TL;DR - CVE Markdown Charts - Your InfoSec reports will now write themselves...
For the concise summary, stick with this README.
For detailed background, check out the blog post: https://clearbluejar.github.io/posts/introducing-cve-markdown-charts-part-1/
- [v0.1.0]
- Initial POC and announcement
- [v0.2.0]
- Update CVE data source (switch from mitre to nist)
- Added pie charts
- added chromereleasedata
- workflow change
- keyword
- build cve list
- enrich cve
- process into chart
- MSRC cvrf specific charts
- Google Chrome CVE specific charts
- Support for multiple keywords
- New cve list generation
- cvrf-id (2022-Apr)
- Microsoft Build Id
- KB Article Number
- direct list of CVEs
- researcher
- recursive keyword query for large matches
- supports several thousand CVEs for a generic keyword match
- async requests for faster retireval with built-in api required delays
Writing too many infosec reports and manually creating charts and graphs
Automate it all with a script.
flowchart LR;
a[(Mitre CVEs)] <--> script;
c[(Microsoft CVRFs)] <--> script;
c1[(Other CVE Sources?)] <--> script;
e[CVE search term] --> script;
script --> f[amazing CVE markdown chart]
subgraph script
d[magic logic]
end
python3 -m venv .env
source .env/bin/activate
pip install -r requirements.txt
% python cve_markdown_charts.py -h
usage: cve_markdown_charts.py [-h] [--keyword KEYWORD [KEYWORD ...]] [--title TITLE [TITLE ...]] [--researcher | --cvelist | --kb | --winbuild | --cvrfid | --cvrftag | --chromeid] [--start START [START ...]] [--end END [END ...]] keyword [keyword ...]
Generate CVE Markdown Charts
positional arguments:
keyword The CVE keyword to chart (default)
optional arguments:
-h, --help show this help message and exit
--keyword KEYWORD [KEYWORD ...]
Additional CVE keywords to chart
--title TITLE [TITLE ...]
Set default chart title
--researcher Keyword= The researcher CVEs to chart (aka Researcher Vanity Charts)
--cvelist Keyword= List of CVEs to chart. Space separated. ex: "CVE-2022-1234 CVE-2022-1235"
--kb Keyword= The KB Article to chart (Windows)
--winbuild Keyword= The Windows Build Number to chart (Windows)
--cvrfid Keyword= The MSRC Security Update to chart. "Apr-2022" (Windows)
--cvrftag Keyword= Specific MSRC CVRF "tag" to chart. "Remote Procedure Call" or "Windows SMB"
--chromeid Keyword= Specific Google Release Blog Year-Month to chart. "2022-05" or "2021-01"
CVE List Restrictions:
--start START [START ...]
Start date for CVE published. "3 years ago" or "2020/02/02"
--end END [END ...] End date for CVE published. "now" or "2020/02/02"
%python3 cve_markdown_charts.py Windows Print Spooler
Building table...
CVE-2022-23284
CVE-2022-22718
CVE-2022-22717
CVE-2022-21999
CVE-2022-21997
CVE-2021-41333
CVE-2021-41332
CVE-2021-40447
CVE-2021-38671
CVE-2021-38667
CVE-2021-36970
CVE-2021-36958
CVE-2021-36947
CVE-2021-36936
CVE-2021-34527
CVE-2021-34483
CVE-2021-34481
CVE-2021-26878
CVE-2021-1695
CVE-2021-1675
CVE-2021-1640
CVE-2020-17042
CVE-2020-17014
CVE-2020-17001
CVE-2020-1337
CVE-2020-1070
CVE-2020-1048
CVE-2020-1030
CVE-2019-0759
CVE-2016-3239
CVE-2016-3238
CVE-2013-1339
CVE-2013-0011
CVE-2012-1851
CVE-2010-2729
CVE-2009-0230
CVE-2009-0229
CVE-2009-0228
CVE-2006-6296
CVE-2005-1984
CVE-2001-1451
CVE-1999-0899
CVE-1999-0898
|CVE|Description|Release Date|KBs|Acknowledgments|
| :---: | :---: | :---: | :---: | :---: |
|[CVE-2022-23284](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23284)|Windows Print Spooler Elevation of Privilege Vulnerability. |[2022-03-08T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-23284)|<details>[10.0.10240.19235](https://support.microsoft.com/help/5011491) - [KB5011491](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011491)<br>[10.0.14393.5006](https://support.microsoft.com/help/5011495) - [KB5011495](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011495)<br>[10.0.17763.2686](https://support.microsoft.com/help/5011503) - [KB5011503](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011503)<br>[10.0.18363.2158](https://support.microsoft.com/help/5011485) - [KB5011485](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011485)<br>[10.0.19042.1586](https://support.microsoft.com/help/5011487) - [KB5011487](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011487)<br>[10.0.19043.1586](https://support.microsoft.com/help/5011487) - [KB5011487](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011487)<br>[10.0.19044.1586](https://support.microsoft.com/help/5011487) - [KB5011487](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011487)<br>[10.0.20348.580](https://support.microsoft.com/help/5011580) - [KB5011580](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011580)<br>[10.0.20348.587](https://support.microsoft.com/help/5011497) - [KB5011497](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011497)<br>[10.0.22000.556](https://support.microsoft.com/help/5011493) - [KB5011493](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011493)<br>[6.2.9200.23639](https://support.microsoft.com/help/5011527) - [KB5011527](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011527)<br>[6.2.9200.23645](https://support.microsoft.com/help/5011535) - [KB5011535](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011535)<br>[6.3.9600.20303](https://support.microsoft.com/help/5011560) - [KB5011560](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011560)<br>[6.3.9600.20303](https://support.microsoft.com/help/5011564) - [KB5011564](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5011564)</details>|<a href="https://twitter.com/kkokkokye">JeongOh Kyea</a> with <a href="https://theori.io/">THEORI</a>|
|[CVE-2022-22718](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22718)|Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21997, CVE-2022-21999, CVE-2022-22717. |[2022-02-08T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-22718)|<details>[10.0.10240.19204](https://support.microsoft.com/help/5010358) - [KB5010358](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358)<br>[10.0.14393.4946](https://support.microsoft.com/help/5010359) - [KB5010359](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359)<br>[10.0.17763.2565](https://support.microsoft.com/help/5010351) - [KB5010351](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351)<br>[10.0.18363.2094](https://support.microsoft.com/help/5010345) - [KB5010345](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345)<br>[10.0.19042.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.19043.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.19044.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.20348.524](https://support.microsoft.com/help/5010354) - [KB5010354](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354)<br>[10.0.20348.525](https://support.microsoft.com/help/5010456) - [KB5010456](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010456)<br>[10.0.22000.493](https://support.microsoft.com/help/5010386) - [KB5010386](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386)<br>[6.0.6003.21372](https://support.microsoft.com/help/5010403) - [KB5010403](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010403)<br>[6.0.6003.21374](https://support.microsoft.com/help/5010384) - [KB5010384](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010384)<br>[6.1.7601.25860](https://support.microsoft.com/help/5010404) - [KB5010404](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010404)<br>[6.1.7601.25860](https://support.microsoft.com/help/5010422) - [KB5010422](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010422)<br>[6.2.9200.23605](https://support.microsoft.com/help/5010392) - [KB5010392](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392)<br>[6.2.9200.23605](https://support.microsoft.com/help/5010412) - [KB5010412](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412)<br>[6.3.9600.20269](https://support.microsoft.com/help/5010395) - [KB5010395](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395)<br>[6.3.9600.20269](https://support.microsoft.com/help/5010419) - [KB5010419](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419)</details>|NSFOCUS TIANJI Lab via TianfuCup|
|[CVE-2022-22717](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22717)|Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21997, CVE-2022-21999, CVE-2022-22718. |[2022-02-08T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-22717)|<details>[10.0.10240.19204](https://support.microsoft.com/help/5010358) - [KB5010358](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358)<br>[10.0.14393.4946](https://support.microsoft.com/help/5010359) - [KB5010359](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359)<br>[10.0.17763.2565](https://support.microsoft.com/help/5010351) - [KB5010351](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351)<br>[10.0.18363.2094](https://support.microsoft.com/help/5010345) - [KB5010345](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345)<br>[10.0.19042.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.19043.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.19044.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.20348.524](https://support.microsoft.com/help/5010354) - [KB5010354](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354)<br>[10.0.20348.525](https://support.microsoft.com/help/5010456) - [KB5010456](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010456)<br>[10.0.22000.493](https://support.microsoft.com/help/5010386) - [KB5010386](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386)<br>[6.0.6003.21372](https://support.microsoft.com/help/5010403) - [KB5010403](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010403)<br>[6.0.6003.21374](https://support.microsoft.com/help/5010384) - [KB5010384](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010384)<br>[6.1.7601.25860](https://support.microsoft.com/help/5010404) - [KB5010404](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010404)<br>[6.1.7601.25860](https://support.microsoft.com/help/5010422) - [KB5010422](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010422)<br>[6.2.9200.23605](https://support.microsoft.com/help/5010392) - [KB5010392](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392)<br>[6.2.9200.23605](https://support.microsoft.com/help/5010412) - [KB5010412](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412)<br>[6.3.9600.20269](https://support.microsoft.com/help/5010395) - [KB5010395](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395)<br>[6.3.9600.20269](https://support.microsoft.com/help/5010419) - [KB5010419](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419)</details>|<a href="https://twitter.com/APTeeb0w">Thibault Van Geluwe de Berlaere</a> with <a href="https://www.mandiant.com/">Mandiant</a>|
|[CVE-2022-21999](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21999)|Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21997, CVE-2022-22717, CVE-2022-22718. |[2022-02-08T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-21999)|<details>[10.0.10240.19204](https://support.microsoft.com/help/5010358) - [KB5010358](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358)<br>[10.0.14393.4946](https://support.microsoft.com/help/5010359) - [KB5010359](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359)<br>[10.0.17763.2565](https://support.microsoft.com/help/5010351) - [KB5010351](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351)<br>[10.0.18363.2094](https://support.microsoft.com/help/5010345) - [KB5010345](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345)<br>[10.0.19042.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.19043.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.19044.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.20348.524](https://support.microsoft.com/help/5010354) - [KB5010354](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354)<br>[10.0.20348.525](https://support.microsoft.com/help/5010456) - [KB5010456](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010456)<br>[10.0.22000.493](https://support.microsoft.com/help/5010386) - [KB5010386](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386)<br>[6.0.6003.21372](https://support.microsoft.com/help/5010403) - [KB5010403](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010403)<br>[6.0.6003.21374](https://support.microsoft.com/help/5010384) - [KB5010384](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010384)<br>[6.1.7601.25860](https://support.microsoft.com/help/5010404) - [KB5010404](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010404)<br>[6.1.7601.25860](https://support.microsoft.com/help/5010422) - [KB5010422](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010422)<br>[6.2.9200.23605](https://support.microsoft.com/help/5010392) - [KB5010392](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392)<br>[6.2.9200.23605](https://support.microsoft.com/help/5010412) - [KB5010412](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412)<br>[6.3.9600.20269](https://support.microsoft.com/help/5010395) - [KB5010395](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395)<br>[6.3.9600.20269](https://support.microsoft.com/help/5010419) - [KB5010419](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419)</details>|Xuefeng Li (@lxf02942370) & Zhiniang Peng (@edwardzpeng) of Sangfor Via Tianfu CUP<br><a href="https://twitter.com/ly4k_">Oliver Lyak</a> with <a href="https://ifcr.dk/">Institut For Cyber Risk</a>|
