS15-044 TrueType Font Parsing CVE-2015-1671 Dan Caselden of FireEye, Inc.
- MS15-043 Internet Explorer Memory CVE-2015-1658 Jason Kratzer, working with VeriSign
- MS15-043 Corruption Vulnerability CVE-2015-1658 Mobile Internet System and Application
- MS15-043 VBScript ASLR Bypass CVE-2015-1684 SkyLined, working with HP’s Zero Day
- MS15-043 Internet Explorer ASLR CVE-2015-1685 Hao Linan of 360 Vulcan Team
- MS15-043 Internet Explorer ASLR CVE-2015-1685 Dhanesh Kizhakkinan of FireEye, Inc.
- MS15-043 Internet Explorer ASLR CVE-2015-1685 Li Kemeng of Baidu Scloud XTeam
- MS15-043 VBScript and JScript ASLR CVE-2015-1686 Bill Finlayson of BeyondTrust Inc
- MS15-043 Elevation of Privilege CVE-2015-1688 Ashutosh Mehra
- MS15-043 Internet Explorer Memory CVE-2015-1689 Jihui Lu of KeenTeam (@K33nTeam)
- MS15-043 Internet Explorer Memory CVE-2015-1691 Jihui Lu of KeenTeam (@K33nTeam)
- MS15-043 Clipboard Information CVE-2015-1692 Daniel Trebbien
- MS15-043 Clipboard Information CVE-2015-1692 Vincent Lee of TELUS Security Labs
- MS15-043 Internet Explorer Memory CVE-2015-1694 Jack Tang of Trend Micro
- MS15-043 Elevation of Privilege CVE-2015-1703 Akitsugu
- MS15-043 Elevation of Privilege CVE-2015-1704 Mario Heiderich
- MS15-043 Internet Explorer Memory CVE-2015-1705 Bo Qu of Palo Alto Networks
- MS15-043 Internet Explorer Memory CVE-2015-1706 Zheng Huang of Baidu Scloud XTeam working
- MS15-043 Internet Explorer Memory CVE-2015-1708 Bo Qu of Palo Alto Networks
- MS15-043 Internet Explorer Memory CVE-2015-1709 Jack Tang of Trend Micro
- MS15-043 Internet Explorer Memory CVE-2015-1709 Zheng Huang of Baidu Scloud XTeam working
- MS15-043 Internet Explorer Memory CVE-2015-1710 Dhanesh Kizhakkinan of FireEye, Inc.
- MS15-043 Internet Explorer Memory CVE-2015-1711 Bo Qu of Palo Alto Networks
- MS15-043 Internet Explorer Memory CVE-2015-1712 sweetchip@GRAYHASH
- MS15-043 Elevation of Privilege CVE-2015-1713 Ashutosh Mehra
- MS15-043 Internet Explorer Memory CVE-2015-1714 sweetchip@GRAYHASH, working with
- MS15-043 Internet Explorer Memory CVE-2015-1717 0016EECD9D7159A949DAD3BC17E0A939, working
- MS15-043 Internet Explorer Memory CVE-2015-1718 Jihui Lu of KeenTeam (@K33nTeam)
- MS15-042 Windows Hyper-V DoS CVE-2015-1647 Dmitry Alikov of Veeam Software AG
- MS15-039 SFB vulnerability CVE-2015-1646 Gorbaty, Anton Rager, and Jonathan
- MS15-038 Type Confusion CVE-2015-1643 James Forshaw of Google Project Zero
- MS15-038 Elevation of Privilege CVE-2015-1644 James Forshaw of Google Project Zero
- MS15-037 Task Scheduler Elevation CVE-2015-0098 Renato Ettisberger of IOprotect GmbH
- MS15-035 EMF Processing Remote Code CVE-2015-1645 Hossein Lotfi, Secunia Research
- MS15-034 HTTP.sys Remote Code CVE-2015-1635 The Citrix Security Response Team
- MS15-033 Microsoft Outlook App for CVE-2015-1639 Rakesh Dharmavaram
- MS15-033 Microsoft Office Memory CVE-2015-1641 The Labs Team of iSIGHT Partners
- MS15-033 Use After Free CVE-2015-1649 Jack Tang of Trend Micro
- MS15-033 Use After Free CVE-2015-1649 Dan Caselden of FireEye, Inc.
- MS15-033 Use After Free CVE-2015-1650 Initiative
- MS15-033 Use After Free CVE-2015-1651 Ben Hawkes of Google Project Zero
- MS15-032 Internet Explorer Memory CVE-2015-1652 0016EECD9D7159A949DAD3BC17E0A939, working
- MS15-032 Internet Explorer Memory CVE-2015-1657 Jihui Lu of KeenTeam (@K33nTeam)
- MS15-032 Internet Explorer Memory CVE-2015-1659 Jason Kratzer, working with HP’s Zero Day
- MS15-032 Internet Explorer Memory CVE-2015-1660 Arthur Gerkis, working with HP’s Zero Day
- MS15-032 Internet Explorer Memory CVE-2015-1661 AbdulAziz Hariri, working with HP’s Zero
- MS15-032 Internet Explorer Memory CVE-2015-1665 AMol NAik & Garage4Hackers, working with
- MS15-032 Internet Explorer Memory CVE-2015-1666 b0nd@garage4hackers@, working with
- MS15-032 Internet Explorer Memory CVE-2015-1667 ca0nguyen, working with HP’s Zero Day
- MS15-032 Internet Explorer Memory CVE-2015-1668 Omair, working with HP’s Zero Day
- MS15-029 JPEG XR Parser Information CVE-2015-0076 Michal Zalewski of Google Inc.
- MS15-028 Feature Bypass CVE-2015-0084 James Forshaw of Google Project Zero
- MS15-027 NETLOGON Spoofing CVE-2015-0005 Security. The publication of this
- MS15-026 Parameter Cross Site CVE-2015-1628 Francisco Correa
- MS15-026 ExchangeDLP Cross Site CVE-2015-1629 Adi Ivascu
- MS15-026 Audit Report Cross Site CVE-2015-1630 Adi Ivascu
- MS15-026 Request Spoofing CVE-2015-1631 Nicolai Grodum
- MS15-026 Cross Site Scripting CVE-2015-1632 Darius Petrescu
- MS15-025 Elevation of Privilege CVE-2015-0073 James Forshaw of Google Project Zero
- MS15-024 Information Disclosure CVE-2015-0080 Michal Zalewski of Google Inc.
- MS15-023 Memory Disclosure CVE-2015-0077 Day Initiative
- MS15-023 Win32k Elevation of CVE-2015-0078 James Forshaw of Google Project Zero
- MS15-023 Win32k Elevation of CVE-2015-0078 Ashutosh Mehra of Adobe Systems Inc.
