Skip to content

Latest commit

 

History

History
44 lines (33 loc) · 1.9 KB

README_EN.md

File metadata and controls

44 lines (33 loc) · 1.9 KB

CVE-2021-34527

Describe

Windows Print Spooler Remote Code Execution Vulnerability

ImpactVersion

Product CPU Architecture Version Update Tested
Windows 7 x86/x64 SP1
Windows Rt
Windows 8.1 x86/x64
Windows 10 x86/x64
Windows 10 x86/x64 1607
Windows 10 x86/x64/arm64 1809
Windows 10 x86/x64/arm64 1909
Windows 10 x86/x64/arm64 2004
Windows 10 x86/x64/arm64 20H2
Windows 10 x86/x64/arm64 21H1
Windows Server 2008 x86/x64 R2 SP1
Windows Server 2008 x86/x64 SP2
Windows Server 2012 R2
Windows Server 2012
Windows Server 2016
Windows Server 2019
Windows Server 2004
Windows Server 20H2

Patch

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34527

Utilization

The vulnerability does not test, the root directory is stored in the network collection [CVE number] .zip EXP or POC, code status unknown

ProjectSource