CVE-2015-2546-Exploit My paper about CVE-2015-2546: bobao360cn/learning/detail/3184html My blog:whereisk0shltop
The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2511, CVE-2015-2517, and CVE-2015-2518.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft windows server 2012 r2 |
||
microsoft windows 8.1 - |
||
microsoft windows 8 - |
||
microsoft windows server 2008 r2 |
||
microsoft windows rt - |
||
microsoft windows server 2012 - |
||
microsoft windows server 2008 - |
||
microsoft windows 10 - |
||
microsoft windows rt 8.1 - |
||
microsoft windows 7 - |
||
microsoft windows vista - |
In the field of information security, sandboxes are used to isolate an insecure external environment from a secure internal environment (or vice versa), to protect against the exploitation of vulnerabilities, and to analyze malicious code. At Kaspersky Lab, we have several sandboxes, including an Android sandbox. In this article, we will look at just one of them that was customized to serve the needs of a specific product and became the basis of Kaspersky Anti Targeted Attack Platform. This part...