- MS15-023 Memory Disclosure CVE-2015-0094 Day Initiative
- MS15-023 Memory Disclosure CVE-2015-0095 KK of Xuanwu Lab of Tencent
- MS15-022 Use After Free CVE-2015-0085 Initiative
- MS15-022 Microsoft Office Memory CVE-2015-0086 Ben Hawkes of Google Project Zero
- MS15-022 Remote Code Execution CVE-2015-0097 Security’s SecuriTeam Secure Disclosure
- MS15-022 Microsoft SharePoint XSS CVE-2015-1633 Adi Ivascu
- MS15-022 Microsoft SharePoint XSS CVE-2015-1636 Adi Ivascu
- MS15-021 Adobe Font Driver Denial CVE-2015-0074 Mateusz Jurczyk of Google Project Zero
- MS15-021 Information Disclosure CVE-2015-0087 Mateusz Jurczyk of Google Project Zero
- MS15-021 Code Execution CVE-2015-0088 Mateusz Jurczyk of Google Project Zero
- MS15-021 Information Disclosure CVE-2015-0089 Mateusz Jurczyk of Google Project Zero
- MS15-021 Code Execution CVE-2015-0090 Mateusz Jurczyk of Google Project Zero
- MS15-021 Code Execution CVE-2015-0091 Mateusz Jurczyk of Google Project Zero
- MS15-021 Code Execution CVE-2015-0092 Mateusz Jurczyk of Google Project Zero
- MS15-021 Code Execution CVE-2015-0092 Initiative
- MS15-021 Code Execution CVE-2015-0093 Mateusz Jurczyk of Google Project Zero
- MS15-020 WTS Remote Code Execution CVE-2015-0081 Garage4Hackers, working with HP’s Zero
- MS15-020 WTS Remote Code Execution CVE-2015-0081 Francis Provencher of Protek Research
- MS15-020 DLL Planting Remote Code CVE-2015-0096 Michael Heerklotz, working with HP’s Zero
- MS15-019 VBScript Memory Corruption CVE-2015-0032 Bo Qu of Palo Alto Networks
- MS15-018 VBScript Memory Corruption CVE-2015-0032 Bo Qu of Palo Alto Networks
- MS15-018 Internet Explorer Memory CVE-2015-0056 0016EECD9D7159A949DAD3BC17E0A939, working
- MS15-018 Internet Explorer Memory CVE-2015-0056 Jihui Lu of KeenTeam (@K33nTeam)
- MS15-018 Internet Explorer Memory CVE-2015-0099 SkyLined, working with HP’s Zero Day
- MS15-018 Internet Explorer Memory CVE-2015-0100 ca0nguyen, working with HP’s Zero Day
- MS15-018 Internet Explorer Memory CVE-2015-1622 SkyLined, working with HP’s Zero Day
- MS15-018 Internet Explorer Memory CVE-2015-1622 AMol NAik, working with HP’s Zero Day
- MS15-018 Internet Explorer Memory CVE-2015-1623 0016EECD9D7159A949DAD3BC17E0A939, working
- MS15-018 Internet Explorer Memory CVE-2015-1624 Arthur Gerkis, working with HP’s Zero Day
- MS15-018 Internet Explorer Memory CVE-2015-1625 Bo Qu of Palo Alto Networks
- MS15-018 Internet Explorer Memory CVE-2015-1626 ca0nguyen, working with HP’s Zero Day
- MS15-018 Elevation of Privilege CVE-2015-1627 Ashutosh Mehra
- MS15-018 Corruption Vulnerability CVE-2015-1634 Beyond Security’s SecuriTeam Secure
- MS15-016 Information Disclosure CVE-2015-0061 Michal Zalewski of Google Inc.
- MS15-015 Elevation of Privilege CVE-2015-0062 James Forshaw of Google Project Zero
- MS15-014 Feature Bypass CVE-2015-0009 Luke Jennings
- MS15-012 Excel Remote Code CVE-2015-0063 Fermin J. Serna of the Google Security
- MS15-012 Office Remote Code CVE-2015-0064 Ben Hawkes of Google Project Zero
- MS15-012 Remote Code Execution CVE-2015-0065 Ben Hawkes of Google Project Zero
- MS15-011 Group Policy Remote Code CVE-2015-0008 Jeff Schmidt of JAS Global Advisors
- MS15-011 Group Policy Remote Code CVE-2015-0008 Dr. Arnoldo Muller-Molina of simMachines
- MS15-011 Group Policy Remote Code CVE-2015-0008 The Internet Corporation for Assigned
- MS15-010 Win32k Elevation of CVE-2015-0003 Marcin Wiazowski, working with HP’s Zero
- MS15-010 CNG Security Feature CVE-2015-0010 James Forshaw of Google Project Zero
- MS15-010 Win32k Elevation of CVE-2015-0057 Udi Yavo, CTO of enSilo
- MS15-010 Windows Cursor Object CVE-2015-0058 n3phos, working with HP’s Zero Day
- MS15-010 Remote Code Execution CVE-2015-0059 Cris Neckar of Divergent Security
- MS15-010 Windows Font Driver Denial CVE-2015-0060 Cris Neckar of Divergent Security
- MS15-009 Internet Explorer Memory CVE-2015-0017 Aniway.Anyway@gmail.com, working with
- MS15-009 Internet Explorer Memory CVE-2015-0017 Adlab of Venustech
- MS15-009 Internet Explorer Memory CVE-2015-0018 Bo Qu of Palo Alto Networks
- MS15-009 Internet Explorer Memory CVE-2015-0019 Bo Qu of Palo Alto Networks
- MS15-009 Internet Explorer Memory CVE-2015-0020 Liu Long of Qihoo 360
- MS15-009 Internet Explorer Memory CVE-2015-0021 Liu Long of Qihoo 360
- MS15-009 Internet Explorer Memory CVE-2015-0022 Yujie Wen of Qihoo 360
- MS15-009 Internet Explorer Memory CVE-2015-0023 José A. Vázquez of VeriSign iDefense Labs
- MS15-009 Internet Explorer Memory CVE-2015-0025 An anonymous researcher, working with
- MS15-009 Internet Explorer Memory CVE-2015-0026 Chen Zhang (demi6od) of NSFOCUS Security
- MS15-009 Internet Explorer Memory CVE-2015-0027 Jason Kratzer, working with HP’s Zero Day
- MS15-009 Internet Explorer Memory CVE-2015-0028 Yujie Wen of Qihoo 360
- MS15-009 Internet Explorer Memory CVE-2015-0029 Yuki Chen of Qihoo 360
- MS15-009 Internet Explorer Memory CVE-2015-0030 Chen Zhang (demi6od) of NSFOCUS Security
- MS15-009 Internet Explorer Memory CVE-2015-0031 Aniway.Anyway@gmail.com, working with
- MS15-009 Internet Explorer Memory CVE-2015-0035 Sky, working with HP’s Zero Day
- MS15-009 Internet Explorer Memory CVE-2015-0035 Pawel Wylecial, working with HP’s Zero
- MS15-009 Internet Explorer Memory CVE-2015-0035 Li Kemeng of Baidu Anti-virus Team
- MS15-009 Internet Explorer Memory CVE-2015-0036 An anonymous researcher, working with
- MS15-009 Internet Explorer Memory CVE-2015-0037 sweetchip@GRAYHASH, working with
- MS15-009 Internet Explorer Memory CVE-2015-0038 An anonymous researcher, working with
- MS15-009 Internet Explorer Memory CVE-2015-0038 Dhanesh Kizhakkinan of FireEye, Inc.
