### [CVE-2016-3238](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3238) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The Print Spooler service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows man-in-the-middle attackers to execute arbitrary code by providing a crafted print driver during printer installation, aka "Windows Print Spooler Remote Code Execution Vulnerability." ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/RPP-IM-2021/IM113-2016-Cvetkov-Katarina - https://github.com/clearbluejar/cve-markdown-charts - https://github.com/nirdev/CVE-2016-3749-PoC - https://github.com/pyiesone/CVE-2016-3238-PoC - https://github.com/tarrell13/CVE-Reporter