Skip to content

The kernel-mode driver in Microsoft Windows Vista SP2,...

Moderate severity Unreviewed Published May 14, 2022 to the GitHub Advisory Database • Updated Feb 10, 2025

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2511, CVE-2015-2517, and CVE-2015-2518.

References

Published by the National Vulnerability Database Sep 9, 2015
Published to the GitHub Advisory Database May 14, 2022
Last updated Feb 10, 2025

Severity

Moderate

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(78th percentile)

Weaknesses

CVE ID

CVE-2015-2546

GHSA ID

GHSA-5c8h-c2cj-96mm

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.