|[CVE-2022-21997](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21997)|Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21999, CVE-2022-22717, CVE-2022-22718. |[2022-02-08T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-21997)|<details>[10.0.10240.19204](https://support.microsoft.com/help/5010358) - [KB5010358](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010358)<br>[10.0.14393.4946](https://support.microsoft.com/help/5010359) - [KB5010359](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010359)<br>[10.0.17763.2565](https://support.microsoft.com/help/5010351) - [KB5010351](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010351)<br>[10.0.18363.2094](https://support.microsoft.com/help/5010345) - [KB5010345](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010345)<br>[10.0.19042.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.19043.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.19044.1526](https://support.microsoft.com/help/5010342) - [KB5010342](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010342)<br>[10.0.20348.524](https://support.microsoft.com/help/5010354) - [KB5010354](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010354)<br>[10.0.20348.525](https://support.microsoft.com/help/5010456) - [KB5010456](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010456)<br>[10.0.22000.493](https://support.microsoft.com/help/5010386) - [KB5010386](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010386)<br>[6.0.6003.21372](https://support.microsoft.com/help/5010403) - [KB5010403](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010403)<br>[6.0.6003.21374](https://support.microsoft.com/help/5010384) - [KB5010384](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010384)<br>[6.1.7601.25860](https://support.microsoft.com/help/5010404) - [KB5010404](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010404)<br>[6.1.7601.25860](https://support.microsoft.com/help/5010422) - [KB5010422](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010422)<br>[6.2.9200.23605](https://support.microsoft.com/help/5010392) - [KB5010392](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010392)<br>[6.2.9200.23605](https://support.microsoft.com/help/5010412) - [KB5010412](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010412)<br>[6.3.9600.20269](https://support.microsoft.com/help/5010395) - [KB5010395](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010395)<br>[6.3.9600.20269](https://support.microsoft.com/help/5010419) - [KB5010419](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5010419)</details>|<a href="https://wubonetcn.github.io/">Bo Wu</a>|
|[CVE-2021-41333](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41333)|Windows Print Spooler Elevation of Privilege Vulnerability |[2021-12-14T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41333)|<details>[10.0.10240.19145](https://support.microsoft.com/help/5008230) - [KB5008230](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008230)<br>[10.0.14393.4825](https://support.microsoft.com/help/5008207) - [KB5008207](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008207)<br>[10.0.17763.2366](https://support.microsoft.com/help/5008218) - [KB5008218](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008218)<br>[10.0.18363.1977](https://support.microsoft.com/help/5008206) - [KB5008206](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008206)<br>[10.0.19041.1415](https://support.microsoft.com/help/5008212) - [KB5008212](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008212)<br>[10.0.19042.1415](https://support.microsoft.com/help/5008212) - [KB5008212](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008212)<br>[10.0.19043.1415](https://support.microsoft.com/help/5008212) - [KB5008212](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008212)<br>[10.0.19044.1415](https://support.microsoft.com/help/5008212) - [KB5008212](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008212)<br>[10.0.20348.405](https://support.microsoft.com/help/5008223) - [KB5008223](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008223)<br>[10.0.22000.376](https://support.microsoft.com/help/5008215) - [KB5008215](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008215)<br>[6.0.6003.21309](https://support.microsoft.com/help/5008271) - [KB5008271](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008271)<br>[6.0.6003.21309](https://support.microsoft.com/help/5008274) - [KB5008274](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008274)<br>[6.1.7601.25796](https://support.microsoft.com/help/5008244) - [KB5008244](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008244)<br>[6.1.7601.25796](https://support.microsoft.com/help/5008282) - [KB5008282](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008282)<br>[6.2.9200.23540](https://support.microsoft.com/help/5008255) - [KB5008255](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008255)<br>[6.2.9200.23545](https://support.microsoft.com/help/5008277) - [KB5008277](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008277)<br>[6.3.9600.20207](https://support.microsoft.com/help/5008263) - [KB5008263](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008263)<br>[6.3.9600.20207](https://support.microsoft.com/help/5008285) - [KB5008285](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5008285)</details>|James Forshaw of <a href="http://www.google.com/">Google Project Zero</a><br>Abdelhamid Naceri working with <a href="https://www.zerodayinitiative.com/">Trend Micro Zero Day Initiative</a>|
|[CVE-2021-41332](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41332)|Windows Print Spooler Information Disclosure Vulnerability |[2021-10-12T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41332)|<details>[10.0.10240.19086](https://support.microsoft.com/help/5006675) - [KB5006675](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006675)<br>[10.0.14393.4704](https://support.microsoft.com/help/5006669) - [KB5006669](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006669)<br>[10.0.17763.2237](https://support.microsoft.com/help/5006672) - [KB5006672](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006672)<br>[10.0.18363.1854](https://support.microsoft.com/help/5006667) - [KB5006667](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006667)<br>[10.0.19041.1288](https://support.microsoft.com/help/5006670) - [KB5006670](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006670)<br>[10.0.19042.1288](https://support.microsoft.com/help/5006670) - [KB5006670](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006670)<br>[10.0.20348.288](https://support.microsoft.com/help/5006699) - [KB5006699](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006699)<br>[10.0.22000.258](https://support.microsoft.com/help/5006674) - [KB5006674](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006674)<br>[6.0.6003.21251](https://support.microsoft.com/help/5006715) - [KB5006715](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006715)<br>[6.0.6003.21251](https://support.microsoft.com/help/5006736) - [KB5006736](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006736)<br>[6.1.7601.25740](https://support.microsoft.com/help/5006728) - [KB5006728](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006728)<br>[6.1.7601.25740](https://support.microsoft.com/help/5006743) - [KB5006743](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006743)<br>[6.2.9200.23490](https://support.microsoft.com/help/5006732) - [KB5006732](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006732)<br>[6.2.9200.23490](https://support.microsoft.com/help/5006739) - [KB5006739](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006739)<br>[6.3.9600.20144](https://support.microsoft.com/help/5006714) - [KB5006714](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006714)<br>[6.3.9600.20144](https://support.microsoft.com/help/5006729) - [KB5006729](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006729)</details>|Liubenjin with Codesafe Team of Legendsec at Qi'anxin Group|
|[CVE-2021-40447](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40447)|Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38667, CVE-2021-38671. |[2021-09-14T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-40447)|<details>[10.0.10240.19060](https://support.microsoft.com/help/5005569) - [KB5005569](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005569)<br>[10.0.14393.4651](https://support.microsoft.com/help/5005573) - [KB5005573](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005573)<br>[10.0.17763.2183](https://support.microsoft.com/help/5005568) - [KB5005568](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568)<br>[10.0.18363.1801](https://support.microsoft.com/help/5005566) - [KB5005566](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005566)<br>[10.0.19043.1237](https://support.microsoft.com/help/5005565) - [KB5005565](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005565)<br>[10.0.20348.230](https://support.microsoft.com/help/5005575) - [KB5005575](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005575)<br>[6.0.6003.21218](https://support.microsoft.com/help/5005606) - [KB5005606](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005606)<br>[6.0.6003.21218](https://support.microsoft.com/help/5005618) - [KB5005618](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005618)<br>[6.1.7601.25712](https://support.microsoft.com/help/5005615) - [KB5005615](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005615)<br>[6.1.7601.25712](https://support.microsoft.com/help/5005633) - [KB5005633](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005633)<br>[6.2.9200.23462](https://support.microsoft.com/help/5005607) - [KB5005607](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005607)<br>[6.2.9200.23462](https://support.microsoft.com/help/5005623) - [KB5005623](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005623)<br>[6.3.9600.20120](https://support.microsoft.com/help/5005613) - [KB5005613](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005613)<br>[6.3.9600.20120](https://support.microsoft.com/help/5005627) - [KB5005627](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005627)</details>||
|[CVE-2021-38671](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38671)|Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38667, CVE-2021-40447. |[2021-09-14T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-38671)|<details>[10.0.10240.19060](https://support.microsoft.com/help/5005569) - [KB5005569](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005569)<br>[10.0.14393.4651](https://support.microsoft.com/help/5005573) - [KB5005573](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005573)<br>[10.0.17763.2183](https://support.microsoft.com/help/5005568) - [KB5005568](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568)<br>[10.0.18363.1801](https://support.microsoft.com/help/5005566) - [KB5005566](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005566)<br>[10.0.19043.1237](https://support.microsoft.com/help/5005565) - [KB5005565](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005565)<br>[10.0.20348.230](https://support.microsoft.com/help/5005575) - [KB5005575](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005575)<br>[6.0.6003.21218](https://support.microsoft.com/help/5005606) - [KB5005606](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005606)<br>[6.0.6003.21218](https://support.microsoft.com/help/5005618) - [KB5005618](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005618)<br>[6.1.7601.25712](https://support.microsoft.com/help/5005615) - [KB5005615](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005615)<br>[6.1.7601.25712](https://support.microsoft.com/help/5005633) - [KB5005633](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005633)<br>[6.2.9200.23462](https://support.microsoft.com/help/5005607) - [KB5005607](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005607)<br>[6.2.9200.23462](https://support.microsoft.com/help/5005623) - [KB5005623](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005623)<br>[6.3.9600.20120](https://support.microsoft.com/help/5005613) - [KB5005613](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005613)<br>[6.3.9600.20120](https://support.microsoft.com/help/5005627) - [KB5005627](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005627)</details>|<a href="https://twitter.com/tvgdb2">Thibault Van Geluwe de Berlaere</a> with <a href="https://www.mandiant.com/">Mandiant</a>|
