CVE STALKER

CVE-2020-1048

CVSS5
DESCRIPTIONAn elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1070.
HEAT SCORE1764

WORDS

TWEETS

DATE TWEETS USER
2021-06-03 20:10:04CVE-2020-1048 Windows Print Spooler Elevation of Privilege Vulnerability. An ele... https://t.co/fSPCpYCBdl Cust… https://t.co/SDcHhw7PV1 http://vulmon.com/vulnerabilitydetails?qid=CVE-2020-1048 https://twitter.com/i/web/status/1400545277040381955VulmonFeeds
2021-03-08 20:50:05SafeBreach Labs discovered an elevation of privilege vulnerability (CVE-2020-1048) in the Windows print spooler mec… https://t.co/bEnu8Qq2DZ https://twitter.com/i/web/status/1369025935496843266safebreach
2020-11-11 12:12:21It looks like Microsoft has finally fixed the root cause of CVE-2020-1048, CVE-2020-1337, CVE-2020-17001. The "IsS… https://t.co/Dj6TFYBuaQ https://twitter.com/i/web/status/1326494985747886081peleghd
2020-09-29 19:30:05Behavior Detection rules for some Print Spooler related PrivEsc vulns exploitation CVE-2020-1048, CVE-2020-1337 and… https://t.co/JvwcHQO4ej https://twitter.com/i/web/status/1311024361638449154SBousseaden
2020-09-20 09:40:03Oh, a nice new exploit in #Metasploit for CVE-2020-1048 (MS May Patch Tuesday). https://t.co/hJG9aIrEGw https://t.co/8fF4DJ7FcM https://t.me/avleonovcom/790leonov_av
2020-09-18 08:10:05New post: CVE-2020-1048 Microsoft Windows Print Spooler 安全漏洞 -漏洞情报、漏洞详情、安全漏洞、CVE https://t.co/wXUJHU67JT安全漏洞-漏洞情报、漏洞详情、安全/ https://reportcybercrime.com/cve-2020-1048-microsoft-windows-print-spooler-digitpol_cyber
2020-09-07 18:40:05CVE-2020-1048 https://t.co/S4tjxeJkyL #HarsiaInfo https://har-sia.info/CVE-2020-1048.htmlHar_sia
2020-08-13 10:45:34Unpatched bug (CVE-2020-1048) in Windows print spooler lets malware run as admin via @BleepinComputer #Proficio… https://t.co/5v1S4cMjX3 https://twitter.com/i/web/status/1293577988710301700proficioinc
2020-08-13 06:00:10CVE-2020-1048 bypass: binary planting PoC https://t.co/PDvKrckDIK #Pentesting #CVE #Windows #Vulnerability… https://t.co/gAXk8eMe1t https://github.com/neofito/CVE-2020-1337 https://twitter.com/i/web/status/1293787190925893634ptracesecurity
2020-08-12 18:40:03CVE-2020-1337 is CVE-2020-1048 #PrintDemon #CyberAwareness #cybersecurity #infosec #ciberseguridad https://t.co/SscQ5HCVbb https://voidsec.com/cve-2020-1337-printdemon-is-dead-long-live-printdemon/ArcanistMX
2020-08-12 08:11:20CVE-2020-1337 MS-Windows Print Spooler Elevation of Privilege - Binary Planting (CVE-2020-1048 bypass) Place a ma… https://t.co/88EMXoyy9k https://twitter.com/i/web/status/1293457464268976134wugeej
2020-08-12 07:20:16Print Spoolerの権限昇格(CVE-2020-1337)については5月に修正されたCVE-2020-1048が不十分だったとのこと。 Zero Day Initiative — Windows Print Spoole… https://t.co/sXulAfA4jN https://twitter.com/i/web/status/1293446516808364032autumn_good_35
2020-08-12 06:40:08CVE-2020-1337 - Binary Planting (CVE-2020-1048 bypass) https://t.co/eYsvl40QqQ https://github.com/neofito/CVE-2020-1337FlatL1ne
2020-08-12 00:40:03GitHub - neofito/CVE-2020-1337: CVE-2020-1048 bypass: binary planting PoC - https://t.co/TzZPiEfM2o https://github.com/neofito/CVE-2020-1337piedpiper1616
2020-08-12 00:20:05Bypassing CVE-2020-1048 patch Beautiful clean TOCTOU demonstration IMHO great for computer security course git too… https://t.co/glKFKtRj1y https://twitter.com/i/web/status/1293340148655181826daniel_bilar
2020-08-11 23:20:04SafeBreach Labs found the CVE-2020-1048 in January, then found a bypass to the path for it. That's now fixed in CVE… https://t.co/syk2a4AvdA https://twitter.com/i/web/status/1293324094545461249safebreach
2020-08-11 19:10:10My bypass to the CVE-2020-1048 was assigned the CVE-2020-1337 (shared with @aionescu, @peleghd and @Void_Sec) :-) https://t.co/LRMuL8eYJF https://github.com/neofito/CVE-2020-1337neosysforensics
