<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>CVE-2015-2546 UAF Analysis and Exploit</title>
        <link>https://xiaodaozhi.com/exploit/132.html</link>
        <description>This article will analyze a UAF vulnerability in win32k Window Manager (User) Subsystem in Windows: CVE-2015-2546. Similar to CVE-2017-0263 analyzed in the previous article, this vulnerability is use-after-free of popup menu tagPOPUPMENU object as well. The analyzing environment is Windows 7 x86 SP1...</description>
        <lastBuildDate>Thu, 17 Jun 2021 04:00:00 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>zh-CN</language>
        <image>
            <title>CVE-2015-2546 UAF Analysis and Exploit</title>
            <url>https://xiaodaozhi.com/uploads/2018/04/18/1773801357845.png</url>
            <link>https://xiaodaozhi.com/exploit/132.html</link>
        </image>
        <copyright>All rights reserved 2026</copyright>
        <atom:link href="https://xiaodaozhi.com/feed/exploit/132.html" rel="self" type="application/rss+xml"/>
    </channel>
</rss>