|[CVE-2021-38667](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38667)|Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38671, CVE-2021-40447. |[2021-09-14T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-38667)|<details>[10.0.10240.19060](https://support.microsoft.com/help/5005569) - [KB5005569](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005569)<br>[10.0.14393.4651](https://support.microsoft.com/help/5005573) - [KB5005573](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005573)<br>[10.0.17763.2183](https://support.microsoft.com/help/5005568) - [KB5005568](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568)<br>[10.0.18363.1801](https://support.microsoft.com/help/5005566) - [KB5005566](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005566)<br>[10.0.19043.1237](https://support.microsoft.com/help/5005565) - [KB5005565](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005565)<br>[10.0.20348.230](https://support.microsoft.com/help/5005575) - [KB5005575](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005575)<br>[6.0.6003.21218](https://support.microsoft.com/help/5005606) - [KB5005606](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005606)<br>[6.0.6003.21218](https://support.microsoft.com/help/5005618) - [KB5005618](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005618)<br>[6.1.7601.25712](https://support.microsoft.com/help/5005615) - [KB5005615](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005615)<br>[6.1.7601.25712](https://support.microsoft.com/help/5005633) - [KB5005633](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005633)<br>[6.2.9200.23462](https://support.microsoft.com/help/5005607) - [KB5005607](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005607)<br>[6.2.9200.23462](https://support.microsoft.com/help/5005623) - [KB5005623](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005623)<br>[6.3.9600.20120](https://support.microsoft.com/help/5005613) - [KB5005613](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005613)<br>[6.3.9600.20120](https://support.microsoft.com/help/5005627) - [KB5005627](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005627)</details>||
|[CVE-2021-36970](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36970)|Windows Print Spooler Spoofing Vulnerability |[2021-10-12T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-36970)|<details>[10.0.10240.19086](https://support.microsoft.com/help/5006675) - [KB5006675](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006675)<br>[10.0.14393.4704](https://support.microsoft.com/help/5006669) - [KB5006669](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006669)<br>[10.0.17763.2237](https://support.microsoft.com/help/5006672) - [KB5006672](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006672)<br>[10.0.18363.1854](https://support.microsoft.com/help/5006667) - [KB5006667](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006667)<br>[10.0.19041.1288](https://support.microsoft.com/help/5006670) - [KB5006670](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006670)<br>[10.0.19042.1288](https://support.microsoft.com/help/5006670) - [KB5006670](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006670)<br>[10.0.20348.288](https://support.microsoft.com/help/5006699) - [KB5006699](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006699)<br>[10.0.22000.258](https://support.microsoft.com/help/5006674) - [KB5006674](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006674)<br>[6.0.6003.21251](https://support.microsoft.com/help/5006715) - [KB5006715](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006715)<br>[6.0.6003.21251](https://support.microsoft.com/help/5006736) - [KB5006736](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006736)<br>[6.1.7601.25740](https://support.microsoft.com/help/5006728) - [KB5006728](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006728)<br>[6.1.7601.25740](https://support.microsoft.com/help/5006743) - [KB5006743](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006743)<br>[6.2.9200.23490](https://support.microsoft.com/help/5006732) - [KB5006732](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006732)<br>[6.2.9200.23490](https://support.microsoft.com/help/5006739) - [KB5006739](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006739)<br>[6.3.9600.20144](https://support.microsoft.com/help/5006714) - [KB5006714](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006714)<br>[6.3.9600.20144](https://support.microsoft.com/help/5006729) - [KB5006729](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5006729)</details>|<a href="https://twitter.com/lxf02942370">XueFeng Li</a> and <a href="https://twitter.com/edwardzpeng">Zhiniang Peng</a> with <a href="https://www.sangfor.com/">Sangfor</a>|
|[CVE-2021-36958](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36958)|Windows Print Spooler Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-36936, CVE-2021-36947. |[2021-08-10T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-36958)|<details>[10.0.10240.19060](https://support.microsoft.com/help/5005569) - [KB5005569](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005569)<br>[10.0.14393.4651](https://support.microsoft.com/help/5005573) - [KB5005573](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005573)<br>[10.0.17763.2183](https://support.microsoft.com/help/5005568) - [KB5005568](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005568)<br>[10.0.18363.1801](https://support.microsoft.com/help/5005566) - [KB5005566](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005566)<br>[10.0.19041.1237](https://support.microsoft.com/help/5005565) - [KB5005565](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005565)<br>[10.0.19042.1237](https://support.microsoft.com/help/5005565) - [KB5005565](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005565)<br>[10.0.19043.1237](https://support.microsoft.com/help/5005565) - [KB5005565](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005565)<br>[6.0.6003.21218](https://support.microsoft.com/help/5005606) - [KB5005606](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005606)<br>[6.0.6003.21218](https://support.microsoft.com/help/5005618) - [KB5005618](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005618)<br>[6.1.7601.25712](https://support.microsoft.com/help/5005615) - [KB5005615](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005615)<br>[6.1.7601.25712](https://support.microsoft.com/help/5005633) - [KB5005633](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005633)<br>[6.2.9200.23462](https://support.microsoft.com/help/5005607) - [KB5005607](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005607)<br>[6.2.9200.23462](https://support.microsoft.com/help/5005623) - [KB5005623](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005623)<br>[6.3.9600.20120](https://support.microsoft.com/help/5005613) - [KB5005613](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005613)<br>[6.3.9600.20120](https://support.microsoft.com/help/5005627) - [KB5005627](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005627)</details>|<a href="https://twitter.com/offenseindepth">Victor Mata</a> of FusionX, Accenture Security|
|[CVE-2021-36947](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36947)|Windows Print Spooler Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-36936, CVE-2021-36958. |[2021-08-10T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-36947)|<details>[10.0.10240.19022](https://support.microsoft.com/help/5005040) - [KB5005040](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040)<br>[10.0.14393.4583](https://support.microsoft.com/help/5005043) - [KB5005043](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043)<br>[10.0.17763.2114](https://support.microsoft.com/help/5005030) - [KB5005030](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030)<br>[10.0.18363.1734](https://support.microsoft.com/help/5005031) - [KB5005031](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031)<br>[10.0.19041.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[10.0.19042.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[10.0.19043.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[6.0.6003.21192](https://support.microsoft.com/help/5005090) - [KB5005090](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005090)<br>[6.0.6003.21192](https://support.microsoft.com/help/5005095) - [KB5005095](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005095)<br>[6.1.7601.25685](https://support.microsoft.com/help/5005088) - [KB5005088](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005088)<br>[6.1.7601.25685](https://support.microsoft.com/help/5005089) - [KB5005089](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005089)<br>[6.2.9200.23435](https://support.microsoft.com/help/5005094) - [KB5005094](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094)<br>[6.2.9200.23435](https://support.microsoft.com/help/5005099) - [KB5005099](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099)<br>[6.3.9600.20094](https://support.microsoft.com/help/5005076) - [KB5005076](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076)<br>[6.3.9600.20094](https://support.microsoft.com/help/5005106) - [KB5005106](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106)</details>||
|[CVE-2021-36936](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36936)|Windows Print Spooler Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-36947, CVE-2021-36958. |[2021-08-10T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-36936)|<details>[10.0.10240.19022](https://support.microsoft.com/help/5005040) - [KB5005040](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040)<br>[10.0.14393.4583](https://support.microsoft.com/help/5005043) - [KB5005043](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043)<br>[10.0.17763.2114](https://support.microsoft.com/help/5005030) - [KB5005030](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030)<br>[10.0.18363.1734](https://support.microsoft.com/help/5005031) - [KB5005031](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031)<br>[10.0.19041.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[10.0.19042.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[10.0.19043.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[6.0.6003.21192](https://support.microsoft.com/help/5005090) - [KB5005090](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005090)<br>[6.0.6003.21192](https://support.microsoft.com/help/5005095) - [KB5005095](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005095)<br>[6.1.7601.25685](https://support.microsoft.com/help/5005088) - [KB5005088](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005088)<br>[6.1.7601.25685](https://support.microsoft.com/help/5005089) - [KB5005089](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005089)<br>[6.2.9200.23435](https://support.microsoft.com/help/5005094) - [KB5005094](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094)<br>[6.2.9200.23435](https://support.microsoft.com/help/5005099) - [KB5005099](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099)<br>[6.3.9600.20094](https://support.microsoft.com/help/5005076) - [KB5005076](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076)<br>[6.3.9600.20094](https://support.microsoft.com/help/5005106) - [KB5005106](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106)</details>||
|[CVE-2021-34527](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34527)|Windows Print Spooler Remote Code Execution Vulnerability |[2021-07-13T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34527)|<details>[10.0.10240.18969](https://support.microsoft.com/help/5004950) - [KB5004950](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004950)<br>[10.0.17763.2029](https://support.microsoft.com/help/5004947) - [KB5004947](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004947)<br>[10.0.18363.1646](https://support.microsoft.com/help/5004946) - [KB5004946](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004946)<br>[10.0.19041.1083](https://support.microsoft.com/help/5004945) - [KB5004945](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004945)<br>[10.0.19042.1083](https://support.microsoft.com/help/5004945) - [KB5004945](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004945)<br>[10.0.19043.1083](https://support.microsoft.com/help/5004945) - [KB5004945](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004945)<br>[6.0.6003.21138](https://support.microsoft.com/help/5004955) - [KB5004955](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004955)<br>[6.0.6003.21138](https://support.microsoft.com/help/5004959) - [KB5004959](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004959)<br>[6.1.7601.25633](https://support.microsoft.com/help/5004951) - [KB5004951](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004951)<br>[6.1.7601.25633](https://support.microsoft.com/help/5004953) - [KB5004953](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004953)<br>[6.3.9600.20046](https://support.microsoft.com/help/5004954) - [KB5004954](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004954)<br>[6.3.9600.20046](https://support.microsoft.com/help/5004958) - [KB5004958](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004958)<br>[None](https://support.microsoft.com/help/5004948) - [KB5004948](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004948)<br>[None](https://support.microsoft.com/help/5004956) - [KB5004956](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004956)<br>[None](https://support.microsoft.com/help/5004960) - [KB5004960](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5004960)</details>|Zhiniang Peng (<a href="https://twitter.com/edwardzpeng/">@edwardzpeng</a>) and Xuefeng Li (<a href="https://twitter.com/lxf02942370/">@lxf02942370</a>)|
