{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T11:46:49.467","vulnerabilities":[{"cve":{"id":"CVE-2012-2527","sourceIdentifier":"secure@microsoft.com","published":"2012-08-15T01:55:01.773","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application, aka \"Win32k Use After Free Vulnerability.\""},{"lang":"es","value":"Vulnerabilidad de uso después de la liberación en win32k.sys en el driver kernel-mode en Microsoft Windows XP SP2 y SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, y R2 SP1, y Windows 7 Gold y SP1 permite a usuarios locales obtener privilegios a través de una aplicación manipulada, también conocida como \"Win32k Use After Free Vulnerability.\""}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-399"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_7:*:*:x64:*:*:*:*:*","matchCriteriaId":"CE381783-027E-4B6D-B801-59873E5EA483"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_7:*:*:x86:*:*:*:*:*","matchCriteriaId":"A2C3594F-7C2C-4E2D-9BC5-F4F89B7BF4D5"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*","matchCriteriaId":"4FA15D65-7C32-4C7A-9915-746AB3F454EE"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*","matchCriteriaId":"976EFC05-9B37-4661-AD34-4FFDB5AB48E0"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*","matchCriteriaId":"4D3B5E4F-56A6-4696-BBB4-19DF3613D020"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*","matchCriteriaId":"B2B19826-5516-4899-9599-F95D0A03FBCD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*","matchCriteriaId":"4945F25F-2828-4D03-930B-A109BA73E00C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*","matchCriteriaId":"7C684420-1614-4DAE-9BD9-F1FE9102A50F"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*","matchCriteriaId":"FFF81F4B-7D92-4398-8658-84530FB8F518"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*","matchCriteriaId":"32C28EC2-8A34-4E30-A76A-86921D7332C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*","matchCriteriaId":"0A0D2704-C058-420B-B368-372D1129E914"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*","matchCriteriaId":"CE477A73-4EE4-41E9-8694-5A3D5DC88656"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*","matchCriteriaId":"FFAC3F90-77BF-4F56-A89B-8A3D2D1FC6D6"}]}]}],"references":[{"url":"http://www.us-cert.gov/cas/techalerts/TA12-227A.html","source":"secure@microsoft.com","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-055","source":"secure@microsoft.com"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15706","source":"secure@microsoft.com"},{"url":"http://www.us-cert.gov/cas/techalerts/TA12-227A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-055","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15706","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}