cvelist/2015/1xxx/CVE-2015-1701.json
2020-05-14 21:01:25 +00:00

97 lines
3.3 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2015-1701",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka \"Win32k Elevation of Privilege Vulnerability.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://twitter.com/symantec/statuses/590208710527549440",
"refsource": "MISC",
"url": "http://twitter.com/symantec/statuses/590208710527549440"
},
{
"name": "37049",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/37049/"
},
{
"name": "74245",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/74245"
},
{
"name": "MS15-051",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-051"
},
{
"name": "37367",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/37367/"
},
{
"name": "https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html",
"refsource": "MISC",
"url": "https://www.fireeye.com/blog/threat-research/2015/04/probable_apt28_useo.html"
},
{
"name": "1032155",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1032155"
},
{
"refsource": "FULLDISC",
"name": "20200514 KL-001-2020-002 : Cellebrite Restricted Desktop Escape and Escalation of User Privilege",
"url": "http://seclists.org/fulldisclosure/2020/May/34"
}
]
}
}