{"uuid": "6c35ee62-17f9-4cfe-8f45-7a539363885b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2011-1236", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2429", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2011-1236\n\ud83d\udd39 Description: Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other \"Vulnerability Type 1\" CVEs listed in MS11-034, aka \"Win32k Use After Free Vulnerability.\"\n\ud83d\udccf Published: 2011-04-13T20:07:00\n\ud83d\udccf Modified: 2025-01-21T17:54:13.550Z\n\ud83d\udd17 References:\n1. http://www.us-cert.gov/cas/techalerts/TA11-102A.html\n2. https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12478\n3. http://www.securityfocus.com/bid/47213\n4. https://exchange.xforce.ibmcloud.com/vulnerabilities/66418\n5. http://osvdb.org/71751\n6. https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034\n7. http://www.vupen.com/english/advisories/2011/0952\n8. http://support.avaya.com/css/P8/documents/100133352\n9. http://secunia.com/advisories/44156\n10. http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx\n11. http://www.securitytracker.com/id?1025345", "creation_timestamp": "2025-01-21T18:00:39.000000Z"}