2020-08-11 18:50:03CVE-2020-1337 is CVE-2020-1048 (aka PrintDemon) with a TOCTOU. PoC: mkdir C:\test Add-PrinterPort -Name c:\test\ual… https://t.co/5IPRw01rPm https://twitter.com/i/web/status/1293258113169215492FlatL1ne
2020-08-11 18:50:03CVE-2020-1337 is CVE-2020-1048 (aka PrintDemon) with a TOCTOU. PoC: mkdir C:\test Add-PrinterPort -Name c:\test\ual… https://t.co/OwHsA8AYp9 https://twitter.com/i/web/status/1293257945342517249FlatL1ne
2020-08-11 18:10:04CVE-2020-1337 is CVE-2020-1048 (aka PrintDemon) with a TOCTOU. PoC: mkdir C:\test Add-PrinterPort -Name c:\test\ual… https://t.co/3sETFpGCWG https://twitter.com/i/web/status/1293246183830413319clavoillotte
2020-08-11 18:10:02@jonasLyk Indeed, the rest is the same as CVE-2020-1048.clavoillotte
2020-08-11 13:30:05🆕🚨 CVE-2020-1337 (lol) #Stuxnet #0day Bypasses the patch for CVE-2020-1048 - an escalation of privileges bug in Wi… https://t.co/iO0CgZ7E0D https://twitter.com/i/web/status/1293176504403337216BushidoToken
2020-08-09 18:10:03#SafeBreach Labs has found a new bug named CVE-2020-1048 in Windows Print Spooler, an OS that manages printing proc… https://t.co/61RfJ1MzUj https://twitter.com/i/web/status/1292521023821275136briflynews
2020-08-08 09:00:02Researchers flag two zero-days in Windows Print Spooler In May 2020, Microsoft patched CVE-2020-1048, a privilege e… https://t.co/8nVCerv2vJ https://twitter.com/i/web/status/1292022252016476163InfoSecHotSpot
2020-08-08 06:30:03CVE-2020-1048 | Windows Print Spooler Elevation of Privilege Vulnerability https://t.co/kkF1U9aVYz https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1048mndell
2020-08-07 14:30:20I think we figured out the way @peleghd and Tomer Bar of @safebreach bypassed the patch for CVE-2020-1048, but the… https://t.co/BnmsetWZnd https://twitter.com/i/web/status/1291742428467269632mkolsek
2020-08-07 13:10:05Researchers flag two zero-days in Windows Print Spooler: In May 2020, Microsoft patched CVE-2020-1048, a privilege… https://t.co/aEN102SdGf https://twitter.com/i/web/status/1291720890007220224cipherstorm
2020-08-07 12:40:05Researchers flag two zero-days in Windows Print Spooler: In May 2020, Microsoft patched CVE-2020-1048, a privilege… https://t.co/cAlL57sDed https://twitter.com/i/web/status/1291714848795922433shah_sheikh
2020-08-06 21:10:17Unpatched bug (CVE-2020-1048) in Windows print spooler lets malware run as admin Info: Hadar and Bar will present… https://t.co/cul0WUPDOq https://twitter.com/i/web/status/1291480254536712193CKsTechNews
2020-08-06 19:10:08CVE-2020-1048 Windows Print Spooler Elevation of Privilege Vulnerability. An elevation of privilege vulnerability… https://t.co/VGOm9iBCPX https://twitter.com/i/web/status/1291451384982843395VulmonFeeds
2020-06-26 08:00:08⚠CVE-2020-1048⚠ Nueva Vulnerabilidad MICROSOFT de severidad alta. Recursos afectados: microsoft:windows_10:-,1607… https://t.co/4wBL9QIgMq https://twitter.com/i/web/status/1276424082498740229GrupoICA_Ciber
2020-06-25 18:40:04🚨 NEW: CVE-2020-1048 🚨 An elevation of privilege vulnerability exists when the Windows Print Spooler service improp… https://t.co/Jz8wXbvEJ7 https://twitter.com/i/web/status/1276222612725612544threatintelctr
2020-06-13 11:30:03@thurrott CVE-2020-1048 recently caused a batch of fixes in this area, which was apparently pretty neglected over t… https://t.co/1EMnADEQaS https://twitter.com/i/web/status/1271765632900620288kamiljdudek
2020-06-08 17:10:08Late to the party - #YARA rule for CVE-2020-1048 privilege escalation via printer spooler. Unsure if this will hit… https://t.co/rRVh9fAwFu https://twitter.com/i/web/status/1270039166936649737MalwrIntel
