Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2015-0096Untrusted Search Path in Microsoft Windows Server 2008

Severity
9.3CRITICALNVD
EPSS
87.1%
top 0.56%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMar 11
Latest updateJan 19

Description

Untrusted search path vulnerability in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, leading to DLL loading during Windows Explorer access to the icon of a crafted shortcut, aka "DLL Planting Remote Code Execution Vulnerability."

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0

Affected Packages1 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-hq49-4fx9-hw5v: Untrusted search path vulnerability in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Window2022-05-14
VulnCheck
Microsoft Windows Untrusted Search Path2015

💥Exploits & PoCs

7
Exploit-DB
Microsoft Windows - '.LNK' Shortcut File Code Execution2017-08-06
Exploit-DB
Microsoft Windows - '.LNK' Shortcut File Code Execution (Metasploit)2017-07-26
Exploit-DB
Microsoft Windows - Automatic .LNK Shortcut File Code Execution2010-07-18
Metasploit
Microsoft Windows Shell LNK Code Execution
Metasploit
LNK Code Execution Vulnerability

🕵️Threat Intelligence

5
Talos
Following the LNK metadata trail2023-01-19
Talos
Microsoft Patch Tuesday for March 2015: 14 Bulletins Released; FREAK Patched2015-03-10
Talos
Microsoft Patch Tuesday for March 2015: 14 Bulletins Released; FREAK Patched2015-03-10
Qualys
Patch Tuesday March 2015 | Qualys2015-03-10
Qualys
Patch Tuesday March 2015 | Qualys2015-03-10