- MS15-009 Internet Explorer Memory CVE-2015-0038 Bo Qu of Palo Alto Networks
- MS15-009 Internet Explorer Memory CVE-2015-0039 Jihui Lu of KeenTeam (@K33nTeam)
- MS15-009 Internet Explorer Memory CVE-2015-0040 SkyLined, working with HP’s Zero Day
- MS15-009 Internet Explorer Memory CVE-2015-0041 0016EECD9D7159A949DAD3BC17E0A939, working
- MS15-009 Internet Explorer Memory CVE-2015-0041 An anonymous researcher, working with
- MS15-009 Internet Explorer Memory CVE-2015-0041 Li Kemeng of Baidu Anti-virus Team
- MS15-009 Internet Explorer Memory CVE-2015-0042 Omair working with HP’s Zero Day
- MS15-009 Internet Explorer Memory CVE-2015-0043 Omair working with HP’s Zero Day
- MS15-009 Internet Explorer Memory CVE-2015-0044 ca0nguyen, working with HP’s Zero Day
- MS15-009 Internet Explorer Memory CVE-2015-0045 ca0nguyen, working with HP’s Zero Day
- MS15-009 Internet Explorer Memory CVE-2015-0045 Bo Qu of Palo Alto Networks
- MS15-009 Internet Explorer Memory CVE-2015-0046 Stephen Fewer of Harmony Security,
- MS15-009 Internet Explorer Memory CVE-2015-0048 SkyLined
- MS15-009 Internet Explorer Memory CVE-2015-0049 SkyLined
- MS15-009 Internet Explorer Memory CVE-2015-0050 SkyLined
- MS15-009 Internet Explorer ASLR CVE-2015-0051 SkyLined
- MS15-009 Internet Explorer Memory CVE-2015-0052 SkyLined
- MS15-009 Internet Explorer Memory CVE-2015-0053 SkyLined, working with HP’s Zero Day
- MS15-009 Internet Explorer Memory CVE-2015-0053 Tao Qiu of Huawei's IT Infrastructure &
- MS15-009 Elevation of Privilege CVE-2015-0055 James Forshaw of Google Project Zero
- MS15-009 Internet Explorer Memory CVE-2015-0066 Edward Torkington of NCC Group
- MS15-009 Internet Explorer Memory CVE-2015-0066 Jihui Lu of KeenTeam (@K33nTeam)
- MS15-009 Internet Explorer Memory CVE-2015-0067 Peter Vreugdenhil of exodusintel.com
- MS15-009 Internet Explorer Memory CVE-2015-0068 Bo Qu of Palo Alto Networks
- MS15-009 Internet Explorer ASLR CVE-2015-0069 Jack Tang of Trend Micro
- MS15-009 Internet Explorer ASLR CVE-2015-0071 The Labs Team of iSIGHT Partners
- MS15-009 Internet Explorer ASLR CVE-2015-0071 Clement Lecigne of Google Inc.
- MS15-008 WebDAV Elevation of CVE-2015-0011 James Forshaw of Google Project Zero
- MS15-006 Security Feature Bypass CVE-2015-0001 Solutions Inc. and CrowdStrike Inc.
- MS15-005 NLA Security Feature CVE-2015-0006 Jonas Vestberg of Sentor
- MS15-004 Elevation of Privilege CVE-2015-0016 Liam O’Murchu of Symantec
- MS15-002 Buffer Overflow CVE-2015-0014 Higuchi SMITH of the University of
- MS14-085 Information CVE-2014-6355 Michal Zalewski of Google Inc.
- MS14-084 Corruption CVE-2014-6363 Labs
- MS14-083 Execution in CVE-2014-6360 Ben Hawkes of Google Project Zero
- MS14-083 Pointer Remote CVE-2014-6361 Ben Hawkes of Google Project Zero
- MS14-082 Component Use CVE-2014-6364 Ben Hawkes of Google Project Zero
- MS14-081 Code Execution CVE-2014-6356 Ben Hawkes of Google Project Zero
- MS14-081 Word Remote Code CVE-2014-6357 Ben Hawkes of Google Project Zero
- MS14-080 Explorer Memory CVE-2014-6327 Garage4Hackers, working with HP's Zero
- MS14-080 Explorer XSS CVE-2014-6328 Takeshi Terada of Mitsui Bussan Secure
- MS14-080 Explorer Memory CVE-2014-6329 Garage4Hackers, working with HP's Zero
- MS14-080 Explorer Memory CVE-2014-6330 A Qihoo researcher
- MS14-080 Corruption CVE-2014-6363 Labs
- MS14-080 Explorer XSS CVE-2014-6365 Dieyu: right-write-Correct
- MS14-080 Explorer Memory CVE-2014-6366 Liu Long of Qihoo 360
- MS14-080 Explorer ASLR CVE-2014-6368 Jack Tang of Trend Micro
- MS14-080 Explorer ASLR CVE-2014-6368 SkyLined
- MS14-080 Explorer Memory CVE-2014-6369 Yuki Chen of Qihoo 360
- MS14-080 Explorer Memory CVE-2014-6369 0016EECD9D7159A949DAD3BC17E0A939, working
- MS14-080 Explorer Memory CVE-2014-6373 Donghai Zhu
- MS14-080 Explorer Memory CVE-2014-6374 SkyLined, working with HP's Zero Day
- MS14-080 Explorer Memory CVE-2014-6374 3S Labs, working with HP's Zero Day
- MS14-080 Explorer Memory CVE-2014-6375 Sky, working with HP's Zero Day
- MS14-080 Explorer Memory CVE-2014-6375 Jihui Lu of KeenTeam (@K33nTeam)
- MS14-080 Explorer Memory CVE-2014-6376 Garage4Hackers, working with HP's Zero
- MS14-080 Explorer Memory CVE-2014-8966 Sky, working with HP's Zero Day
- MS14-075 Access Token CVE-2014-6319 Nikolay Anisenya
- MS14-075 OWA XSS CVE-2014-6325 John Koerner
- MS14-075 OWA XSS CVE-2014-6326 Adi Ivascu
- MS14-075 Redirection CVE-2014-6336 Jason Tsang Mui Chung
- MS14-079 Windows Kernel CVE-2014-6317 Hossein Lotfi of Secunia Research
- MS14-078 Elevation of CVE-2014-4077 Kaspersky Lab
- MS14-073 Elevation of CVE-2014-4116 Drew Calcott of EY
- MS14-072 TypeFilterLevel CVE-2014-4149 James Forshaw of Context Information
- MS14-071 Service CVE-2014-6322 James Forshaw of Google Project Zero
- MS14-070 of Privilege CVE-2014-4076 Matt Bergin of KoreLogic Security
- MS14-069 Remote Code CVE-2014-6333 Ben Hawkes of Google Project Zero
- MS14-069 Bad Index Remote CVE-2014-6334 Ben Hawkes of Google Project Zero
- MS14-069 Remote Code CVE-2014-6335 Ben Hawkes of Google Project Zero
- MS14-068 Checksum CVE-2014-6324 Management team, with special recognition
- MS14-067 Code Execution CVE-2014-4118 Alisa Esage Shevchenko of Esage Lab
- MS14-065 Explorer Memory CVE-2014-4143 s3tm3m, working with HP's Zero Day
- MS14-065 Clipboard CVE-2014-6323 Daniel Trebbien
- MS14-065 Explorer Memory CVE-2014-6337 Bo Qu of Palo Alto Networks
- MS14-065 Explorer ASLR CVE-2014-6339 Bo Qu of Palo Alto Networks
- MS14-065 Explorer ASLR CVE-2014-6339 Jihui Lu of KeenTeam (@K33nTeam)
- MS14-065 Cross-domain CVE-2014-6340 James Forshaw of Context Information