2020-06-02 08:10:04Just found out about this PrinterDemon CVE-2020-1048 - Windows Privilege Escalation: https://t.co/0TMMxoukcW Very interesting. https://youtu.be/no-5cyluHxg0xAD1D45
2020-05-31 07:22:12CVE-2020-1048 (windows_10, windows_7, windows_8.1, | An elevation of privilege vulnerability exists when the Window… https://t.co/FPSYHdruzx https://twitter.com/i/web/status/1265349573666627586ZeroSecVulns
2020-05-27 10:10:04PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more)… https://t.co/VDhi1PoFq7 https://twitter.com/i/web/status/1265585310274068485ptracesecurity
2020-05-27 05:10:03@ShayNehmad @maddiestone Yes, CVE-2020-1048 :)peleghd
2020-05-26 20:10:08CVE-2020-1048 (windows_10, windows_7, windows_8.1, windows_rt_8.1, windows_server_2008, windows_server_2012, window… https://t.co/GQpHJovokK https://twitter.com/i/web/status/1265373002016882688e_blackfriday
2020-05-26 18:40:15New post from https://t.co/uXvPWJy6tj (CVE-2020-1048 (windows_10, windows_7, windows_8.1, windows_rt_8.1, windows_s… https://t.co/gwH9OAWkJu http://www.sesin.at https://twitter.com/i/web/status/1265349671259648008WolfgangSesin
2020-05-26 18:10:06🚨 NEW: CVE-2020-1048 🚨 An elevation of privilege vulnerability exists when the Windows Print Spooler service improp… https://t.co/jv2U2yqYEO https://twitter.com/i/web/status/1265343415941689344threatintelctr
2020-05-26 08:30:04CVE-2020-1048 Exploited in the wild! That was fast.. https://t.co/wNS4a0XmYn https://twitter.com/WrectorBall/status/1263936628529041409peleghd
2020-05-25 16:50:03Patch CVE-2020-1048 #PrintDemon, I do not agree with Microsoft's statement where for Latest Software Release exploi… https://t.co/CzURPztIbq https://twitter.com/i/web/status/1264960399801307137Void_Sec
2020-05-25 07:50:03PrintDemon: (CVE-2020-1048 & more) Apuntes de cómo funciona este "nuevo" fallo de seguridad en Windows https://t.co/IiN9RaXFVE https://pabloygl.es/2Ttry3fPYDotCom
2020-05-23 09:00:04Apparently CVE-2020-1048 is being exploited. If you have Windows 7 and stopped receiving updates in January,… https://t.co/g5SvjIK1Zg https://twitter.com/i/web/status/1264117689011879936mkolsek
2020-05-23 08:10:03Printer Daemon attack using PowerShell and CVE-2020-1048 https://t.co/0Izt4Ia3zj https://twitter.com/aionescu/status/1260466215299973121manelrodero
2020-05-22 14:00:04CVE-2020-1048 https://t.co/E19fxoRtNQ https://e-blackfriday.eu/2020/05/cve-2020-1048/e_blackfriday
2020-05-22 12:40:04🚨 NEW: CVE-2020-1048 🚨 An elevation of privilege vulnerability exists when the Windows Print Spooler service improp… https://t.co/HC49WHeE82 https://twitter.com/i/web/status/1263811669693775872threatintelctr
2020-05-22 05:11:41New post from https://t.co/uXvPWJy6tj (CVE-2020-1048) has been published on https://t.co/uXvPWJy6tj - https://t.co/0dxRnqRBEI http://www.sesin.at http://www.sesin.at https://www.sesin.at/2020/05/22/cve-2020-1048/WolfgangSesin
2020-05-22 05:10:03New post: CVE-2020-1048 :: Infosec – CERT-PA https://t.co/sjIGmDyEP7 https://reportcybercrime.com/cve-2020-1048-infosec-cert-pa/digitpol_cyber
2020-05-22 02:20:11I declare CVE-2020-1048 to be named Swiveled Sora https://t.co/x765GLO3iC https://nvd.nist.gov/vuln/detail/CVE-2020-1048vulnonym
2020-05-22 00:30:05PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) #pentesting #pentest… https://t.co/gwolAKk1d8 https://twitter.com/i/web/status/1263626494435364864malwaresick
2020-05-22 00:30:05Micropatching PrintDemon Vulnerability (CVE-2020-1048) #pentesting #pentest #CyberSecurity https://t.co/It9jIZnK8h https://blog.0patch.com/2020/05/micropatching-printdemon-vulnerability.htmlmalwaresick
2020-05-21 23:50:58CVE-2020-1048 An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allo… https://t.co/DzwYxvUE5G https://twitter.com/i/web/status/1263616875268898817CVEnew
