{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T10:46:32.048","vulnerabilities":[{"cve":{"id":"CVE-2012-2530","sourceIdentifier":"secure@microsoft.com","published":"2012-11-14T00:55:01.497","lastModified":"2026-04-29T01:13:23.040","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application, aka \"Win32k Use After Free Vulnerability.\""},{"lang":"es","value":"Una vulnerabilidad de uso después de liberación en win32k.sys en los controladores en modo kernel de Microsoft Windows XP SP2 y SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2 y R2 SP1 y Windows 7 SP1 y Gold permite a los usuarios locales conseguir privilegios a través de una aplicación hecha a mano. Se trata de un problema también conocido como \"Vulnerabilidad de uso después de liberación de Win32k\".\r\n"}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-399"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*","matchCriteriaId":"E33796DB-4523-4F04-B564-ADF030553D51"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_7:-:sp1:x64:*:*:*:*:*","matchCriteriaId":"F282E5E8-A5C9-4092-B0BF-07A5A2CAA6F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_7:-:sp1:x86:*:*:*:*:*","matchCriteriaId":"D16A8D29-57BF-4B74-85F2-24DBD8B52BBF"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*","matchCriteriaId":"4D3B5E4F-56A6-4696-BBB4-19DF3613D020"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*","matchCriteriaId":"B2B19826-5516-4899-9599-F95D0A03FBCD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*","matchCriteriaId":"4945F25F-2828-4D03-930B-A109BA73E00C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*","matchCriteriaId":"7C684420-1614-4DAE-9BD9-F1FE9102A50F"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*","matchCriteriaId":"FFF81F4B-7D92-4398-8658-84530FB8F518"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*","matchCriteriaId":"32C28EC2-8A34-4E30-A76A-86921D7332C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*","matchCriteriaId":"0A0D2704-C058-420B-B368-372D1129E914"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*","matchCriteriaId":"BF1AD1A1-EE20-4BCE-9EE6-84B27139811C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*","matchCriteriaId":"CE477A73-4EE4-41E9-8694-5A3D5DC88656"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*","matchCriteriaId":"FFAC3F90-77BF-4F56-A89B-8A3D2D1FC6D6"}]}]}],"references":[{"url":"http://secunia.com/advisories/51239","source":"secure@microsoft.com"},{"url":"http://www.securitytracker.com/id?1027750","source":"secure@microsoft.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA12-318A.html","source":"secure@microsoft.com","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-075","source":"secure@microsoft.com"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15936","source":"secure@microsoft.com"},{"url":"http://secunia.com/advisories/51239","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id?1027750","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.us-cert.gov/cas/techalerts/TA12-318A.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-075","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15936","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}