|[CVE-2021-34483](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34483)|Windows Print Spooler Elevation of Privilege Vulnerability |[2021-08-10T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34483)|<details>[10.0.10240.19022](https://support.microsoft.com/help/5005040) - [KB5005040](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040)<br>[10.0.14393.4583](https://support.microsoft.com/help/5005043) - [KB5005043](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043)<br>[10.0.17763.2114](https://support.microsoft.com/help/5005030) - [KB5005030](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030)<br>[10.0.18363.1734](https://support.microsoft.com/help/5005031) - [KB5005031](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031)<br>[10.0.19041.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[10.0.19042.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[10.0.19043.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[6.0.6003.21192](https://support.microsoft.com/help/5005090) - [KB5005090](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005090)<br>[6.0.6003.21192](https://support.microsoft.com/help/5005095) - [KB5005095](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005095)<br>[6.1.7601.25685](https://support.microsoft.com/help/5005088) - [KB5005088](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005088)<br>[6.1.7601.25685](https://support.microsoft.com/help/5005089) - [KB5005089](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005089)<br>[6.2.9200.23435](https://support.microsoft.com/help/5005094) - [KB5005094](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094)<br>[6.2.9200.23435](https://support.microsoft.com/help/5005099) - [KB5005099](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099)<br>[6.3.9600.20094](https://support.microsoft.com/help/5005076) - [KB5005076](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076)<br>[6.3.9600.20094](https://support.microsoft.com/help/5005106) - [KB5005106](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106)</details>|Thibault van Geluwe<br>[Victor Mata](https://twitter.com/offenseindepth) of FusionX, Accenture Security|
|[CVE-2021-34481](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34481)|Windows Print Spooler Elevation of Privilege Vulnerability |[2021-07-13T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34481)|<details>[10.0.10240.19022](https://support.microsoft.com/help/5005040) - [KB5005040](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005040)<br>[10.0.14393.4583](https://support.microsoft.com/help/5005043) - [KB5005043](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005043)<br>[10.0.17763.2114](https://support.microsoft.com/help/5005030) - [KB5005030](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005030)<br>[10.0.18363.1734](https://support.microsoft.com/help/5005031) - [KB5005031](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005031)<br>[10.0.19041.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[10.0.19042.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[10.0.19043.1165](https://support.microsoft.com/help/5005033) - [KB5005033](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005033)<br>[6.0.6003.21192](https://support.microsoft.com/help/5005090) - [KB5005090](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005090)<br>[6.0.6003.21192](https://support.microsoft.com/help/5005095) - [KB5005095](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005095)<br>[6.1.7601.25685](https://support.microsoft.com/help/5005088) - [KB5005088](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005088)<br>[6.1.7601.25685](https://support.microsoft.com/help/5005089) - [KB5005089](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005089)<br>[6.2.9200.23435](https://support.microsoft.com/help/5005094) - [KB5005094](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005094)<br>[6.2.9200.23435](https://support.microsoft.com/help/5005099) - [KB5005099](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005099)<br>[6.3.9600.20094](https://support.microsoft.com/help/5005076) - [KB5005076](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005076)<br>[6.3.9600.20094](https://support.microsoft.com/help/5005106) - [KB5005106](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5005106)</details>|<a href="https://twitter.com/Junior_Baines">Jacob Baines</a>|
|[CVE-2021-26878](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26878)|Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1640. |[2021-03-09T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26878)|<details>[None](https://support.microsoft.com/help/5000802) - [KB5000802](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000802)<br>[None](https://support.microsoft.com/help/5000803) - [KB5000803](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000803)<br>[None](https://support.microsoft.com/help/5000807) - [KB5000807](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000807)<br>[None](https://support.microsoft.com/help/5000808) - [KB5000808](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000808)<br>[None](https://support.microsoft.com/help/5000809) - [KB5000809](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000809)<br>[None](https://support.microsoft.com/help/5000822) - [KB5000822](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000822)<br>[None](https://support.microsoft.com/help/5000840) - [KB5000840](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000840)<br>[None](https://support.microsoft.com/help/5000841) - [KB5000841](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000841)<br>[None](https://support.microsoft.com/help/5000844) - [KB5000844](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000844)<br>[None](https://support.microsoft.com/help/5000847) - [KB5000847](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000847)<br>[None](https://support.microsoft.com/help/5000848) - [KB5000848](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000848)<br>[None](https://support.microsoft.com/help/5000851) - [KB5000851](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000851)<br>[None](https://support.microsoft.com/help/5000853) - [KB5000853](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000853)<br>[None](https://support.microsoft.com/help/5000856) - [KB5000856](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000856)</details>|x<br>None<br>This vulnerability was discovered by Bryan de Houwer and Thibault van Geluwe de Berlaere.|
|[CVE-2021-1695](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1695)|Windows Print Spooler Elevation of Privilege Vulnerability |[2021-01-12T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1695)|<details>[None](https://support.microsoft.com/help/4598229) - [KB4598229](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598229)<br>[None](https://support.microsoft.com/help/4598230) - [KB4598230](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598230)<br>[None](https://support.microsoft.com/help/4598231) - [KB4598231](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598231)<br>[None](https://support.microsoft.com/help/4598242) - [KB4598242](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598242)<br>[None](https://support.microsoft.com/help/4598243) - [KB4598243](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598243)<br>[None](https://support.microsoft.com/help/4598245) - [KB4598245](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598245)<br>[None](https://support.microsoft.com/help/4598275) - [KB4598275](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598275)<br>[None](https://support.microsoft.com/help/4598278) - [KB4598278](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598278)<br>[None](https://support.microsoft.com/help/4598279) - [KB4598279](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598279)<br>[None](https://support.microsoft.com/help/4598285) - [KB4598285](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598285)<br>[None](https://support.microsoft.com/help/4598287) - [KB4598287](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598287)<br>[None](https://support.microsoft.com/help/4598288) - [KB4598288](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598288)<br>[None](https://support.microsoft.com/help/4598289) - [KB4598289](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598289)<br>[None](https://support.microsoft.com/help/4598297) - [KB4598297](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4598297)</details>|<a href="https://twitter.com/kkokkokye">JeongOh Kyea</a> of THEORI working with Trend Micro Zero Day Initiative|
|[CVE-2021-1675](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1675)|Windows Print Spooler Elevation of Privilege Vulnerability |[2021-06-08T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1675)|<details>[10.0.10240.18967](https://support.microsoft.com/help/5003687) - [KB5003687](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003687)<br>[10.0.14393.4467](https://support.microsoft.com/help/5003638) - [KB5003638](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003638)<br>[10.0.17763.1999](https://support.microsoft.com/help/5003646) - [KB5003646](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003646)<br>[10.0.18363.1621](https://support.microsoft.com/help/5003635) - [KB5003635](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003635)<br>[10.0.19041.1052](https://support.microsoft.com/help/5003637) - [KB5003637](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003637)<br>[10.0.19042.1052](https://support.microsoft.com/help/5003637) - [KB5003637](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003637)<br>[10.0.19043.1052](https://support.microsoft.com/help/5003637) - [KB5003637](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003637)<br>[6.0.6003.21137](https://support.microsoft.com/help/5003661) - [KB5003661](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003661)<br>[6.0.6003.21137](https://support.microsoft.com/help/5003695) - [KB5003695](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003695)<br>[6.1.7601.25632](https://support.microsoft.com/help/5003667) - [KB5003667](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003667)<br>[6.1.7601.25632](https://support.microsoft.com/help/5003694) - [KB5003694](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003694)<br>[6.2.9200.23372](https://support.microsoft.com/help/5003696) - [KB5003696](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003696)<br>[6.2.9200.23372](https://support.microsoft.com/help/5003697) - [KB5003697](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003697)<br>[6.3.9600.20044](https://support.microsoft.com/help/5003681) - [KB5003681](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003681)<br>[6.3.9600.20045](https://support.microsoft.com/help/5003671) - [KB5003671](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5003671)</details>|Yunhai Zhang of NSFOCUS TIANJI LAB https://www.nsfocus.com.cn/<br><a href="https://www.linkedin.com/in/piotr-madej-18b0bb38/">Piotr Madej of AFINE</a><br><a href="">Zhipeng Huo (@R3dF09) </a> of <a href="https://xlab.tencent.com">Tencent Security Xuanwu Lab </a>|