- MS14-065 Explorer Memory CVE-2014-6341 s3tm3m, working with HP's Zero Day
- MS14-065 Explorer Memory CVE-2014-6342 SkyLined, working with HP's Zero Day
- MS14-065 Explorer Memory CVE-2014-6343 0016EECD9D7159A949DAD3BC17E0A939, working
- MS14-065 Explorer Memory CVE-2014-6344 Jason Kratzer, working with HP's Zero Day
- MS14-065 Cross-domain CVE-2014-6345 Takeshi Terada of Mitsui Bussan Secure
- MS14-065 Cross-domain CVE-2014-6346 Takeshi Terada of Mitsui Bussan Secure
- MS14-065 Explorer Memory CVE-2014-6347 Cloudfuzzer, working with HP's Zero Day
- MS14-065 Explorer Memory CVE-2014-6348 A3F2160DCA1BDE70DA1D99ED267D5DC1EC336192,
- MS14-065 Elevation of CVE-2014-6349 Project Zero
- MS14-065 Elevation of CVE-2014-6350 Project Zero
- MS14-065 Explorer Memory CVE-2014-6351 Bo Qu of Palo Alto Networks
- MS14-065 Explorer Memory CVE-2014-6351 ca0nguyen, working with HP's Zero Day
- MS14-065 Explorer Memory CVE-2014-6351 Hui Gao of Palo Alto Networks
- MS14-065 Explorer Memory CVE-2014-6353 Pengfei Guo of Qihoo 360
- MS14-064 Remote Code CVE-2014-6332 Robert Freeman of IBM X-Force
- MS14-064 Remote Code CVE-2014-6352 Drew Hintz, Shane Huntley, and Matty
- MS14-064 Remote Code CVE-2014-6352 Haifei Li and Bing Sun of the McAfee
- MS14-064 Remote Code CVE-2014-6352 Yu Wang, Bin Wang, and Donghui Zhang of
- MS14-063 Elevation of CVE-2014-4115 Marcin 'Icewall' Noga of Cisco Talos
- MS14-061 File Format CVE-2014-4117 Initiative
- MS14-060 Remote Code CVE-2014-4114 iSIGHT Partners and researchers from ESET
- MS14-058 Elevation of CVE-2014-4113 CrowdStrike Intelligence Team
- MS14-058 Elevation of CVE-2014-4113 FireEye, Inc.
- MS14-057 Elevation of CVE-2014-4073 James Forshaw of Context Information
- MS14-056 Elevation of CVE-2014-4123 Security
- MS14-056 Elevation of CVE-2014-4124 Security
- MS14-056 Explorer Memory CVE-2014-4126 Rohit Mothe, working with VeriSign
- MS14-056 Explorer Memory CVE-2014-4126 Chen Zhang (demi6od) of NSFOCUS Security
- MS14-056 Explorer Memory CVE-2014-4127 Bo Qu of Palo Alto Networks
- MS14-056 Explorer Memory CVE-2014-4128 Omair, working with VeriSign iDefense
- MS14-056 Explorer Memory CVE-2014-4128 Jason Kratzer
- MS14-056 Explorer Memory CVE-2014-4129 Adlab of Venustech
- MS14-056 Explorer Memory CVE-2014-4129 Yuki Chen of Qihoo 360
- MS14-056 Explorer Memory CVE-2014-4130 Sky, working with HP's Zero Day
- MS14-056 Explorer Memory CVE-2014-4130 Jihui Lu of KeenTeam (@K33nTeam)
- MS14-056 Explorer Memory CVE-2014-4132 Zhibin Hu of Qihoo 360
- MS14-056 Explorer Memory CVE-2014-4132 Research, working with VeriSign iDefense
- MS14-056 Explorer Memory CVE-2014-4133 Zhibin Hu of Qihoo 360
- MS14-056 Explorer Memory CVE-2014-4134 Zhibin Hu of Qihoo 360
- MS14-056 Explorer Memory CVE-2014-4134 Liu Long of Qihoo 360
- MS14-056 Explorer Memory CVE-2014-4134 Yujie Wen of Qihoo 360
- MS14-056 Explorer Memory CVE-2014-4137 Liu Long of Qihoo 360
- MS14-056 Explorer Memory CVE-2014-4137 Bo Qu of Palo Alto Networks
- MS14-056 Explorer Memory CVE-2014-4138 SkyLined, working with HP's Zero Day
- MS14-056 Explorer ASLR CVE-2014-4140 John Villamil (@day6reak)
- MS14-056 Explorer ASLR CVE-2014-4140 Jack Tang of Trend Micro
- MS14-056 Explorer ASLR CVE-2014-4140 Chen Zhang (demi6od) of NSFOCUS Security
- MS14-056 Explorer Memory CVE-2014-4141 Corelan, working with HP's Zero Day
- MS14-055 Service CVE-2014-4068 Software GmbH
- MS14-055 Information CVE-2014-4070 Security's SecuriTeam Secure Disclosure
- MS14-055 Service CVE-2014-4071 KDDI Corp. Lync Team
- MS14-054 Task Scheduler CVE-2014-4074 James Forshaw of Context Information
- MS14-053 Denial of CVE-2014-4072 Alexander Klink of n.runs AG
- MS14-052 Explorer Memory CVE-2014-2799 Bo Qu of Palo Alto Networks
- MS14-052 Explorer Memory CVE-2014-2799 Adlab of Venustech
- MS14-052 Explorer Memory CVE-2014-4059 Adlab of Venustech
- MS14-052 Explorer Memory CVE-2014-4065 AbdulAziz Hariri of HP's Zero Day
- MS14-052 Explorer Memory CVE-2014-4079 56e7aec02099b976120abfda31254b05, working
- MS14-052 Explorer Memory CVE-2014-4080 Bo Qu of Palo Alto Networks
- MS14-052 Explorer Memory CVE-2014-4081 Bo Qu of Palo Alto Networks
- MS14-052 Explorer Memory CVE-2014-4081 Adlab of Venustech
- MS14-052 Explorer Memory CVE-2014-4082 Yuki Chen of Qihoo 360
- MS14-052 Explorer Memory CVE-2014-4082 Bo Qu of Palo Alto Networks
- MS14-052 Explorer Memory CVE-2014-4083 Adlab of Venustech
- MS14-052 Explorer Memory CVE-2014-4084 Adlab of Venustech
- MS14-052 Explorer Memory CVE-2014-4084 KnownSec Team
- MS14-052 Explorer Memory CVE-2014-4084 Bo Qu of Palo Alto Networks
- MS14-052 Explorer Memory CVE-2014-4085 Sky, working with HP's Zero Day
- MS14-052 Explorer Memory CVE-2014-4086 Bo Qu of Palo Alto Networks
- MS14-052 Explorer Memory CVE-2014-4086 Liu Long of Qihoo 360
- MS14-052 Explorer Memory CVE-2014-4086 Skylined
- MS14-052 Explorer Memory CVE-2014-4086 Heige
- MS14-052 Explorer Memory CVE-2014-4087 Bo Qu of Palo Alto Networks
- MS14-052 Explorer Memory CVE-2014-4087 Zhibin Hu Qihoo 360
- MS14-052 Explorer Memory CVE-2014-4088 Hui Gao of Palo Alto Networks
- MS14-052 Explorer Memory CVE-2014-4089 Bo Qu of Palo Alto Networks
- MS14-052 Explorer Memory CVE-2014-4090 Garage4Hackers, working with HP's Zero
- MS14-052 Explorer Memory CVE-2014-4091 Yuki Chen of Qihoo 360
- MS14-052 Explorer Memory CVE-2014-4092 Bo Qu of Palo Alto Networks
- MS14-052 Explorer Memory CVE-2014-4092 A3F2160DCA1BDE70DA1D99ED267D5DC1EC336192,
- MS14-052 Explorer Memory CVE-2014-4092 Jason Kratzer, working with HP's Zero Day
- MS14-052 Explorer Memory CVE-2014-4092 0016EECD9D7159A949DAD3BC17E0A939, working