2020-05-21 20:10:26Attackers can exploit CVE-2020-1048 with a single PowerShell command: Add-PrinterPort -Name c:\windows\system32\ua… https://t.co/jK1SIbj4G7 https://twitter.com/i/web/status/1263562290273693696deadmodem
2020-05-21 12:40:040patch posts a patch for the “PrintDemon” security hole CVE-2020-1048 https://t.co/wxgj8y45v8 #security #feedly https://www.askwoody.com/2020/0patch-posts-a-patch-for-the-printdemon-security-hole-cve-2020-1048/Mozbe
2020-05-21 09:50:06CVE-2020-1048 : Micropatching PrintDemon Vulnerability https://t.co/XDzK3rht4H https://blog.0patch.com/2020/05/micropatching-printdemon-vulnerability.htmlAnastasis_King
2020-05-21 07:40:05My PoC for CVE-2020-1048 #FaxHell #PrintDemon #exploit https://t.co/nRAsYdq9WTVoid_Sec
2020-05-21 01:40:040patch Blog: Micropatching PrintDemon Vulnerability (CVE-2020-1048): https://t.co/F5TsiUEzBC https://blog.0patch.com/2020/05/micropatching-printdemon-vulnerability.htmlmarshalleffects
2020-05-20 22:10:040patch fixes CVE-2020-1048 in Windows 7/Server 2008 R2 https://t.co/4FZiIGfqWA #0patch #ESU #Security Born's Tech and Windows World https://borncity.com/win/?p=14511etguenni
2020-05-20 22:10:030patch fixt CVE-2020-1048 in Windows 7/Server 2008 R2 https://t.co/hRYSGe7CYZ #0patch #ESU #Security Borns IT- & Windows-Blog https://www.borncity.com/blog/2020/05/21/0patch-fixes-cve-2020-1048-in-windows-7-server-2008-r2/etguenni
2020-05-20 19:40:030patch Blog: Micropatching PrintDemon Vulnerability (CVE-2020-1048) https://t.co/Ba7v1ByCAK https://blog.0patch.com/2020/05/micropatching-printdemon-vulnerability.htmltais9
2020-05-20 19:30:050patch blog: Micropatching PrintDemon Vulnerability (CVE-2020-1048) https://t.co/UCEigii181 https://t.co/Ew7MZKUSp4 https://blog.0patch.com/2020/05/micropatching-printdemon-vulnerability.html https://twitter.com/0patch/status/12630996105805987890patch
2020-05-20 18:00:040patch Blog: Micropatching PrintDemon Vulnerability (CVE-2020-1048) https://t.co/1rWHq6E2hI https://aeternusmalus.wordpress.com/2020/05/20/0patch-blog-micropatching-printdemon-vulnerability-cve-2020-1048-2/DoggoJoshu
2020-05-20 18:00:040patch Blog: Micropatching PrintDemon Vulnerability (CVE-2020-1048) https://t.co/14fX2Lgvus https://aeternusmalus.wordpress.com/2020/05/20/0patch-blog-micropatching-printdemon-vulnerability-cve-2020-1048/DoggoJoshu
2020-05-20 16:50:06Micropatching PrintDemon Vulnerability (CVE-2020-1048) https://t.co/ZJOc5r5Y0h https://blog.0patch.com/2020/05/micropatching-printdemon-vulnerability.htmlDinosn
2020-05-20 03:10:04Invoke-PrintDemon CVE-2020-1048 for privilege escalation This is an PowerShell Empire launcher PoC using PrintDemo… https://t.co/gniJKCiyf0 https://twitter.com/i/web/status/1262943178283515907Apex_Haxor
2020-05-19 14:00:42今話題のWindowsのPrintDaemonの脆弱性CVE-2020-1048で権限昇格をするPowerShellのスクリプトが公開されました。 https://t.co/kwwAPhVWF6 https://github.com/BC-SECURITY/Invoke-PrintDemongr4vit0n
2020-05-19 06:40:04CVE-2020-1048 | Windows Print Spooler Elevation of Privilege Vulnerability Security Vulnerability https://t.co/QDk91uxyUB https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1048cast_works
2020-05-19 00:40:03PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) - takes a single line… https://t.co/jwci9dK0Of https://twitter.com/i/web/status/1262543123688747010blueteamsec1
2020-05-18 19:20:04CVE-2020-1048 n-day PoC: I'm halfway trough it; I can write arbitrary file content (w/o garbage) BUT I'm getting "A… https://t.co/6zxgYzbfnG https://twitter.com/i/web/status/1262461132301914112Void_Sec
2020-05-18 10:30:04CVE-2020-1048 | Windows Print Spooler Elevation of Privilege Vulnerability https://t.co/0NxQRaABDX https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1048softya3
