Lucene search

K
attackerkbAttackerKBAKB:4D68F6C9-C824-4E40-8B94-3BEB1311F432
HistoryApr 21, 2015 - 12:00 a.m.

CVE-2015-1701

2015-04-2100:00:00
attackerkb.com
73

EPSS

0.372

Percentile

97.2%

Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka “Win32k Elevation of Privilege Vulnerability.”

Recent assessments:

gwillcox-r7 at November 23, 2020 6:03pm UTC reported:

Reported as exploited in the wild as part of Google’s 2020 0day vulnerability spreadsheet they made available at <https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=1869060786&gt;. Original tweet announcing this spreadsheet with the 2020 findings can be found at <https://twitter.com/maddiestone/status/1329837665378725888&gt;

Assessed Attacker Value: 0
Assessed Attacker Value: 0Assessed Attacker Value: 0