- MS14-052 Explorer Memory CVE-2014-4092 Yuki Chen of Qihoo 360
- MS14-052 Explorer Memory CVE-2014-4093 Bo Qu of Palo Alto Networks
- MS14-052 Explorer Memory CVE-2014-4094 Bo Qu of Palo Alto Networks
- MS14-052 Explorer Memory CVE-2014-4095 Yuki Chen of Trend Micro, working with
- MS14-052 Explorer Memory CVE-2014-4096 cloudfuzzer, working with HP's Zero Day
- MS14-052 Explorer Memory CVE-2014-4096 AbdulAziz Hariri of HP's Zero Day
- MS14-052 Explorer Memory CVE-2014-4096 Yuki Chen of Trend Micro, working with
- MS14-052 Explorer Memory CVE-2014-4097 Yuki Chen of Trend Micro, working with
- MS14-052 Explorer Memory CVE-2014-4097 Bo Qu of Palo Alto Networks
- MS14-052 Explorer Memory CVE-2014-4098 An anonymous researcher, working with
- MS14-052 Explorer Memory CVE-2014-4099 SkyLined, working with HP's Zero Day
- MS14-052 Explorer Memory CVE-2014-4100 Bo Qu of Palo Alto Networks
- MS14-052 Explorer Memory CVE-2014-4101 Xin Ouyang of Palo Alto Networks
- MS14-052 Explorer Memory CVE-2014-4102 Liu Long of Qihoo 360
- MS14-052 Explorer Memory CVE-2014-4103 AbdulAziz Hariri of HP's Zero Day
- MS14-052 Explorer Memory CVE-2014-4104 Liu Long of Qihoo 360
- MS14-052 Explorer Memory CVE-2014-4105 Yuki Chen of Trend Micro, working with
- MS14-052 Explorer Memory CVE-2014-4106 Bo Qu of Palo Alto Networks
- MS14-052 Explorer Memory CVE-2014-4107 AbdulAziz Hariri of HP's Zero Day
- MS14-052 Explorer Memory CVE-2014-4108 An anonymous researcher, working with
- MS14-052 Explorer Memory CVE-2014-4109 John Villamil (@day6reak)
- MS14-052 Explorer Memory CVE-2014-4110 KnownSec Team
- MS14-052 Explorer Memory CVE-2014-4111 Yujie Wen of Qihoo 360
- MS14-051 Explorer Memory CVE-2014-2774 AbdulAziz Hariri of HP's Zero Day
- MS14-051 Explorer Memory CVE-2014-2784 Yujie Wen of Qihoo 360
- MS14-051 Explorer Memory CVE-2014-2796 Bo Qu of Palo Alto Networks
- MS14-051 Explorer Memory CVE-2014-2808 Chen Zhang (demi6od) of NSFOCUS Security
- MS14-051 Explorer Memory CVE-2014-2810 Chen Zhang (demi6od) of NSFOCUS Security
- MS14-051 Explorer Memory CVE-2014-2811 IronRock working with VeriSign iDefense
- MS14-051 Elevation of CVE-2014-2817 Security
- MS14-051 Explorer Memory CVE-2014-2818 AbdulAziz Hariri of HP's Zero Day
- MS14-051 Elevation of CVE-2014-2819 KeenTeam (@K33nTeam) working with
- MS14-051 Explorer Memory CVE-2014-2820 Arthur Gerkis working with HP's Zero Day
- MS14-051 Explorer Memory CVE-2014-2821 Bo Qu of Palo Alto Networks
- MS14-051 Explorer Memory CVE-2014-2822 Bo Qu of Palo Alto Networks
- MS14-051 Explorer Memory CVE-2014-2823 Chen Zhang (demi6od) of NSFOCUS Security
- MS14-051 Explorer Memory CVE-2014-2824 Yuki Chen of Qihoo 360
- MS14-051 Explorer Memory CVE-2014-2825 Chen Zhang (demi6od) of NSFOCUS Security
- MS14-051 Explorer Memory CVE-2014-2826 Chen Zhang (demi6od) of NSFOCUS Security
- MS14-051 Explorer Memory CVE-2014-2827 Simon Zuckerbraun of HP's Zero Day
- MS14-051 Explorer Memory CVE-2014-4050 Omair working with HP's Zero Day
- MS14-051 Explorer Memory CVE-2014-4051 Corelan working with HP's Zero Day
- MS14-051 Explorer Memory CVE-2014-4052 An anonymous researcher working with
- MS14-051 Explorer Memory CVE-2014-4052 Bo Qu of Palo Alto Networks
- MS14-051 Explorer Memory CVE-2014-4055 Simon Zuckerbraun of HP's Zero Day
- MS14-051 Explorer Memory CVE-2014-4056 Corelan working with HP's Zero Day
- MS14-051 Explorer Memory CVE-2014-4057 Yuki Chen of Trend Micro, working with
- MS14-051 Explorer Memory CVE-2014-4058 Sky working with HP's Zero Day Initiative
- MS14-051 Explorer Memory CVE-2014-4063 An anonymous researcher working with
- MS14-051 Explorer Memory CVE-2014-4067 Wei Wang of VulnHunt
- MS14-051 Explorer Memory CVE-2014-4067 lokihardt@ASRT, working with HP's Zero
- MS14-051 Explorer Memory CVE-2014-4078 Yujie Wen of Qihoo 360
- MS14-051 Explorer Memory CVE-2014-4145 Omair working with HP's Zero Day
- MS14-051 Explorer Memory CVE-2014-6354 Omair working with HP's Zero Day
- MS14-049 Installer Repair CVE-2012-1814 Denis Gundarev of Entisys
- MS14-048 Code Execution CVE-2014-2815 Security's SecuriTeam Secure Disclosure
- MS14-047 LRPC ASLR Bypass CVE-2014-0316 Alex Ionescu
- MS14-045 Double-Fetch CVE-2014-1819 Wang Yu of Qihoo 360
- MS14-045 Pool Allocation CVE-2014-4064 Ilja Van Sprundel
- MS14-043 Use After Free CVE-2014-4060 HP's Zero Day Initiative
- MS14-041 Elevation of CVE-2014-2780 VUPEN working with HP's Zero Day
- MS14-040 Elevation of CVE-2014-1767 Day Initiative
- MS14-039 Elevation of CVE-2014-2781 Initiative
- MS14-038 Remote Code CVE-2014-1824 Hamburgers.maccoy@gmail.com
- MS14-037 Explorer Memory CVE-2014-1763 VUPEN working with HP's Zero Day
- MS14-037 Explorer Memory CVE-2014-1765 Andreas Schmidt working with HP's Zero
- MS14-037 Explorer Memory CVE-2014-1765 0016EECD9D7159A949DAD3BC17E0A939 working
- MS14-037 Explorer Memory CVE-2014-1765 91fba4fa08fe776e7369ab4d96db6578 working
- MS14-037 Certificate CVE-2014-2783 Eric Lawrence
- MS14-037 Explorer Memory CVE-2014-2785 Bo Qu of Palo Alto Networks
- MS14-037 Explorer Memory CVE-2014-2785 Liu Long of Qihoo 360
- MS14-037 Explorer Memory CVE-2014-2786 Bo Qu of Palo Alto Networks
- MS14-037 Explorer Memory CVE-2014-2787 Bo Qu of Palo Alto Networks
- MS14-037 Explorer Memory CVE-2014-2788 Bo Qu of Palo Alto Networks
- MS14-037 Explorer Memory CVE-2014-2789 Bo Qu of Palo Alto Networks
- MS14-037 Explorer Memory CVE-2014-2790 Yujie Wen of Qihoo 360
- MS14-037 Explorer Memory CVE-2014-2790 Liu Long of Qihoo 360
- MS14-037 Explorer Memory CVE-2014-2791 Arthur Gerkis working with HP's Zero Day