2020-05-17 18:40:03Invoke-PrintDemon - CVE-2020-1048 for privilege escalation. This is an PowerShell Empire launcher PoC using Print… https://t.co/KP1NI4aFQl https://twitter.com/i/web/status/1262089822962843648Anastasis_King
2020-05-17 17:50:04Invoke-PrintDemon - CVE-2020-1048 for privilege escalation. This is an PowerShell Empire launcher PoC using Print… https://t.co/tKP9VKWy9B https://twitter.com/i/web/status/1262076941550542848SubC0ol
2020-05-17 15:01:19Digest of detection content to uncover exploitation of CVE-2020-0932 and CVE-2020-1048, #OilRig activity, #DCShadow… https://t.co/wlVRU9NtCM https://twitter.com/i/web/status/1261687934169812994SOC_Prime
2020-05-17 10:40:03https://t.co/0sSnLBIpMH PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048) https://windows-internals.com/printdemon-cve-2020-1048/caliskanfurkan_
2020-05-16 19:20:03PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) – Winsider Seminars &… https://t.co/rJ4gRiRTnj https://twitter.com/i/web/status/1261737653327855616nuria_imeq
2020-05-16 07:10:03Patch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe, (Thu, May 14th) https://t.co/ry71ivKz1d https://ift.tt/3brsoDWedcamposj
2020-05-15 17:40:03PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) https://t.co/BbakrYDEs3 https://windows-internals.com/printdemon-cve-2020-1048/geeknik
2020-05-15 14:50:04Patch Tuesday Revisited – CVE-2020-1048 isn’t as “Medium” as MS Would Have You Believe, (Thu, May 14th)… https://t.co/SbtiiTbftQ https://twitter.com/i/web/status/1261307706935250945John_Masserini
2020-05-15 11:30:07Patch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe https://t.co/XhqViDx6VD #security #windows #microsoft https://isc.sans.edu/forums/diary/Patch+Tuesday+Revisited+CVE20201048+isnt+as+Medium+as+MS+Would+Have+You+Believe/26124/samilaiho
2020-05-15 10:40:06Sigma rule to detect new registered Printer Ports as used in CVE-2020-1048 by EagleEye Team Rule:… https://t.co/dQGIrU8PRE https://twitter.com/i/web/status/1261243703454285825cyb3rops
2020-05-15 09:40:04So, PrintSpooler is a Network Service. Does this automaticaly mean that CVE-2020-1048 is exploitable remotely? #PrintDemontagnullde
2020-05-15 07:30:04sans_isc: Patch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe… https://t.co/EQI8TVsxOq https://twitter.com/i/web/status/1261194950936494080WolfSec_ch
2020-05-15 07:10:08[SECU] Patch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe, (Thu, May 14th) https://t.co/dRaWWVoMgw https://ift.tt/3brsoDWEchosystem_fr
2020-05-15 07:00:05Among the vulnerabilities patched by Microsoft on May 2020 Patch Tuesday is CVE-2020-1048, a “lowly” privilege esca… https://t.co/4WzciT2Qub https://twitter.com/i/web/status/1261188696646340608MOQdigitalSOC
2020-05-15 06:50:08Wow! This is a really good breakdown of CVE-2020-1048 https://t.co/EHKoQtPwBt https://twitter.com/aionescu/status/1260466215299973121benpturner
2020-05-15 06:50:05PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) Cc @aionescu Attacker… https://t.co/pvKQENgY0y https://twitter.com/i/web/status/1261186568779333637Anastasis_King
2020-05-15 04:50:06PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) https://t.co/fBdLghE8ht via @nuzzel https://nzzl.us/cKJEZcA3DN4LDO
2020-05-15 04:40:03I just posted "PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more)" on Red… https://t.co/OaATtvThuY https://twitter.com/i/web/status/1261153905938968576cyberg0100
2020-05-15 02:00:04Patch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe https://t.co/k9E1deBsfr via @SANS_ISC https://isc.sans.edu/forums/diary/26124andrea4animals
2020-05-14 23:40:03Patch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe - https://t.co/0S1jtrgWol https://isc.sans.edu/forums/diary/Patch+Tuesday+Revisited+CVE20201048+isnt+as+Medium+as+MS+Would+Have+You+Believe/26124/moton
