Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2022-21999

Description

Windows Print Spooler Elevation of Privilege Vulnerability

POC

Reference

- http://packetstormsecurity.com/files/166344/Windows-SpoolFool-Privilege-Escalation.html

Github

- https://github.com/0x7n6/OSCP

- https://github.com/0xStrygwyr/OSCP-Guide

- https://github.com/0xZipp0/OSCP

- https://github.com/0xsyr0/OSCP

- https://github.com/AMatheusFeitosaM/OSCP-Cheat

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/Awrrays/Pentest-Tips

- https://github.com/EnriqueSanchezdelVillar/NotesHck

- https://github.com/Faizan-Khanx/OSCP

- https://github.com/Ly0nt4r/OSCP

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/NaInSec/CVE-PoC-in-GitHub

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/ReflectedThanatos/OSCP-cheatsheet

- https://github.com/S3cur3Th1sSh1t/My-starred-Repositories

- https://github.com/SYRTI/POC_to_review

- https://github.com/SantoriuHen/NotesHck

- https://github.com/SenukDias/OSCP_cheat

- https://github.com/SirElmard/ethical_hacking

- https://github.com/Uriel-SG/HTB-Support

- https://github.com/VishuGahlyan/OSCP

- https://github.com/VulnerabilityResearchCentre/patch-diffing-in-the-dark

- https://github.com/WhooAmii/POC_to_review

- https://github.com/ahmetfurkans/CVE-2022-22718

- https://github.com/binganao/vulns-2022

- https://github.com/changtraixuqang97/changtraixuqang97

- https://github.com/clearbluejar/cve-markdown-charts

- https://github.com/daphne97/daphne97

- https://github.com/duytruongpham/duytruongpham

- https://github.com/e-hakson/OSCP

- https://github.com/eljosep/OSCP-Guide

- https://github.com/exfilt/CheatSheet

- https://github.com/fazilbaig1/oscp

- https://github.com/francevarotz98/WinPrintSpoolerSaga

- https://github.com/hktalent/TOP

- https://github.com/hktalent/bug-bounty

- https://github.com/jitmondal1/OSCP

- https://github.com/k0mi-tg/CVE-POC

- https://github.com/k8gege/Ladon

- https://github.com/kgwanjala/oscp-cheatsheet

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/ly4k/SpoolFool

- https://github.com/manas3c/CVE-POC

- https://github.com/nitishbadole/oscp-note-3

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/open-source-agenda/new-open-source-projects

- https://github.com/oscpname/OSCP_cheat

- https://github.com/parth45/cheatsheet

- https://github.com/revanmalang/OSCP

- https://github.com/sarutobi12/sarutobi12

- https://github.com/soosmile/POC

- https://github.com/sponkmonk/Ladon_english_update

- https://github.com/taielab/awesome-hacking-lists

- https://github.com/trhacknon/Pocingit

- https://github.com/txuswashere/OSCP

- https://github.com/tzwlhack/SpoolFool

- https://github.com/whoforget/CVE-POC

- https://github.com/xhref/OSCP

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/youwizard/CVE-POC

- https://github.com/zecool/cve