- MS14-037 Explorer Memory CVE-2014-2792 Jasiel Spelman of HP's Zero Day
- MS14-037 Explorer Memory CVE-2014-2794 ZhaoWei of KnownSec
- MS14-037 Explorer Memory CVE-2014-2795 Hui Gao of Palo Alto Networks
- MS14-037 Explorer Memory CVE-2014-2797 Royce Lu of Palo Alto Networks
- MS14-037 Explorer Memory CVE-2014-2798 Bo Qu of Palo Alto Networks
- MS14-037 Explorer Memory CVE-2014-2800 Bo Qu of Palo Alto Networks
- MS14-037 Explorer Memory CVE-2014-2801 Bo Qu of Palo Alto Networks
- MS14-037 Explorer Memory CVE-2014-2802 Yuki Chen of Qihoo 360
- MS14-037 Explorer Memory CVE-2014-2802 Sky working with HP's Zero Day Initiative
- MS14-037 Explorer Memory CVE-2014-2802 Chen Zhang (demi6od) of NSFOCUS Security
- MS14-037 Explorer Memory CVE-2014-2803 AMol NAik working with VeriSign iDefense
- MS14-037 Explorer Memory CVE-2014-2803 Garage4Hackers working with HP's Zero Day
- MS14-037 Explorer Memory CVE-2014-2803 Yuki Chen of Qihoo 360
- MS14-037 Explorer Memory CVE-2014-2804 exp-sky of NSFOCUS Security Team
- MS14-037 Explorer Memory CVE-2014-2806 Chen Zhang (demi6od) of NSFOCUS Security
- MS14-037 Explorer Memory CVE-2014-2807 Research working with VeriSign iDefense
- MS14-037 Explorer Memory CVE-2014-2809 mailto:Aniway.Anyway@gmail.com working
- MS14-037 Explorer Memory CVE-2014-2813 Abdul Aziz Hariri of HP's Zero Day
- MS14-037 Explorer Memory CVE-2014-4066 Bo Qu of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-0282 Simon Zuckerbraun, working with HP's Zero
- MS14-035 Explorer Memory CVE-2014-0282 Renguang Yuan of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-1762 Jasiel Spelman of HP's Zero Day
- MS14-035 Elevation of CVE-2014-1764 Initiative
- MS14-035 Explorer Memory CVE-2014-1766 Bo Qu of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-1766 Andreas Schmidt, working with HP's Zero
- MS14-035 Explorer Memory CVE-2014-1766 IronRock, working with VeriSign iDefense
- MS14-035 Explorer Memory CVE-2014-1766 An anonymous researcher, working with
- MS14-035 Explorer Memory CVE-2014-1769 Atte Kettunen of OUSPG
- MS14-035 Explorer Memory CVE-2014-1769 Liu Long of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-1769 Yujie Wen of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-1769 AbdulAziz Hariri of HP's Zero Day
- MS14-035 Explorer Memory CVE-2014-1769 Chen Zhang (demi6od) of NSFOCUS Security
- MS14-035 Explorer Memory CVE-2014-1769 Yuki Chen of Trend Micro, working with
- MS14-035 Explorer Memory CVE-2014-1770 Corelan, working with HP's Zero Day
- MS14-035 Certificate CVE-2014-1771 Recherche en Informatique et en
- MS14-035 Explorer Memory CVE-2014-1772 Omair, working with VeriSign iDefense
- MS14-035 Explorer Memory CVE-2014-1772 Liu Long of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-1772 Jack Tang of Trend Micro
- MS14-035 Explorer Memory CVE-2014-1772 Venustech Active-Defense Laboratory
- MS14-035 Explorer Memory CVE-2014-1773 John Villamil and Sean Larsson
- MS14-035 Explorer Memory CVE-2014-1773 Chen Zhang (demi6od) of NSFOCUS Security
- MS14-035 Explorer Memory CVE-2014-1774 AMol NAik, working with HP's Zero Day
- MS14-035 Explorer Memory CVE-2014-1775 Stephen Fewer of Harmony Security,
- MS14-035 Explorer Memory CVE-2014-1775 Hui Gao of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-1775 Vulnerability Research Team, TELUS
- MS14-035 Information CVE-2014-1777 Security
- MS14-035 Elevation of CVE-2014-1778 Security
- MS14-035 Explorer Memory CVE-2014-1779 An anonymous researcher, working with
- MS14-035 Explorer Memory CVE-2014-1780 Soroush Dalili, working with HP's Zero
- MS14-035 Explorer Memory CVE-2014-1781 NSFOCUS Security Team
- MS14-035 Explorer Memory CVE-2014-1782 lokihardt@ASRT, working with HP's Zero
- MS14-035 Explorer Memory CVE-2014-1782 Liu Long of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-1782 Zhibin Hu of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-1782 Yuki Chen of Trend Micro
- MS14-035 Explorer Memory CVE-2014-1782 ZhaoWei of knownsec
- MS14-035 Explorer Memory CVE-2014-1782 35c27308b34d55904da10770e5303503, working
- MS14-035 Explorer Memory CVE-2014-1782 IronRock, working with VeriSign iDefense
- MS14-035 Explorer Memory CVE-2014-1782 Sabre, working with VeriSign iDefense
- MS14-035 Explorer Memory CVE-2014-1783 Yujie Wen of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-1784 Yujie Wen of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-1784 Bo Qu of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-1784 Zhibin Hu of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-1784 Chen Zhang (demi6od) of NSFOCUS Security
- MS14-035 Explorer Memory CVE-2014-1785 SkyLined, working with HP's Zero Day
- MS14-035 Explorer Memory CVE-2014-1785 Yujie Wen of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-1785 Bo Qu of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-1786 Yujie Wen of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-1788 Yujie Wen of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-1789 Yujie Wen of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-1789 Bo Qu of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-1790 Yujie Wen of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-1791 Bo Qu of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-1792 Corelan, working with VeriSign iDefense
- MS14-035 Explorer Memory CVE-2014-1792 Bo Qu of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-1794 Yujie Wen of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-1795 Xiaobo Chen of FireEye
- MS14-035 Explorer Memory CVE-2014-1796 Hui Gao of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-1797 Gareth Heyes, working with HP's Zero Day