2020-05-14 23:30:04PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more https://t.co/yax2dNbbaT https://windows-internals.com/printdemon-cve-2020-1048/gASo_aka_boss
2020-05-14 22:50:03PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) https://t.co/8FByAqUnzB https://windows-internals.com/printdemon-cve-2020-1048/fabio_ruini
2020-05-14 21:00:20CVE-2020-1048: If you are digging Print&Fax bug-o-rama, you may want to check deeper the "Separator Page" handling… https://t.co/vIY4GWW1dg https://twitter.com/i/web/status/1261037591027122179costinandrei
2020-05-14 18:40:04"(CVE-2020-1048) is not a super complex remote code execution bug buried deep within the guts of Windows, but is in… https://t.co/IgBqbk6uqS https://twitter.com/i/web/status/1261002418956845056ddp
2020-05-14 18:20:04Over at @sans_isc today @rvandenbrink looks at CVE-2020-1048 and putting stock in risk ratings: https://t.co/uBycoosBPL https://buff.ly/3bvGbJQDigitalGuardian
2020-05-14 16:50:05Patch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe, (Thu, May 14th)… https://t.co/t2AKgP9XIp https://twitter.com/i/web/status/1260974437253382150Mozbe
2020-05-14 16:10:07Patch Tuesday Revisited – CVE-2020-1048 isn’t as “Medium” as MS Would Have You Believe, (Thu, May 14th) https://t.co/jNvumfXFhi https://www.itsecuritynews.info/patch-tuesday-revisited-cve-2020-1048-isnt-as-medium-as-ms-would-have-you-believe-thu-may-14th/IT_securitynews
2020-05-14 16:10:04Patch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe, (Thu, May 14th)… https://t.co/ZFrBbNpr9d https://twitter.com/i/web/status/1260965373991464961RigneySec
2020-05-14 15:10:10The PrintDemon vulnerability is dangerous for all versions of Windows released after 1996 CVE-2020-1048 #Zanket… https://t.co/DW3dIfALur https://twitter.com/i/web/status/1260948081387978753Zanket_com
2020-05-14 15:00:04PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) – Winsider Seminars &… https://t.co/VmtBZUFlIN https://twitter.com/i/web/status/1260945859669360641rootsecdev
2020-05-14 14:50:06Patch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe https://t.co/s8kPtX4Tjh lewat @SANS_ISC https://isc.sans.edu/forums/diary/26124triple__x_
2020-05-14 14:40:05Patch Tuesday Revisited - CVE-2020-1048 isn't as "Medium" as MS Would Have You Believe https://t.co/6DbL0w7B5x https://t.co/mgwnRGjA20 https://i5c.us/2zyW7h9sans_isc
2020-05-14 14:10:05PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) Cc @aionescu Attacker… https://t.co/r9BENopsdJ https://twitter.com/i/web/status/1260933920301801475el_leon_cesar
2020-05-14 14:00:04CVE-2020-1048 - PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more)… https://t.co/hY7N6oQ3Yc https://twitter.com/i/web/status/1260932290965671938morpheuslaw
2020-05-14 13:00:05Among the vulnerabilities patched by Microsoft on May 2020 Patch Tuesday is CVE-2020-1048, a “lowly” privilege esca… https://t.co/mnDBJFT841 https://twitter.com/i/web/status/1260915610596360192InfoSecHotSpot
2020-05-14 12:10:04PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) – Winsider Seminars &… https://t.co/gSAgPPVPnB https://twitter.com/i/web/status/1260903685430939649DoggoJoshu
2020-05-14 08:20:04Windows Print-Spooler: Exploit for CVE-2020-1048 https://t.co/yCHKc31M7X #CVE-2020-1048 #Security #Update Born's Tech and Windows World https://borncity.com/win/?p=14429etguenni
2020-05-14 08:00:04PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) https://t.co/uGCDWkSgpO https://windows-internals.com/printdemon-cve-2020-1048/bebinjo
2020-05-14 07:40:05A patch for CVE-2020-1048, a Windows Print Spooler vulnerability, reminded @dennisf of a similar vulnerability used… https://t.co/iQklvK3For https://twitter.com/i/web/status/1260835744119173120virusbtn
