mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-19 17:30:12 +00:00
4.4 KiB
4.4 KiB
CVE-2020-1048
Description
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1070.
POC
Reference
- http://packetstormsecurity.com/files/158222/Windows-Print-Spooler-Privilege-Escalation.html
- http://packetstormsecurity.com/files/159217/Microsoft-Spooler-Local-Privilege-Elevation.html
Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/BC-SECURITY/Invoke-PrintDemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CnHack3r/Penetration_PoC
- https://github.com/Cruxer8Mech/Idk
- https://github.com/Diverto/IPPrintC2
- https://github.com/EchoGin404/-
- https://github.com/EchoGin404/gongkaishouji
- https://github.com/Esther7171/Ice
- https://github.com/Karneades/awesome-vulnerabilities
- https://github.com/Ken-Abruzzi/CVE-2020-1048
- https://github.com/Moj0krr/PrinterDemon
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/SafeBreach-Labs/Spooler
- https://github.com/ScioShield/sibyl-gpt
- https://github.com/Tyro-Shan/gongkaishouji
- https://github.com/VoidSec/CVE-2020-1337
- https://github.com/Y3A/cve-2020-1048
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
- https://github.com/ZTK-009/Penetration_PoC
- https://github.com/airbus-cert/Splunk-ETW
- https://github.com/alphaSeclab/sec-daily-2020
- https://github.com/anquanscan/sec-tools
- https://github.com/bakedmuffinman/Neo23x0-sysmon-config
- https://github.com/bhassani/Recent-CVE
- https://github.com/clearbluejar/cve-markdown-charts
- https://github.com/cve-north-stars/cve-north-stars.github.io
- https://github.com/deadjakk/patch-checker
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/francevarotz98/WinPrintSpoolerSaga
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/huike007/penetration_poc
- https://github.com/huike007/poc
- https://github.com/ionescu007/PrintDemon
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/math1as/CVE-2020-1337-exploit
- https://github.com/neofito/CVE-2020-1337
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/shubham0d/CVE-2020-1048
- https://github.com/soosmile/POC
- https://github.com/thalpius/Microsoft-PrintDemon-Vulnerability
- https://github.com/viszsec/CyberSecurity-Playground
- https://github.com/wh0Nsq/Invoke-PrintDemon
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xnxr/PrinterDemon
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
- https://github.com/yedada-wei/-
- https://github.com/yedada-wei/gongkaishouji
- https://github.com/zveriu/CVE-2009-0229-PoC