6.9
CVSSv2

CVE-2015-2546

Published: 09/09/2015 Updated: 14/05/2019
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2511, CVE-2015-2517, and CVE-2015-2518.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2012 r2

microsoft windows 8.1 -

microsoft windows 8 -

microsoft windows server 2008 r2

microsoft windows rt -

microsoft windows server 2012 -

microsoft windows server 2008 -

microsoft windows 10 -

microsoft windows rt 8.1 -

microsoft windows 7 -

microsoft windows vista -

Github Repositories

CVE-2015-2546-Exploit My paper about CVE-2015-2546: bobao360cn/learning/detail/3184html My blog:whereisk0shltop

Recent Articles

A Modern Hypervisor as a Basis for a Sandbox
Securelist • Vyacheslav Rusakov Vladislav Pintiysky • 19 Sep 2017

In the field of information security, sandboxes are used to isolate an insecure external environment from a secure internal environment (or vice versa), to protect against the exploitation of vulnerabilities, and to analyze malicious code. At Kaspersky Lab, we have several sandboxes, including an Android sandbox. In this article, we will look at just one of them that was customized to serve the needs of a specific product and became the basis of Kaspersky Anti Targeted Attack Platform. This part...