- MS14-035 Explorer Memory CVE-2014-1799 Zhibin Hu of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-1799 Bo Qu of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-1799 0016EECD9D7159A949DAD3BC17E0A939, working
- MS14-035 Explorer Memory CVE-2014-1799 Sweetchip, working with HP's Zero Day
- MS14-035 Explorer Memory CVE-2014-1799 Sabre, working with VeriSign iDefense
- MS14-035 Explorer Memory CVE-2014-1799 Edward Torkington of NCC Group
- MS14-035 Explorer Memory CVE-2014-1799 4f7df027b11a6a44d72b1fa4da62bae7, working
- MS14-035 Explorer Memory CVE-2014-1799 Sky, working with HP's Zero Day
- MS14-035 Explorer Memory CVE-2014-1799 An anonymous researcher, working with
- MS14-035 Explorer Memory CVE-2014-1800 SkyLined, working with HP's Zero Day
- MS14-035 Explorer Memory CVE-2014-1802 Bo Qu of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-1803 Bo Qu of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-1803 Aniway.Anyway@gmail.com, working with
- MS14-035 Explorer Memory CVE-2014-1804 Royce Lu of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-1804 Yuki Chen of Trend Micro
- MS14-035 Explorer Memory CVE-2014-1805 lokihardt@ASRT, working with HP's Zero
- MS14-035 Explorer Memory CVE-2014-2753 Liu Long of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-2754 Liu Long of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-2755 Xin Ouyang of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-2755 Zhibin Hu of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-2756 Bo Qu of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-2756 0016EECD9D7159A949DAD3BC17E0A939, working
- MS14-035 Explorer Memory CVE-2014-2757 Simon Zuckerbraun, working with HP's Zero
- MS14-035 Explorer Memory CVE-2014-2758 An anonymous researcher, working with
- MS14-035 Explorer Memory CVE-2014-2759 Bo Qu of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-2759 Sabre of VeriSign iDefense Labs
- MS14-035 Explorer Memory CVE-2014-2760 Zhibin Hu of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-2761 Yujie Wen of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-2761 0016EECD9D7159A949DAD3BC17E0A939, working
- MS14-035 Explorer Memory CVE-2014-2763 Yujie Wen of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-2764 Yujie Wen of Qihoo 360
- MS14-035 Explorer Memory CVE-2014-2764 Chen Zhang (demi6od) of NSFOCUS Security
- MS14-035 Explorer Memory CVE-2014-2764 An anonymous researcher, working with
- MS14-035 Explorer Memory CVE-2014-2765 Bo Qu of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-2766 Bo Qu of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-2767 Bo Qu of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-2768 Bo Qu of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-2768 Yuki Chen of Trend Micro
- MS14-035 Explorer Memory CVE-2014-2769 Bo Qu of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-2769 Venustech Active-Defense Laboratory
- MS14-035 Explorer Memory CVE-2014-2770 Xin Ouyang of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-2771 Royce Lu of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-2772 Stephen Fewer of Harmony Security,
- MS14-035 Explorer Memory CVE-2014-2773 Keen Team
- MS14-035 Explorer Memory CVE-2014-2773 Bo Qu of Palo Alto Networks
- MS14-035 Explorer Memory CVE-2014-2775 Jasiel Spelman of HP's Zero Day
- MS14-035 Explorer Memory CVE-2014-2776 Jasiel Spelman of HP's Zero Day
- MS14-035 Elevation of CVE-2014-2777 Initiative
- MS14-035 Explorer Memory CVE-2014-2782 An anonymous researcher, working with
- MS14-035 Defense-in-depth CVE-2014-1816 Noriaki Iwasaki of Cyber Defense
- MS14-034 Embedded Font CVE-2014-2778 s3tm3m, working with VeriSign iDefense
- MS14-033 MSXML Entity URI CVE-2014-1816 Christian Kulenkampff
- MS14-030 RDP MAC CVE-2014-0296 Andrew Swoboda and Tyler Reguly of
- MS14-029 Explorer Memory CVE-2014-0310 Fermin J. Serna of the Google Security
- MS14-029 Explorer Memory CVE-2014-0310 An anonymous researcher, working with
- MS14-029 Explorer Memory CVE-2014-1815 Clément Lecigne of the Google Security
- MS14-029 Explorer Memory CVE-2014-1815 Zhibin Hu of Qihoo
- MS14-028 Remote Denial of CVE-2014-0255 Security's SecuriTeam Secure Disclosure
- MS14-028 Remote Denial of CVE-2014-0256 Security's SecuriTeam Secure Disclosure
- MS14-026 TypeFilterLevel CVE-2014-1806 James Forshaw of Context Information
- MS14-023 Chinese Grammar CVE-2014-1756 NSFOCUS Security Team
- MS14-023 Token Reuse CVE-2014-1808 Arnaud Maillet from ANSSI
- MS14-022 Explorer Memory CVE-2014-1776 FireEye, Inc.
- MS14-020 Pointer CVE-2014-1759 An anonymous researcher working with
- MS14-019 Handling CVE-2014-0315 Stefan Kanthak
- MS14-018 Explorer Memory CVE-2014-0325 An anonymous researcher working with
- MS14-018 Explorer Memory CVE-2014-1751 Dr. Bo Qu of Palo Alto Networks
- MS14-018 Explorer Memory CVE-2014-1752 Dr. Bo Qu of Palo Alto Networks
- MS14-018 Explorer Memory CVE-2014-1753 Yuki Chen of Trend Micro, working with
- MS14-018 Explorer Memory CVE-2014-1755 096dc2a463051c0ac4b7caaf233f7eff and AMol
- MS14-018 Explorer Memory CVE-2014-1760 Abdul-Aziz Hariri of HP's Zero Day
- MS14-017 File Format CVE-2014-1757 Will Dormann of the CERT/CC
- MS14-017 Stack Overflow CVE-2014-1758 Yuhong Bao
- MS14-017 Corruption CVE-2014-1761 Pellegrino of the Google Security Team
- MS14-016 Feature Bypass CVE-2014-0317 Catalyst IT
- MS14-016 Feature Bypass CVE-2014-0317 Muhammad Faisal Naqvi of Pakistan
- MS14-015 Information CVE-2014-0323 Alexander Chizhov
- MS14-014 DEP/ASLR Bypass CVE-2014-0319 NSFOCUS Information Technology Co., Ltd.