|[CVE-2021-1640](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1640)|Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26878. |[2021-03-09T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-1640)|<details>[None](https://support.microsoft.com/help/5000802) - [KB5000802](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000802)<br>[None](https://support.microsoft.com/help/5000803) - [KB5000803](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000803)<br>[None](https://support.microsoft.com/help/5000807) - [KB5000807](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000807)<br>[None](https://support.microsoft.com/help/5000808) - [KB5000808](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000808)<br>[None](https://support.microsoft.com/help/5000809) - [KB5000809](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000809)<br>[None](https://support.microsoft.com/help/5000822) - [KB5000822](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000822)<br>[None](https://support.microsoft.com/help/5000840) - [KB5000840](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000840)<br>[None](https://support.microsoft.com/help/5000841) - [KB5000841](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000841)<br>[None](https://support.microsoft.com/help/5000844) - [KB5000844](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000844)<br>[None](https://support.microsoft.com/help/5000847) - [KB5000847](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000847)<br>[None](https://support.microsoft.com/help/5000848) - [KB5000848](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000848)<br>[None](https://support.microsoft.com/help/5000851) - [KB5000851](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000851)<br>[None](https://support.microsoft.com/help/5000853) - [KB5000853](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000853)<br>[None](https://support.microsoft.com/help/5000856) - [KB5000856](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5000856)</details>|Blaz Satler and Ziga Sumenjak of <a href="https://0patch.com">0patch</a><br>JeongOh Kyea (@kkokkokye) of THEORI working with <a href="https://www.zerodayinitiative.com/">Trend Micro Zero Day Initiative</a>|
|[CVE-2020-17042](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17042)|Windows Print Spooler Remote Code Execution Vulnerability |[2020-11-10T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17042)|<details>[None](https://support.microsoft.com/help/4586781) - [KB4586781](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586781)<br>[None](https://support.microsoft.com/help/4586785) - [KB4586785](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586785)<br>[None](https://support.microsoft.com/help/4586786) - [KB4586786](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586786)<br>[None](https://support.microsoft.com/help/4586787) - [KB4586787](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586787)<br>[None](https://support.microsoft.com/help/4586793) - [KB4586793](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586793)<br>[None](https://support.microsoft.com/help/4586805) - [KB4586805](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586805)<br>[None](https://support.microsoft.com/help/4586807) - [KB4586807](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586807)<br>[None](https://support.microsoft.com/help/4586808) - [KB4586808](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586808)<br>[None](https://support.microsoft.com/help/4586817) - [KB4586817](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586817)<br>[None](https://support.microsoft.com/help/4586823) - [KB4586823](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586823)<br>[None](https://support.microsoft.com/help/4586827) - [KB4586827](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586827)<br>[None](https://support.microsoft.com/help/4586830) - [KB4586830](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586830)<br>[None](https://support.microsoft.com/help/4586834) - [KB4586834](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586834)<br>[None](https://support.microsoft.com/help/4586845) - [KB4586845](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586845)</details>|HyungSeok Han(@DaramG) and JeongOh Kyea(@kkokkokye) of THEORI|
|[CVE-2020-17014](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17014)|Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17001. |[2020-11-10T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17014)|<details>[None](https://support.microsoft.com/help/4586781) - [KB4586781](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586781)<br>[None](https://support.microsoft.com/help/4586785) - [KB4586785](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586785)<br>[None](https://support.microsoft.com/help/4586786) - [KB4586786](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586786)<br>[None](https://support.microsoft.com/help/4586787) - [KB4586787](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586787)<br>[None](https://support.microsoft.com/help/4586793) - [KB4586793](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586793)<br>[None](https://support.microsoft.com/help/4586805) - [KB4586805](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586805)<br>[None](https://support.microsoft.com/help/4586807) - [KB4586807](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586807)<br>[None](https://support.microsoft.com/help/4586808) - [KB4586808](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586808)<br>[None](https://support.microsoft.com/help/4586817) - [KB4586817](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586817)<br>[None](https://support.microsoft.com/help/4586823) - [KB4586823](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586823)<br>[None](https://support.microsoft.com/help/4586827) - [KB4586827](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586827)<br>[None](https://support.microsoft.com/help/4586830) - [KB4586830](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586830)<br>[None](https://support.microsoft.com/help/4586834) - [KB4586834](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586834)<br>[None](https://support.microsoft.com/help/4586845) - [KB4586845](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586845)</details>|Zhiniang Peng (<a href="https://twitter.com/edwardzpeng">@edwardzpeng</a> & Xuefeng Li (<a href="https://twitter.com/lxf02942370">@lxf02942370</a><br>JeongOh Kyea (@kkokkokye) of THEORI working with Trend Micro Zero Day Initiative|
|[CVE-2020-17001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17001)|Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17014. |[2020-11-10T08:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-17001)|<details>[None](https://support.microsoft.com/help/4586781) - [KB4586781](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586781)<br>[None](https://support.microsoft.com/help/4586785) - [KB4586785](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586785)<br>[None](https://support.microsoft.com/help/4586786) - [KB4586786](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586786)<br>[None](https://support.microsoft.com/help/4586787) - [KB4586787](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586787)<br>[None](https://support.microsoft.com/help/4586793) - [KB4586793](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586793)<br>[None](https://support.microsoft.com/help/4586805) - [KB4586805](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586805)<br>[None](https://support.microsoft.com/help/4586807) - [KB4586807](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586807)<br>[None](https://support.microsoft.com/help/4586808) - [KB4586808](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586808)<br>[None](https://support.microsoft.com/help/4586817) - [KB4586817](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586817)<br>[None](https://support.microsoft.com/help/4586823) - [KB4586823](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586823)<br>[None](https://support.microsoft.com/help/4586827) - [KB4586827](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586827)<br>[None](https://support.microsoft.com/help/4586830) - [KB4586830](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586830)<br>[None](https://support.microsoft.com/help/4586834) - [KB4586834](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586834)<br>[None](https://support.microsoft.com/help/4586845) - [KB4586845](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4586845)</details>|James Forshaw of <a href="http://www.google.com/">Google Project Zero</a>|
|[CVE-2020-1337](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1337)|An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. |[2020-08-11T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1337)|<details>[None](https://support.microsoft.com/help/4565349) - [KB4565349](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4565349)<br>[None](https://support.microsoft.com/help/4565351) - [KB4565351](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4565351)<br>[None](https://support.microsoft.com/help/4566782) - [KB4566782](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4566782)<br>[None](https://support.microsoft.com/help/4571692) - [KB4571692](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571692)<br>[None](https://support.microsoft.com/help/4571694) - [KB4571694](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571694)<br>[None](https://support.microsoft.com/help/4571702) - [KB4571702](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571702)<br>[None](https://support.microsoft.com/help/4571703) - [KB4571703](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571703)<br>[None](https://support.microsoft.com/help/4571709) - [KB4571709](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571709)<br>[None](https://support.microsoft.com/help/4571719) - [KB4571719](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571719)<br>[None](https://support.microsoft.com/help/4571723) - [KB4571723](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571723)<br>[None](https://support.microsoft.com/help/4571729) - [KB4571729](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571729)<br>[None](https://support.microsoft.com/help/4571730) - [KB4571730](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571730)<br>[None](https://support.microsoft.com/help/4571736) - [KB4571736](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571736)<br>[None](https://support.microsoft.com/help/4571741) - [KB4571741](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571741)<br>[None](https://support.microsoft.com/help/4571746) - [KB4571746](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571746)</details>|Peleg Hadar (<a href="https://twitter.com/peleghd">@peleghd</a>) and Tomer Bar of SafeBreach Labs.<br>EoP Master working with <a href="https://vcp.idefense.com">iDefense Labs</a>, Accenture. <br>Vte. Javier García Mayén<br>Junyu Zhou (<a href="https://twitter.com/md5_salt">@md5_salt</a>) of Tencent Security Xuanwu Lab and Wenxu Wu<br>Anonymous working with <a href="https://www.zerodayinitiative.com/">Trend Micro's Zero Day Initiative</a><br>Alex Ionescu, <a href="https://www.crowdstrike.com">CrowdStrike Inc.</a><br>Paolo Stagno aka <a href="https://voidsec.com">VoidSec</a><br>Zhiniang Peng <a href="https://twitter.com/edwardzpeng">(@edwardzpeng)</a> & Xuefeng Li|
|[CVE-2020-1070](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1070)|An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1048. |[2020-05-12T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1070)|<details>[None](https://support.microsoft.com/help/4551853) - [KB4551853](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4551853)<br>[None](https://support.microsoft.com/help/4556799) - [KB4556799](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556799)<br>[None](https://support.microsoft.com/help/4556807) - [KB4556807](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556807)<br>[None](https://support.microsoft.com/help/4556812) - [KB4556812](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556812)<br>[None](https://support.microsoft.com/help/4556813) - [KB4556813](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556813)<br>[None](https://support.microsoft.com/help/4556826) - [KB4556826](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556826)<br>[None](https://support.microsoft.com/help/4556836) - [KB4556836](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556836)<br>[None](https://support.microsoft.com/help/4556840) - [KB4556840](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556840)<br>[None](https://support.microsoft.com/help/4556843) - [KB4556843](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556843)<br>[None](https://support.microsoft.com/help/4556846) - [KB4556846](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556846)<br>[None](https://support.microsoft.com/help/4556852) - [KB4556852](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556852)<br>[None](https://support.microsoft.com/help/4556853) - [KB4556853](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556853)<br>[None](https://support.microsoft.com/help/4556854) - [KB4556854](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556854)<br>[None](https://support.microsoft.com/help/4556860) - [KB4556860](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556860)</details>|<a href="https://twitter.com/kkokkokye">JeongOh Kyea</a> of THEORI|
