{"vulnerability": "cve-2013-1265", "sightings": [{"uuid": "95cf1ec9-488a-40cf-83a1-91682ab882d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2013-1265", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2034", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2013-1265\n\ud83d\udd39 Description: Race condition in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges, and consequently read the contents of arbitrary kernel memory locations, via a crafted application, a different vulnerability than other CVEs listed in MS13-016.\n\ud83d\udccf Published: 2013-02-13T11:00:00\n\ud83d\udccf Modified: 2025-01-16T20:46:21.247Z\n\ud83d\udd17 References:\n1. https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16510\n2. https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-016\n3. http://www.us-cert.gov/cas/techalerts/TA13-043B.html", "creation_timestamp": "2025-01-16T20:55:49.000000Z"}]}