Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka “Win32k Elevation of Privilege Vulnerability.”
seclists.org/fulldisclosure/2020/May/34
twitter.com/symantec/statuses/590208710527549440
www.securityfocus.com/bid/74245
www.securitytracker.com/id/1032155
docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-051
www.exploit-db.com/exploits/37049/
www.exploit-db.com/exploits/37367/
www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html