|[CVE-2020-1048](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1048)|An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1070. |[2020-05-12T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1048)|<details>[None](https://support.microsoft.com/help/4551853) - [KB4551853](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4551853)<br>[None](https://support.microsoft.com/help/4556799) - [KB4556799](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556799)<br>[None](https://support.microsoft.com/help/4556807) - [KB4556807](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556807)<br>[None](https://support.microsoft.com/help/4556812) - [KB4556812](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556812)<br>[None](https://support.microsoft.com/help/4556813) - [KB4556813](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556813)<br>[None](https://support.microsoft.com/help/4556826) - [KB4556826](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556826)<br>[None](https://support.microsoft.com/help/4556836) - [KB4556836](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556836)<br>[None](https://support.microsoft.com/help/4556840) - [KB4556840](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556840)<br>[None](https://support.microsoft.com/help/4556843) - [KB4556843](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556843)<br>[None](https://support.microsoft.com/help/4556846) - [KB4556846](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556846)<br>[None](https://support.microsoft.com/help/4556852) - [KB4556852](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556852)<br>[None](https://support.microsoft.com/help/4556853) - [KB4556853](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556853)<br>[None](https://support.microsoft.com/help/4556854) - [KB4556854](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556854)<br>[None](https://support.microsoft.com/help/4556860) - [KB4556860](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4556860)</details>|Peleg Hadar (<a href="https://twitter.com/peleghd">@peleghd</a>) and Tomer Bar of SafeBreach Labs|
|[CVE-2020-1030](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1030)|An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. |[2020-09-08T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1030)|<details>[None](https://support.microsoft.com/help/4570333) - [KB4570333](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4570333)<br>[None](https://support.microsoft.com/help/4571756) - [KB4571756](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4571756)<br>[None](https://support.microsoft.com/help/4574727) - [KB4574727](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4574727)<br>[None](https://support.microsoft.com/help/4577015) - [KB4577015](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577015)<br>[None](https://support.microsoft.com/help/4577032) - [KB4577032](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577032)<br>[None](https://support.microsoft.com/help/4577038) - [KB4577038](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577038)<br>[None](https://support.microsoft.com/help/4577041) - [KB4577041](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577041)<br>[None](https://support.microsoft.com/help/4577048) - [KB4577048](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577048)<br>[None](https://support.microsoft.com/help/4577049) - [KB4577049](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577049)<br>[None](https://support.microsoft.com/help/4577051) - [KB4577051](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577051)<br>[None](https://support.microsoft.com/help/4577053) - [KB4577053](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577053)<br>[None](https://support.microsoft.com/help/4577064) - [KB4577064](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577064)<br>[None](https://support.microsoft.com/help/4577066) - [KB4577066](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577066)<br>[None](https://support.microsoft.com/help/4577070) - [KB4577070](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577070)<br>[None](https://support.microsoft.com/help/4577071) - [KB4577071](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4577071)</details>|<a href="https://twitter.com/offenseindepth">Victor Mata</a> of FusionX, Accenture Security<br>JeongOh Kyea <a href="https://twitter.com/kkokkokye">(@kkokkokye)</a> of THEORI|
|[CVE-2019-0759](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0759)|An information disclosure vulnerability exists when the Windows Print Spooler does not properly handle objects in memory, aka 'Windows Print Spooler Information Disclosure Vulnerability'. |[2019-03-12T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2019-0759)|<details>[None](https://support.microsoft.com/help/4489868) - [KB4489868](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489868)<br>[None](https://support.microsoft.com/help/4489871) - [KB4489871](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489871)<br>[None](https://support.microsoft.com/help/4489872) - [KB4489872](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489872)<br>[None](https://support.microsoft.com/help/4489876) - [KB4489876](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489876)<br>[None](https://support.microsoft.com/help/4489878) - [KB4489878](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489878)<br>[None](https://support.microsoft.com/help/4489880) - [KB4489880](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489880)<br>[None](https://support.microsoft.com/help/4489881) - [KB4489881](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489881)<br>[None](https://support.microsoft.com/help/4489882) - [KB4489882](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489882)<br>[None](https://support.microsoft.com/help/4489883) - [KB4489883](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489883)<br>[None](https://support.microsoft.com/help/4489884) - [KB4489884](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489884)<br>[None](https://support.microsoft.com/help/4489885) - [KB4489885](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489885)<br>[None](https://support.microsoft.com/help/4489886) - [KB4489886](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489886)<br>[None](https://support.microsoft.com/help/4489891) - [KB4489891](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489891)<br>[None](https://support.microsoft.com/help/4489899) - [KB4489899](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4489899)</details>|<a href="https://twitter.com/klotxl404">Ke Liu</a> of <a href="https://xlab.tencent.com/en/">Tencent Security Xuanwu Lab</a>|
|[CVE-2016-3239](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3239)|The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via vectors involving filesystem write operations, aka "Windows Print Spooler Elevation of Privilege Vulnerability." |[2016-07-12T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2016-3239)|<details>[None](https://support.microsoft.com/help/3163912) - [KB3163912](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3163912)<br>[None](https://support.microsoft.com/help/3163912) - [KB3163912](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3163912)<br>[None](https://support.microsoft.com/help/3172985) - [KB3172985](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3172985)<br>[None](https://support.microsoft.com/help/3172985) - [KB3172985](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3172985)</details>|None<br><a href="https://linkedin.com/in/shanti-lindstr%c3%b6m-399112a8">Shanti Lindström</a>, Individual|
|[CVE-2016-3238](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3238)|The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows man-in-the-middle attackers to execute arbitrary code by providing a crafted print driver during printer installation, aka "Windows Print Spooler Remote Code Execution Vulnerability." |[2016-07-12T07:00:00Z](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2016-3238)|<details>[None](https://support.microsoft.com/help/3170455) - [KB3170455](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3170455)<br>[None](https://support.microsoft.com/help/3170455) - [KB3170455](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3170455)<br>[None](https://support.microsoft.com/help/3170455) - [KB3170455](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3170455)<br>[None](https://support.microsoft.com/help/3170455) - [KB3170455](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3170455)<br>[None](https://support.microsoft.com/help/3170455) - [KB3170455](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB3170455)<br>[None](https://support.microsoft.com/help/4038777) - [KB4038777](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038777)<br>[None](https://support.microsoft.com/help/4038777) - [KB4038777](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038777)<br>[None](https://support.microsoft.com/help/4038777) - [KB4038777](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038777)<br>[None](https://support.microsoft.com/help/4038777) - [KB4038777](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038777)<br>[None](https://support.microsoft.com/help/4038777) - [KB4038777](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038777)<br>[None](https://support.microsoft.com/help/4038779) - [KB4038779](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038779)<br>[None](https://support.microsoft.com/help/4038779) - [KB4038779](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038779)<br>[None](https://support.microsoft.com/help/4038779) - [KB4038779](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038779)<br>[None](https://support.microsoft.com/help/4038779) - [KB4038779](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038779)<br>[None](https://support.microsoft.com/help/4038779) - [KB4038779](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038779)<br>[None](https://support.microsoft.com/help/4038781) - [KB4038781](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038781)<br>[None](https://support.microsoft.com/help/4038781) - [KB4038781](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038781)<br>[None](https://support.microsoft.com/help/4038782) - [KB4038782](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038782)<br>[None](https://support.microsoft.com/help/4038782) - [KB4038782](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038782)<br>[None](https://support.microsoft.com/help/4038782) - [KB4038782](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038782)<br>[None](https://support.microsoft.com/help/4038782) - [KB4038782](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038782)<br>[None](https://support.microsoft.com/help/4038783) - [KB4038783](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038783)<br>[None](https://support.microsoft.com/help/4038783) - [KB4038783](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038783)<br>[None](https://support.microsoft.com/help/4038786) - [KB4038786](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038786)<br>[None](https://support.microsoft.com/help/4038786) - [KB4038786](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038786)<br>[None](https://support.microsoft.com/help/4038792) - [KB4038792](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038792)<br>[None](https://support.microsoft.com/help/4038792) - [KB4038792](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038792)<br>[None](https://support.microsoft.com/help/4038792) - [KB4038792](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038792)<br>[None](https://support.microsoft.com/help/4038792) - [KB4038792](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038792)<br>[None](https://support.microsoft.com/help/4038793) - [KB4038793](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038793)<br>[None](https://support.microsoft.com/help/4038793) - [KB4038793](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038793)<br>[None](https://support.microsoft.com/help/4038793) - [KB4038793](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038793)<br>[None](https://support.microsoft.com/help/4038793) - [KB4038793](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038793)<br>[None](https://support.microsoft.com/help/4038799) - [KB4038799](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038799)<br>[None](https://support.microsoft.com/help/4038799) - [KB4038799](https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4038799)</details>|<a href="http://blog.vectranetworks.com/blog/microsoft-windows-printer-wateringhole-attack">Nicolas Beauchesne</a> of Vectra Networks|
|[CVE-2013-1339](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1339)|The Print Spooler in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly manage memory during deletion of printer connections, which allows remote authenticated users to execute arbitrary code via a crafted request, aka "Print Spooler Vulnerability." |None|<details></details>||