2020-05-14 07:40:04Windows Print-Spooler: Exploit für CVE-2020-1048 https://t.co/mMtNjivfWe #CVE-2020-1048 #Sicherheit #Update Borns IT- & Windows-Blog https://www.borncity.com/blog/2020/05/14/windows-print-spooler-exploit-fr-cve-2020-1048/etguenni
2020-05-14 07:00:04Ayer comentando con @Kosmokato sobre el CVE-2020-1048 que se puede explotar con el siguiente comando de PowerShell:… https://t.co/CfVi6xReCd https://twitter.com/i/web/status/1260826740320088064b4r0nd3l4b1rr4
2020-05-14 05:30:04Top story: PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) – Winsider… https://t.co/tgg4j2GIGD https://twitter.com/i/web/status/1260802414883594247DLsec101
2020-05-14 01:20:05Nice AttackerKB follow-on to recent CVE-2020-1048 (Windows Print Spooler EoP) analysis—exploitability looks perhaps… https://t.co/oR14nkVA81 https://twitter.com/i/web/status/1260740190018187264catc0n
2020-05-14 00:40:04PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) https://t.co/zt6xPgFrDe https://windows-internals.com/printdemon-cve-2020-1048/1nf0s3cpt
2020-05-14 00:00:04#H3xen PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) – Winsider Sem… https://t.co/5tcYICH4BW https://twitter.com/i/web/status/1260721033281179649H3xenSec
2020-05-13 23:30:04On the radar: An exploit for CVE-2020-1048, Windows Print Spooler elevation of privilege. There's a one-line (user… https://t.co/3WuxGQkWFu https://twitter.com/i/web/status/1260711560542146560AskWoody
2020-05-13 23:20:05Nice technical write up of CVE-2020-1048 (Print Spooler priv esc) https://t.co/q4hLF3HuqG #DFIR https://windows-internals.com/printdemon-cve-2020-1048/mgreen27
2020-05-13 23:10:04PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) https://t.co/v48XwjdYU5 https://windows-internals.com/printdemon-cve-2020-1048/xillwillx
2020-05-13 21:40:03Top story: PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) – Winsider… https://t.co/4EOle5AmQh https://twitter.com/i/web/status/1260684981980061703Linuxnews1
2020-05-13 21:10:05PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) https://t.co/p4yj2zDeZR https://windows-internals.com/printdemon-cve-2020-1048/greyhathackr
2020-05-13 21:10:03Exploit CVE-2020-1048 with a single PowerShell command: Add-PrinterPort -Name c:\windows\system32\ualapi.dll On a… https://t.co/SCtiBj0BxJ https://twitter.com/i/web/status/1260677879802867712atabishofficial
2020-05-13 20:50:04#PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048) stone age old bug on Window… https://t.co/1c8cUt3Qm4 https://twitter.com/i/web/status/1260672703960354819xxByte
2020-05-13 20:40:03#DailyHackManac Top story: PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & m… https://t.co/lDqr7WcCex https://twitter.com/i/web/status/1260671031569768453hack_manac
2020-05-13 20:00:05#security :: PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) – Winsid… https://t.co/hX9niHQEeI https://twitter.com/i/web/status/1260659325233586177seclabor
2020-05-13 19:30:04My Daily #TopStory: PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) –… https://t.co/ZT0TLHFKIp https://twitter.com/i/web/status/1260652252554903552SofiaSZM
2020-05-13 19:20:30CVE-2020-1048, it’s literally a lulz printer vuln https://t.co/S0iyQFd9Sx https://twitter.com/vbscrub/status/1260598344650539009BabblingGeek
2020-05-13 19:10:04#Security readings: PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) –… https://t.co/9grcpSfADr https://twitter.com/i/web/status/1260647993180475393LinuxSec
2020-05-13 19:10:04#ITSecurity #ITSec PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) – W… https://t.co/De6LxBBxEn https://twitter.com/i/web/status/1260647819565690881Pentest101MX
