{"uuid": "7892d1bc-c48b-44ae-b5a9-50b812bd5506", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2011-0676", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2431", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2011-0676\n\ud83d\udd39 Description: win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other \"Vulnerability Type 2\" CVEs listed in MS11-034, aka \"Win32k Null Pointer De-reference Vulnerability.\"\n\ud83d\udccf Published: 2011-04-13T20:07:00\n\ud83d\udccf Modified: 2025-01-21T17:49:54.203Z\n\ud83d\udd17 References:\n1. http://www.us-cert.gov/cas/techalerts/TA11-102A.html\n2. https://exchange.xforce.ibmcloud.com/vulnerabilities/66405\n3. https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-034\n4. http://www.vupen.com/english/advisories/2011/0952\n5. http://support.avaya.com/css/P8/documents/100133352\n6. https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12416\n7. https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12474\n8. http://secunia.com/advisories/44156\n9. http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx\n10. http://www.securitytracker.com/id?1025345\n11. http://www.securityfocus.com/bid/47220", "creation_timestamp": "2025-01-21T18:00:41.000000Z"}