Unrated severityNVD Advisory· Published Nov 11, 2015· Updated May 6, 2026
CVE-2015-6109
CVE-2015-6109
Description
The kernel in Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to bypass the KASLR protection mechanism, and consequently discover a driver base address, via a crafted application, aka "Windows Kernel Memory Information Disclosure Vulnerability."
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-115nvdPatchVendor Advisory
- www.securitytracker.com/id/1034114nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.