|[CVE-2013-0011](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0011)|The Print Spooler in Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted print job, aka "Windows Print Spooler Components Vulnerability." |None|<details></details>||
|[CVE-2012-1851](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1851)|Format string vulnerability in the Print Spooler service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted response, aka "Print Spooler Service Format String Vulnerability." |None|<details></details>||
|[CVE-2010-2729](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2729)|The Print Spooler service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when printer sharing is enabled, does not properly validate spooler access permissions, which allows remote attackers to create files in a system directory, and consequently execute arbitrary code, by sending a crafted print request over RPC, as exploited in the wild in September 2010, aka "Print Spooler Service Impersonation Vulnerability." |None|<details></details>||
|[CVE-2009-0230](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0230)|The Windows Print Spooler in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows remote authenticated users to gain privileges via a crafted RPC message that triggers loading of a DLL file from an arbitrary directory, aka "Print Spooler Load Library Vulnerability." |None|<details></details>||
|[CVE-2009-0229](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0229)|The Windows Printing Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows local users to read arbitrary files via a crafted separator page, aka "Print Spooler Read File Vulnerability." |None|<details></details>||
|[CVE-2009-0228](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0228)|Stack-based buffer overflow in the EnumeratePrintShares function in Windows Print Spooler Service (win32spl.dll) in Microsoft Windows 2000 SP4 allows remote printer servers to execute arbitrary code via a crafted ShareName in a response to an RPC request, related to "printing data structures," aka "Buffer Overflow in Print Spooler Vulnerability." |None|<details></details>||
|[CVE-2006-6296](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6296)|The RpcGetPrinterData function in the Print Spooler (spoolsv.exe) service in Microsoft Windows 2000 SP4 and earlier, and possibly Windows XP SP1 and earlier, allows remote attackers to cause a denial of service (memory consumption) via an RPC request that specifies a large 'offered' value (output buffer size), a variant of CVE-2005-3644. |None|<details></details>||
|[CVE-2005-1984](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1984)|Buffer overflow in the Print Spooler service (Spoolsv.exe) for Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code via a malicious message. |None|<details></details>||
|[CVE-2001-1451](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1451)|Memory leak in the SNMP LAN Manager (LANMAN) MIB extension for Microsoft Windows 2000 before SP3, when the Print Spooler is not running, allows remote attackers to cause a denial of service (memory consumption) via a large number of GET or GETNEXT requests. |None|<details></details>||
|[CVE-1999-0899](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0899)|The Windows NT 4.0 print spooler allows a local user to execute arbitrary commands due to inappropriate permissions that allow the user to specify an alternate print provider. |None|<details></details>||
|[CVE-1999-0898](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0898)|Buffer overflows in Windows NT 4.0 print spooler allow remote attackers to gain privileges or cause a denial of service via a malformed spooler request. |None|<details></details>||
CVE table available: Windows-print-spooler-table.md
Building gantt chart...
mermaid
gantt
title Windows print spooler
dateFormat YYYY-MM-DD
axisFormat %Y-%m
section CVE Release Dates
section 2022-Mar
CVE-2022-23284 :cve0, 2022-03-08, 30d
section 2022-Feb
CVE-2022-22718 :cve1, 2022-02-08, 30d
CVE-2022-22717 :cve2, 2022-02-08, 30d
CVE-2022-21999 :cve3, 2022-02-08, 30d
CVE-2022-21997 :cve4, 2022-02-08, 30d
section 2021-Dec
CVE-2021-41333 :cve5, 2021-12-14, 30d
section 2021-Oct
CVE-2021-41332 :cve6, 2021-10-12, 30d
CVE-2021-36970 :cve10, 2021-10-12, 30d
section 2021-Sep
CVE-2021-40447 :cve7, 2021-09-14, 30d
CVE-2021-38671 :cve8, 2021-09-14, 30d
CVE-2021-38667 :cve9, 2021-09-14, 30d
section 2021-Aug
CVE-2021-36958 :cve11, 2021-08-10, 30d
CVE-2021-36947 :cve12, 2021-08-10, 30d
CVE-2021-36936 :cve13, 2021-08-10, 30d
CVE-2021-34483 :cve15, 2021-08-10, 30d
section 2021-Jul
CVE-2021-34527 :cve14, 2021-07-13, 30d
CVE-2021-34481 :cve16, 2021-07-13, 30d
section 2021-Mar
CVE-2021-26878 :cve17, 2021-03-09, 30d
CVE-2021-1640 :cve20, 2021-03-09, 30d
section 2021-Jan
CVE-2021-1695 :cve18, 2021-01-12, 30d
section 2021-Jun
CVE-2021-1675 :cve19, 2021-06-08, 30d
section 2020-Nov
CVE-2020-17042 :cve21, 2020-11-10, 30d
CVE-2020-17014 :cve22, 2020-11-10, 30d
CVE-2020-17001 :cve23, 2020-11-10, 30d
section 2020-Aug
CVE-2020-1337 :cve24, 2020-08-11, 30d
section 2020-May
CVE-2020-1070 :cve25, 2020-05-12, 30d
CVE-2020-1048 :cve26, 2020-05-12, 30d
section 2020-Sep
CVE-2020-1030 :cve27, 2020-09-08, 30d
section 2019-Mar
CVE-2019-0759 :cve28, 2019-03-12, 30d
section 2016-Jul
CVE-2016-3239 :cve29, 2016-07-12, 30d
CVE-2016-3238 :cve30, 2016-07-12, 30d
section 2013
CVE-2013-1339 :cve31, 2013-01-01, 30d
CVE-2013-0011 :cve32, 2013-01-01, 30d
section 2012
CVE-2012-1851 :cve33, 2012-01-01, 30d
section 2010
CVE-2010-2729 :cve34, 2010-01-01, 30d
section 2009
CVE-2009-0230 :cve35, 2009-01-01, 30d
CVE-2009-0229 :cve36, 2009-01-01, 30d
CVE-2009-0228 :cve37, 2009-01-01, 30d
section 2006
CVE-2006-6296 :cve38, 2006-01-01, 30d
section 2005
CVE-2005-1984 :cve39, 2005-01-01, 30d
section 2001
CVE-2001-1451 :cve40, 2001-01-01, 30d
section 1999
CVE-1999-0899 :cve41, 1999-01-01, 30d
CVE-1999-0898 :cve42, 1999-01-01, 30d
Gannt chart available: Windows-print-spooler-gannt.md
gantt
title Windows print spooler
dateFormat YYYY-MM-DD
axisFormat %Y-%m
section CVE Release Dates
section 2022-Mar
CVE-2022-23284 :cve0, 2022-03-08, 30d
section 2022-Feb
CVE-2022-22718 :cve1, 2022-02-08, 30d
CVE-2022-22717 :cve2, 2022-02-08, 30d
CVE-2022-21999 :cve3, 2022-02-08, 30d
CVE-2022-21997 :cve4, 2022-02-08, 30d
section 2021-Dec
CVE-2021-41333 :cve5, 2021-12-14, 30d
section 2021-Oct
CVE-2021-41332 :cve6, 2021-10-12, 30d
CVE-2021-36970 :cve10, 2021-10-12, 30d
section 2021-Sep
CVE-2021-40447 :cve7, 2021-09-14, 30d
CVE-2021-38671 :cve8, 2021-09-14, 30d
CVE-2021-38667 :cve9, 2021-09-14, 30d
section 2021-Aug
CVE-2021-36958 :cve11, 2021-08-10, 30d
CVE-2021-36947 :cve12, 2021-08-10, 30d
CVE-2021-36936 :cve13, 2021-08-10, 30d
CVE-2021-34483 :cve15, 2021-08-10, 30d
section 2021-Jul
CVE-2021-34527 :cve14, 2021-07-13, 30d
CVE-2021-34481 :cve16, 2021-07-13, 30d
section 2021-Jun
CVE-2021-1675 :cve19, 2021-06-08, 30d
section 2021-Mar
CVE-2021-26878 :cve17, 2021-03-09, 30d
CVE-2021-1640 :cve20, 2021-03-09, 30d
section 2021-Jan
CVE-2021-1695 :cve18, 2021-01-12, 30d
section 2020-Nov
CVE-2020-17042 :cve21, 2020-11-10, 30d
CVE-2020-17014 :cve22, 2020-11-10, 30d
CVE-2020-17001 :cve23, 2020-11-10, 30d
section 2020-Sep
CVE-2020-1030 :cve27, 2020-09-08, 30d
section 2020-Aug
CVE-2020-1337 :cve24, 2020-08-11, 30d
section 2020-May
CVE-2020-1070 :cve25, 2020-05-12, 30d
CVE-2020-1048 :cve26, 2020-05-12, 30d
section 2019-Mar
CVE-2019-0759 :cve28, 2019-03-12, 30d
section 2016-Jul
CVE-2016-3239 :cve29, 2016-07-12, 30d
CVE-2016-3238 :cve30, 2016-07-12, 30d
section 2013-Jan
CVE-2013-1339 :cve31, 2013-01-01, 30d
CVE-2013-0011 :cve32, 2013-01-01, 30d
section 2012-Jan
CVE-2012-1851 :cve33, 2012-01-01, 30d
section 2010-Jan
CVE-2010-2729 :cve34, 2010-01-01, 30d
section 2009-Jan
CVE-2009-0230 :cve35, 2009-01-01, 30d
CVE-2009-0229 :cve36, 2009-01-01, 30d
CVE-2009-0228 :cve37, 2009-01-01, 30d
section 2006-Jan
CVE-2006-6296 :cve38, 2006-01-01, 30d
section 2005-Jan
CVE-2005-1984 :cve39, 2005-01-01, 30d
section 2001-Jan
CVE-2001-1451 :cve40, 2001-01-01, 30d
section 1999-Jan
CVE-1999-0899 :cve41, 1999-01-01, 30d
CVE-1999-0898 :cve42, 1999-01-01, 30d
CVE | Description | Release Date | KBs | Acknowledgments |
---|---|---|---|---|
CVE-2022-23284 | Windows Print Spooler Elevation of Privilege Vulnerability. | 2022-03-08T08:00:00Z | 10.0.10240.19235 - KB5011491 10.0.14393.5006 - KB5011495 10.0.17763.2686 - KB5011503 10.0.18363.2158 - KB5011485 10.0.19042.1586 - KB5011487 10.0.19043.1586 - KB5011487 10.0.19044.1586 - KB5011487 10.0.20348.580 - KB5011580 10.0.20348.587 - KB5011497 10.0.22000.556 - KB5011493 6.2.9200.23639 - KB5011527 6.2.9200.23645 - KB5011535 6.3.9600.20303 - KB5011560 6.3.9600.20303 - KB5011564 |
JeongOh Kyea with THEORI |
CVE-2022-22718 | Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21997, CVE-2022-21999, CVE-2022-22717. | 2022-02-08T08:00:00Z | 10.0.10240.19204 - KB5010358 10.0.14393.4946 - KB5010359 10.0.17763.2565 - KB5010351 10.0.18363.2094 - KB5010345 10.0.19042.1526 - KB5010342 10.0.19043.1526 - KB5010342 10.0.19044.1526 - KB5010342 10.0.20348.524 - KB5010354 10.0.20348.525 - KB5010456 10.0.22000.493 - KB5010386 6.0.6003.21372 - KB5010403 6.0.6003.21374 - KB5010384 6.1.7601.25860 - KB5010404 6.1.7601.25860 - KB5010422 6.2.9200.23605 - KB5010392 6.2.9200.23605 - KB5010412 6.3.9600.20269 - KB5010395 6.3.9600.20269 - KB5010419 |
NSFOCUS TIANJI Lab via TianfuCup |
CVE-2022-22717 | Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21997, CVE-2022-21999, CVE-2022-22718. | 2022-02-08T08:00:00Z | 10.0.10240.19204 - KB5010358 10.0.14393.4946 - KB5010359 10.0.17763.2565 - KB5010351 10.0.18363.2094 - KB5010345 10.0.19042.1526 - KB5010342 10.0.19043.1526 - KB5010342 10.0.19044.1526 - KB5010342 10.0.20348.524 - KB5010354 10.0.20348.525 - KB5010456 10.0.22000.493 - KB5010386 6.0.6003.21372 - KB5010403 6.0.6003.21374 - KB5010384 6.1.7601.25860 - KB5010404 6.1.7601.25860 - KB5010422 6.2.9200.23605 - KB5010392 6.2.9200.23605 - KB5010412 6.3.9600.20269 - KB5010395 6.3.9600.20269 - KB5010419 |
Thibault Van Geluwe de Berlaere with Mandiant |
CVE-2022-21999 | Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21997, CVE-2022-22717, CVE-2022-22718. | 2022-02-08T08:00:00Z | 10.0.10240.19204 - KB5010358 10.0.14393.4946 - KB5010359 10.0.17763.2565 - KB5010351 10.0.18363.2094 - KB5010345 10.0.19042.1526 - KB5010342 10.0.19043.1526 - KB5010342 10.0.19044.1526 - KB5010342 10.0.20348.524 - KB5010354 10.0.20348.525 - KB5010456 10.0.22000.493 - KB5010386 6.0.6003.21372 - KB5010403 6.0.6003.21374 - KB5010384 6.1.7601.25860 - KB5010404 6.1.7601.25860 - KB5010422 6.2.9200.23605 - KB5010392 6.2.9200.23605 - KB5010412 6.3.9600.20269 - KB5010395 6.3.9600.20269 - KB5010419 |
Xuefeng Li (@lxf02942370) & Zhiniang Peng (@edwardzpeng) of Sangfor Via Tianfu CUP Oliver Lyak with Institut For Cyber Risk |
CVE-2022-21997 | Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21999, CVE-2022-22717, CVE-2022-22718. | 2022-02-08T08:00:00Z | 10.0.10240.19204 - KB5010358 10.0.14393.4946 - KB5010359 10.0.17763.2565 - KB5010351 10.0.18363.2094 - KB5010345 10.0.19042.1526 - KB5010342 10.0.19043.1526 - KB5010342 10.0.19044.1526 - KB5010342 10.0.20348.524 - KB5010354 10.0.20348.525 - KB5010456 10.0.22000.493 - KB5010386 6.0.6003.21372 - KB5010403 6.0.6003.21374 - KB5010384 6.1.7601.25860 - KB5010404 6.1.7601.25860 - KB5010422 6.2.9200.23605 - KB5010392 6.2.9200.23605 - KB5010412 6.3.9600.20269 - KB5010395 6.3.9600.20269 - KB5010419 |
Bo Wu |
CVE-2021-41333 | Windows Print Spooler Elevation of Privilege Vulnerability | 2021-12-14T08:00:00Z | 10.0.10240.19145 - KB5008230 10.0.14393.4825 - KB5008207 10.0.17763.2366 - KB5008218 10.0.18363.1977 - KB5008206 10.0.19041.1415 - KB5008212 10.0.19042.1415 - KB5008212 10.0.19043.1415 - KB5008212 10.0.19044.1415 - KB5008212 10.0.20348.405 - KB5008223 10.0.22000.376 - KB5008215 6.0.6003.21309 - KB5008271 6.0.6003.21309 - KB5008274 6.1.7601.25796 - KB5008244 6.1.7601.25796 - KB5008282 6.2.9200.23540 - KB5008255 6.2.9200.23545 - KB5008277 6.3.9600.20207 - KB5008263 6.3.9600.20207 - KB5008285 |
James Forshaw of Google Project Zero Abdelhamid Naceri working with Trend Micro Zero Day Initiative |
CVE-2021-41332 | Windows Print Spooler Information Disclosure Vulnerability | 2021-10-12T07:00:00Z | 10.0.10240.19086 - KB5006675 10.0.14393.4704 - KB5006669 10.0.17763.2237 - KB5006672 10.0.18363.1854 - KB5006667 10.0.19041.1288 - KB5006670 10.0.19042.1288 - KB5006670 10.0.20348.288 - KB5006699 10.0.22000.258 - KB5006674 6.0.6003.21251 - KB5006715 6.0.6003.21251 - KB5006736 6.1.7601.25740 - KB5006728 6.1.7601.25740 - KB5006743 6.2.9200.23490 - KB5006732 6.2.9200.23490 - KB5006739 6.3.9600.20144 - KB5006714 6.3.9600.20144 - KB5006729 |
Liubenjin with Codesafe Team of Legendsec at Qi'anxin Group |
CVE-2021-40447 | Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38667, CVE-2021-38671. | 2021-09-14T07:00:00Z | 10.0.10240.19060 - KB5005569 10.0.14393.4651 - KB5005573 10.0.17763.2183 - KB5005568 10.0.18363.1801 - KB5005566 10.0.19043.1237 - KB5005565 10.0.20348.230 - KB5005575 6.0.6003.21218 - KB5005606 6.0.6003.21218 - KB5005618 6.1.7601.25712 - KB5005615 6.1.7601.25712 - KB5005633 6.2.9200.23462 - KB5005607 6.2.9200.23462 - KB5005623 6.3.9600.20120 - KB5005613 6.3.9600.20120 - KB5005627 |
