Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows | 10 Version 1803 for 32-bit Systems | - | |
| Microsoft | Windows Server | version 1803 (Core Installation) | - | |
| Microsoft | Windows 10 Version 1909 for 32-bit Systems | unspecified | - | |
| Microsoft | Windows 10 Version 1909 for x64-based Systems | unspecified | - | |
| Microsoft | Windows 10 Version 1909 for ARM64-based Systems | unspecified | - | |
| Microsoft | Windows Server, version 1909 (Server Core installation) | unspecified | - | |
| Microsoft | Windows 10 Version 1903 for 32-bit Systems | unspecified | - | |
| Microsoft | Windows 10 Version 1903 for x64-based Systems | unspecified | - | |
| Microsoft | Windows 10 Version 1903 for ARM64-based Systems | unspecified | - | |
| Microsoft | Windows Server, version 1903 (Server Core installation) | unspecified | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | POC exploit code for CVE-2020-1048(PrintDemon) | https://github.com/shubham0d/CVE-2020-1048 | POC Details |
| 2 | An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. | https://github.com/Ken-Abruzzi/CVE-2020-1048 | POC Details |
| 3 | spoolsv.exe arb file write poc | https://github.com/Y3A/cve-2020-1048 | POC Details |
| 4 | PrintDemon (CVE-2020-1048) Privilege Escalation | https://github.com/talsim/printDemon2system | POC Details |
No public POC found.
Login to generate AI POCNo comments yet