Unrated severityNVD Advisory· Published Nov 11, 2015· Updated May 6, 2026
CVE-2015-6102
CVE-2015-6102
Description
The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 allows local users to bypass the KASLR protection mechanism, and consequently discover a driver base address, via a crafted application, aka "Windows Kernel Memory Information Disclosure Vulnerability."
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-115nvdPatchVendor Advisory
- packetstormsecurity.com/files/134519/Microsoft-Windows-Cursor-Object-Potential-Memory-Leak.htmlnvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1034114nvdThird Party AdvisoryVDB Entry
- www.exploit-db.com/exploits/38794/nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.