|
CVE-2021-38671 | Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38667, CVE-2021-40447. | 2021-09-14T07:00:00Z | 10.0.10240.19060 - KB5005569 10.0.14393.4651 - KB5005573 10.0.17763.2183 - KB5005568 10.0.18363.1801 - KB5005566 10.0.19043.1237 - KB5005565 10.0.20348.230 - KB5005575 6.0.6003.21218 - KB5005606 6.0.6003.21218 - KB5005618 6.1.7601.25712 - KB5005615 6.1.7601.25712 - KB5005633 6.2.9200.23462 - KB5005607 6.2.9200.23462 - KB5005623 6.3.9600.20120 - KB5005613 6.3.9600.20120 - KB5005627 |
Thibault Van Geluwe de Berlaere with Mandiant |
CVE-2021-38667 | Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-38671, CVE-2021-40447. | 2021-09-14T07:00:00Z | 10.0.10240.19060 - KB5005569 10.0.14393.4651 - KB5005573 10.0.17763.2183 - KB5005568 10.0.18363.1801 - KB5005566 10.0.19043.1237 - KB5005565 10.0.20348.230 - KB5005575 6.0.6003.21218 - KB5005606 6.0.6003.21218 - KB5005618 6.1.7601.25712 - KB5005615 6.1.7601.25712 - KB5005633 6.2.9200.23462 - KB5005607 6.2.9200.23462 - KB5005623 6.3.9600.20120 - KB5005613 6.3.9600.20120 - KB5005627 |
|
CVE-2021-36970 | Windows Print Spooler Spoofing Vulnerability | 2021-10-12T07:00:00Z | 10.0.10240.19086 - KB5006675 10.0.14393.4704 - KB5006669 10.0.17763.2237 - KB5006672 10.0.18363.1854 - KB5006667 10.0.19041.1288 - KB5006670 10.0.19042.1288 - KB5006670 10.0.20348.288 - KB5006699 10.0.22000.258 - KB5006674 6.0.6003.21251 - KB5006715 6.0.6003.21251 - KB5006736 6.1.7601.25740 - KB5006728 6.1.7601.25740 - KB5006743 6.2.9200.23490 - KB5006732 6.2.9200.23490 - KB5006739 6.3.9600.20144 - KB5006714 6.3.9600.20144 - KB5006729 |
XueFeng Li and Zhiniang Peng with Sangfor |
CVE-2021-36958 | Windows Print Spooler Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-36936, CVE-2021-36947. | 2021-08-10T07:00:00Z | 10.0.10240.19060 - KB5005569 10.0.14393.4651 - KB5005573 10.0.17763.2183 - KB5005568 10.0.18363.1801 - KB5005566 10.0.19041.1237 - KB5005565 10.0.19042.1237 - KB5005565 10.0.19043.1237 - KB5005565 6.0.6003.21218 - KB5005606 6.0.6003.21218 - KB5005618 6.1.7601.25712 - KB5005615 6.1.7601.25712 - KB5005633 6.2.9200.23462 - KB5005607 6.2.9200.23462 - KB5005623 6.3.9600.20120 - KB5005613 6.3.9600.20120 - KB5005627 |
Victor Mata of FusionX, Accenture Security |
CVE-2021-36947 | Windows Print Spooler Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-36936, CVE-2021-36958. | 2021-08-10T07:00:00Z | 10.0.10240.19022 - KB5005040 10.0.14393.4583 - KB5005043 10.0.17763.2114 - KB5005030 10.0.18363.1734 - KB5005031 10.0.19041.1165 - KB5005033 10.0.19042.1165 - KB5005033 10.0.19043.1165 - KB5005033 6.0.6003.21192 - KB5005090 6.0.6003.21192 - KB5005095 6.1.7601.25685 - KB5005088 6.1.7601.25685 - KB5005089 6.2.9200.23435 - KB5005094 6.2.9200.23435 - KB5005099 6.3.9600.20094 - KB5005076 6.3.9600.20094 - KB5005106 |
|
CVE-2021-36936 | Windows Print Spooler Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-36947, CVE-2021-36958. | 2021-08-10T07:00:00Z | 10.0.10240.19022 - KB5005040 10.0.14393.4583 - KB5005043 10.0.17763.2114 - KB5005030 10.0.18363.1734 - KB5005031 10.0.19041.1165 - KB5005033 10.0.19042.1165 - KB5005033 10.0.19043.1165 - KB5005033 6.0.6003.21192 - KB5005090 6.0.6003.21192 - KB5005095 6.1.7601.25685 - KB5005088 6.1.7601.25685 - KB5005089 6.2.9200.23435 - KB5005094 6.2.9200.23435 - KB5005099 6.3.9600.20094 - KB5005076 6.3.9600.20094 - KB5005106 |
|
CVE-2021-34527 | Windows Print Spooler Remote Code Execution Vulnerability | 2021-07-13T07:00:00Z | 10.0.10240.18969 - KB5004950 10.0.17763.2029 - KB5004947 10.0.18363.1646 - KB5004946 10.0.19041.1083 - KB5004945 10.0.19042.1083 - KB5004945 10.0.19043.1083 - KB5004945 6.0.6003.21138 - KB5004955 6.0.6003.21138 - KB5004959 6.1.7601.25633 - KB5004951 6.1.7601.25633 - KB5004953 6.3.9600.20046 - KB5004954 6.3.9600.20046 - KB5004958 None - KB5004948 None - KB5004956 None - KB5004960 |
Zhiniang Peng (@edwardzpeng) and Xuefeng Li (@lxf02942370) |
CVE-2021-34483 | Windows Print Spooler Elevation of Privilege Vulnerability | 2021-08-10T07:00:00Z | 10.0.10240.19022 - KB5005040 10.0.14393.4583 - KB5005043 10.0.17763.2114 - KB5005030 10.0.18363.1734 - KB5005031 10.0.19041.1165 - KB5005033 10.0.19042.1165 - KB5005033 10.0.19043.1165 - KB5005033 6.0.6003.21192 - KB5005090 6.0.6003.21192 - KB5005095 6.1.7601.25685 - KB5005088 6.1.7601.25685 - KB5005089 6.2.9200.23435 - KB5005094 6.2.9200.23435 - KB5005099 6.3.9600.20094 - KB5005076 6.3.9600.20094 - KB5005106 |
Thibault van Geluwe Victor Mata of FusionX, Accenture Security |
CVE-2021-34481 | Windows Print Spooler Elevation of Privilege Vulnerability | 2021-07-13T07:00:00Z | 10.0.10240.19022 - KB5005040 10.0.14393.4583 - KB5005043 10.0.17763.2114 - KB5005030 10.0.18363.1734 - KB5005031 10.0.19041.1165 - KB5005033 10.0.19042.1165 - KB5005033 10.0.19043.1165 - KB5005033 6.0.6003.21192 - KB5005090 6.0.6003.21192 - KB5005095 6.1.7601.25685 - KB5005088 6.1.7601.25685 - KB5005089 6.2.9200.23435 - KB5005094 6.2.9200.23435 - KB5005099 6.3.9600.20094 - KB5005076 6.3.9600.20094 - KB5005106 |
Jacob Baines |
CVE-2021-26878 | Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1640. | 2021-03-09T08:00:00Z | x None This vulnerability was discovered by Bryan de Houwer and Thibault van Geluwe de Berlaere. |
|
CVE-2021-1695 | Windows Print Spooler Elevation of Privilege Vulnerability | 2021-01-12T08:00:00Z | JeongOh Kyea of THEORI working with Trend Micro Zero Day Initiative | |
CVE-2021-1675 | Windows Print Spooler Elevation of Privilege Vulnerability | 2021-06-08T07:00:00Z | 10.0.10240.18967 - KB5003687 10.0.14393.4467 - KB5003638 10.0.17763.1999 - KB5003646 10.0.18363.1621 - KB5003635 10.0.19041.1052 - KB5003637 10.0.19042.1052 - KB5003637 10.0.19043.1052 - KB5003637 6.0.6003.21137 - KB5003661 6.0.6003.21137 - KB5003695 6.1.7601.25632 - KB5003667 6.1.7601.25632 - KB5003694 6.2.9200.23372 - KB5003696 6.2.9200.23372 - KB5003697 6.3.9600.20044 - KB5003681 6.3.9600.20045 - KB5003671 |
Yunhai Zhang of NSFOCUS TIANJI LAB https://www.nsfocus.com.cn/ Piotr Madej of AFINE Zhipeng Huo (@R3dF09) of Tencent Security Xuanwu Lab |
CVE-2021-1640 | Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26878. | 2021-03-09T08:00:00Z | Blaz Satler and Ziga Sumenjak of 0patch JeongOh Kyea (@kkokkokye) of THEORI working with Trend Micro Zero Day Initiative |
|
CVE-2020-17042 | Windows Print Spooler Remote Code Execution Vulnerability | 2020-11-10T08:00:00Z | HyungSeok Han(@DaramG) and JeongOh Kyea(@kkokkokye) of THEORI | |
CVE-2020-17014 | Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17001. | 2020-11-10T08:00:00Z | Zhiniang Peng (@edwardzpeng & Xuefeng Li (@lxf02942370 JeongOh Kyea (@kkokkokye) of THEORI working with Trend Micro Zero Day Initiative |
|
CVE-2020-17001 | Windows Print Spooler Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-17014. | 2020-11-10T08:00:00Z | James Forshaw of Google Project Zero | |
CVE-2020-1337 | An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. | 2020-08-11T07:00:00Z | Peleg Hadar (@peleghd) and Tomer Bar of SafeBreach Labs. EoP Master working with iDefense Labs, Accenture. Vte. Javier García Mayén Junyu Zhou (@md5_salt) of Tencent Security Xuanwu Lab and Wenxu Wu Anonymous working with Trend Micro's Zero Day Initiative Alex Ionescu, CrowdStrike Inc. Paolo Stagno aka VoidSec Zhiniang Peng (@edwardzpeng) & Xuefeng Li |
|
CVE-2020-1070 | An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1048. | 2020-05-12T07:00:00Z | JeongOh Kyea of THEORI | |
CVE-2020-1048 | An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1070. | 2020-05-12T07:00:00Z | Peleg Hadar (@peleghd) and Tomer Bar of SafeBreach Labs | |
CVE-2020-1030 | An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. | 2020-09-08T07:00:00Z | Victor Mata of FusionX, Accenture Security JeongOh Kyea (@kkokkokye) of THEORI |
|
CVE-2019-0759 | An information disclosure vulnerability exists when the Windows Print Spooler does not properly handle objects in memory, aka 'Windows Print Spooler Information Disclosure Vulnerability'. | 2019-03-12T07:00:00Z | Ke Liu of Tencent Security Xuanwu Lab | |
CVE-2016-3239 | The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via vectors involving filesystem write operations, aka "Windows Print Spooler Elevation of Privilege Vulnerability." | 2016-07-12T07:00:00Z | None Shanti Lindström, Individual |
|
CVE-2016-3238 | The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows man-in-the-middle attackers to execute arbitrary code by providing a crafted print driver during printer installation, aka "Windows Print Spooler Remote Code Execution Vulnerability." | 2016-07-12T07:00:00Z | None - KB3170455 None - KB3170455 None - KB3170455 None - KB3170455 None - KB3170455 None - KB4038777 None - KB4038777 None - KB4038777 None - KB4038777 None - KB4038777 None - KB4038779 None - KB4038779 None - KB4038779 None - KB4038779 None - KB4038779 None - KB4038781 None - KB4038781 None - KB4038782 None - KB4038782 None - KB4038782 None - KB4038782 None - KB4038783 None - KB4038783 None - KB4038786 None - KB4038786 None - KB4038792 None - KB4038792 None - KB4038792 None - KB4038792 None - KB4038793 None - KB4038793 None - KB4038793 None - KB4038793 None - KB4038799 None - KB4038799 |
Nicolas Beauchesne of Vectra Networks |
CVE-2013-1339 | The Print Spooler in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly manage memory during deletion of printer connections, which allows remote authenticated users to execute arbitrary code via a crafted request, aka "Print Spooler Vulnerability." | None | ||
CVE-2013-0011 | The Print Spooler in Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted print job, aka "Windows Print Spooler Components Vulnerability." | None | ||
CVE-2012-1851 | Format string vulnerability in the Print Spooler service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted response, aka "Print Spooler Service Format String Vulnerability." | None | ||
CVE-2010-2729 | The Print Spooler service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when printer sharing is enabled, does not properly validate spooler access permissions, which allows remote attackers to create files in a system directory, and consequently execute arbitrary code, by sending a crafted print request over RPC, as exploited in the wild in September 2010, aka "Print Spooler Service Impersonation Vulnerability." | None | ||
CVE-2009-0230 | The Windows Print Spooler in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows remote authenticated users to gain privileges via a crafted RPC message that triggers loading of a DLL file from an arbitrary directory, aka "Print Spooler Load Library Vulnerability." | None | ||
CVE-2009-0229 | The Windows Printing Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows local users to read arbitrary files via a crafted separator page, aka "Print Spooler Read File Vulnerability." | None | ||
CVE-2009-0228 | Stack-based buffer overflow in the EnumeratePrintShares function in Windows Print Spooler Service (win32spl.dll) in Microsoft Windows 2000 SP4 allows remote printer servers to execute arbitrary code via a crafted ShareName in a response to an RPC request, related to "printing data structures," aka "Buffer Overflow in Print Spooler Vulnerability." | None | ||
CVE-2006-6296 | The RpcGetPrinterData function in the Print Spooler (spoolsv.exe) service in Microsoft Windows 2000 SP4 and earlier, and possibly Windows XP SP1 and earlier, allows remote attackers to cause a denial of service (memory consumption) via an RPC request that specifies a large 'offered' value (output buffer size), a variant of CVE-2005-3644. | None | ||
CVE-2005-1984 | Buffer overflow in the Print Spooler service (Spoolsv.exe) for Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code via a malicious message. | None | ||
CVE-2001-1451 | Memory leak in the SNMP LAN Manager (LANMAN) MIB extension for Microsoft Windows 2000 before SP3, when the Print Spooler is not running, allows remote attackers to cause a denial of service (memory consumption) via a large number of GET or GETNEXT requests. | None | ||
CVE-1999-0899 | The Windows NT 4.0 print spooler allows a local user to execute arbitrary commands due to inappropriate permissions that allow the user to specify an alternate print provider. | None | ||
CVE-1999-0898 | Buffer overflows in Windows NT 4.0 print spooler allow remote attackers to gain privileges or cause a denial of service via a malformed spooler request. | None |
- Add CVE chart use cases
- CVE keyword
- CVE list (only return strict cves)
- KB keyword
- Researcher keyword
- CVE keyword
- offer tables based on mitre cves alone and enhanced MSRC data
- add command line usage and argparse
- Add tab complete features
- build json data with suggestions
- add date range filtering
- remove mitre html scraping, replace with JSON from https://nvd.nist.gov/vuln/data-feeds#APIS
- separate data collection and cve-markdown-charts