Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2015-0059Microsoft Windows Server 2008 vulnerability

CWE-2647 documents6 sources
Severity
6.9MEDIUMNVD
EPSS
36.4%
top 2.88%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedFeb 11
Latest updateMay 14

Description

win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted TrueType font, aka "TrueType Font Parsing Remote Code Execution Vulnerability."

CVSS vector

AV:L/AC:M/C:C/I:C/A:CExploitability: 3.4 | Impact: 10.0

Affected Packages1 packages

Patches

🔴Vulnerability Details

1
GHSA
GHSA-j6m2-v48w-mv39: win32k2022-05-14

💥Exploits & PoCs

1
Exploit-DB
Microsoft Windows - Local Privilege Escalation (MS15-010)2015-05-25

🕵️Threat Intelligence

3
Talos
Microsoft Patch Tuesday for February 2015: 56 vulnerabilities fixed2015-02-10
Talos
Microsoft Patch Tuesday for February 2015: 56 vulnerabilities fixed2015-02-10
Zscaler
Zscaler detects IE & MS Office Vulnerabilities | 02-10-2015

💬Community

1
HackerOne
Bad Write in TTF font parsing (win32k.sys)2015-03-01