- MS14-013 Memory CVE-2014-0301 An anonymous researcher working with
- MS14-012 Explorer Memory CVE-2014-0297 lokihardt@ASRT, working with HP's Zero
- MS14-012 Explorer Memory CVE-2014-0297 Amol Naik working with VeriSign iDefense
- MS14-012 Explorer Memory CVE-2014-0297 Edward Torkington from NCC Group
- MS14-012 Explorer Memory CVE-2014-0297 Hui Gao of Palo Alto Networks
- MS14-012 Explorer Memory CVE-2014-0298 lokihardt@ASRT, working with HP's Zero
- MS14-012 Explorer Memory CVE-2014-0299 Research working with HP's Zero Day
- MS14-012 Explorer Memory CVE-2014-0302 Bo Qu of Palo Alto Networks
- MS14-012 Explorer Memory CVE-2014-0303 Bo Qu of Palo Alto Networks
- MS14-012 Explorer Memory CVE-2014-0304 Hui Gao of Palo Alto Networks
- MS14-012 Explorer Memory CVE-2014-0304 Zhibin Hu of Qihoo
- MS14-012 Explorer Memory CVE-2014-0305 Tianfang Guo of Palo Alto Networks
- MS14-012 Explorer Memory CVE-2014-0306 Jason Kratzer working with VeriSign
- MS14-012 Explorer Memory CVE-2014-0307 Jason Kratzer working with HP's Zero Day
- MS14-012 Explorer Memory CVE-2014-0308 lokihardt@ASRT, working with HP's Zero
- MS14-012 Explorer Memory CVE-2014-0308 Bo Qu of Palo Alto Networks
- MS14-012 Explorer Memory CVE-2014-0308 Jason Kratzer working with HP's Zero Day
- MS14-012 Explorer Memory CVE-2014-0309 Amol Naik working with VeriSign iDefense
- MS14-012 Explorer Memory CVE-2014-0309 Renguang Yuan of Qihoo 360
- MS14-012 Explorer Memory CVE-2014-0311 Scott Bell of Security-Assessment.com
- MS14-012 Explorer Memory CVE-2014-0311 Yujie Wen of Qihoo
- MS14-012 Explorer Memory CVE-2014-0312 Simon Zuckerbraun working with HP's Zero
- MS14-012 Explorer Memory CVE-2014-0313 Omair working with HP's Zero Day
- MS14-012 Explorer Memory CVE-2014-0314 Bo Qu of Palo Alto Networks
- MS14-012 Explorer Memory CVE-2014-0314 Zhibin Hu of Qihoo
- MS14-012 Explorer Memory CVE-2014-0314 Liu Long of Qihoo
- MS14-012 Explorer Memory CVE-2014-0314 Anil Aphale
- MS14-012 Explorer Memory CVE-2014-0321 Bo Qu of Palo Alto Networks
- MS14-012 Explorer Memory CVE-2014-0321 Yujie Wen of Qihoo
- MS14-012 Explorer Memory CVE-2014-0321 Zhibin Hu of Qihoo
- MS14-012 Explorer Memory CVE-2014-0321 Liu Long of Qihoo
- MS14-012 Explorer Memory CVE-2014-0321 Abdul-Aziz Hariri of HP's Zero Day
- MS14-012 Explorer Memory CVE-2014-0321 Yuki Chen of Trend Micro
- MS14-012 Explorer Memory CVE-2014-0322 FireEye, Inc.
- MS14-012 Explorer Memory CVE-2014-0322 Liu Long of Qihoo
- MS14-012 Explorer Memory CVE-2014-4112 Research working with HP's Zero Day
- MS14-010 Explorer Memory CVE-2014-0267 Liang Chen of KeenTeam (@K33nTeam)
- MS14-010 Explorer Memory CVE-2014-0267 Code Audit Labs of
- MS14-010 Elevation of CVE-2014-0268 Security
- MS14-010 Explorer Memory CVE-2014-0269 Simon Zuckerbraun working with HP's Zero
- MS14-010 Explorer Memory CVE-2014-0270 Research working with HP's Zero Day
- MS14-010 Explorer Memory CVE-2014-0270 Research working with
- MS14-010 Explorer Memory CVE-2014-0272 Bo Qu of Palo Alto Networks
- MS14-010 Explorer Memory CVE-2014-0273 Bo Qu of Palo Alto Networks
- MS14-010 Explorer Memory CVE-2014-0274 Arthur Gerkis working with HP's Zero Day
- MS14-010 Explorer Memory CVE-2014-0274 lokihardt@ASRT working with HP's Zero Day
- MS14-010 Explorer Memory CVE-2014-0275 Simon Zuckerbraun working with HP's Zero
- MS14-010 Explorer Memory CVE-2014-0276 Scott Bell of Security-Assessment.com
- MS14-010 Explorer Memory CVE-2014-0277 Scott Bell of Security-Assessment.com
- MS14-010 Explorer Memory CVE-2014-0278 Bo Qu of Palo Alto Networks
- MS14-010 Explorer Memory CVE-2014-0278 An anonymous researcher working with
- MS14-010 Explorer Memory CVE-2014-0279 Scott Bell of Security-Assessment.com
- MS14-010 Explorer Memory CVE-2014-0279 Bo Qu of Palo Alto Networks
- MS14-010 Explorer Memory CVE-2014-0280 Scott Bell of Security-Assessment.com
- MS14-010 Explorer Memory CVE-2014-0281 cons0ul and suto working with HP's Zero
- MS14-010 Explorer Memory CVE-2014-0283 Sachin Shinde
- MS14-010 Explorer Memory CVE-2014-0284 Sachin Shinde
- MS14-010 Explorer Memory CVE-2014-0285 Simon Zuckerbraun working with HP's Zero
- MS14-010 Explorer Memory CVE-2014-0285 An anonymous researcher working with
- MS14-010 Explorer Memory CVE-2014-0286 Simon Zuckerbraun working with HP's Zero
- MS14-010 Explorer Memory CVE-2014-0287 Corelan working with HP's Zero Day
- MS14-010 Explorer Memory CVE-2014-0288 Arthur Gerkis working with HP's Zero Day
- MS14-010 Explorer Memory CVE-2014-0289 lokihardt@ASRT working with HP's Zero Day
- MS14-010 Explorer Memory CVE-2014-0290 Bo Qu of Palo Alto Networks
- MS14-010 Explorer Memory CVE-2014-0290 Zhibin Hu of http://www.360.cn/Qihoo
- MS14-010 Explorer Memory CVE-2014-0290 Yuki Chen of Trend Micro, working with
- MS14-010 Cross-domain CVE-2014-0293 dievas dewa ilu Diyin Ayóo Átʼéii atua
- MS14-009 Type Traversal CVE-2014-0257 James Forshaw of Context Information
- MS14-007 Component Memory CVE-2014-0263 Initiative
- MS14-005 Information CVE-2014-0266 FireEye, Inc.
- MS14-004 Query Filter DoS CVE-2014-0261 Andrey Maykov, Lead Developer in FTO
- MS14-003 Handle CVE-2014-0262 xiaohong shi of Qihoo
- MS14-002 Kernel NDProxy CVE-2013-5065 FireEye, Inc.
- MS14-001 Corruption CVE-2014-0258 Hawkes of the Google Security Team
- MS14-001 Corruption CVE-2014-0259 Hawkes of the Google Security Team
- MS14-001 Corruption CVE-2014-0260 Hawkes of the Google Security Team
Add Comment
Please, Sign In to add comment