2020-05-13 17:30:06Another for the Crikey section, bordering on Blimey. CVE-2020-1048 and persistent backdoors (**patching doesn't rem… https://t.co/VDqWIA7SjV https://twitter.com/i/web/status/1260621510269636613Seven_Stones
2020-05-13 17:20:04PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more)… https://t.co/SYaFXp1mXw https://twitter.com/i/web/status/1260619808871256070ptracesecurity
2020-05-13 17:10:05Top story: PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) – Winsider… https://t.co/li5dTFsWkH https://twitter.com/i/web/status/1260617232293548032r45c4l
2020-05-13 17:00:06Top story: PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) – Winsider… https://t.co/7t25AOyOSf https://twitter.com/i/web/status/1260614460542246912Higgsb101
2020-05-13 16:50:05Top story: PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) – Winsider… https://t.co/75282UHqjg https://twitter.com/i/web/status/1260612111912390658BhaavukAroraa
2020-05-13 15:10:09Attackers can exploit CVE-2020-1048 with a single PowerShell command: Add-PrinterPort -Name c:\windows\system32\ua… https://t.co/Zs7tTb6mQb https://twitter.com/i/web/status/1260585710916112392malshiekh
2020-05-13 14:30:06PrintDemon (CVE-2020-1048) - PoC for a series of issues in the Windows Print Spooler service, as well as potetial m… https://t.co/YcakhNBMqJ https://twitter.com/i/web/status/1260576328534892546netbiosX
2020-05-13 14:10:07PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) https://t.co/j8gMWoGi7T via @nuzzel https://nzzl.us/cKJEZcAprotoshell
2020-05-13 14:00:04#Ciberseguridad #Infosec PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & mor… https://t.co/s8I0oWvIeO https://twitter.com/i/web/status/1260569938495971328ArcanistMX
2020-05-13 13:50:12Trending News: PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) – Winsi… https://t.co/dnJQwyRjzr https://twitter.com/i/web/status/1260566767371501575susession
2020-05-13 11:50:06Top story: PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) – Winsider… https://t.co/cm08wsxhtE https://twitter.com/i/web/status/1260536581343100928vistacomputing
2020-05-13 11:40:06If Attacker exploite CVE-2020-1048 with a single PowerShell command on an unpatched system This will install a per… https://t.co/h6W62CFQZS https://twitter.com/i/web/status/1260533952177008641ankit_2812
2020-05-13 11:30:05Top story: PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) – Winsider… https://t.co/3WZb9ELLCp https://twitter.com/i/web/status/1260531966975361025CEEKTechnology
2020-05-13 09:40:05PrintDemon: Print Spooler Privilege Escalation, Persistence & Stealth (CVE-2020-1048 & more) – Winsider Seminars &… https://t.co/MYLZltXea7 https://twitter.com/i/web/status/1260502834727903232piedpiper1616
2020-05-13 07:30:04CVE-2020-1048 <!-- &#039;"` --><!-- </textarea></xmp> --> ... https://t.co/fSPCpYCBdl http://vulmon.com/vulnerabilitydetails?qid=CVE-2020-1048VulmonFeeds
2020-05-13 07:10:07Attackers can exploit CVE-2020-1048 with a single PowerShell command: Add-PrinterPort -Name c:\windows\system32\ua… https://t.co/TCYbNzwPcK https://twitter.com/i/web/status/1260466215299973121aionescu
2020-05-13 07:00:03We've now posted the blog for CVE-2020-1048 (and a few other goodies) up at https://t.co/9yMSWNM8VG. We also have a… https://t.co/1woiBzZoFA https://windows-internals.com/printdemon-cve-2020-1048/ https://twitter.com/i/web/status/1260464755367649281aionescu
2020-05-12 18:40:06On the heels of the patch for CVE-2020-1048 (https://t.co/0i2s2M2NY5) with a well deserved acknowledgment to… https://t.co/evn4btzcP1 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1048 https://twitter.com/i/web/status/1260276176423211012aionescu
2020-05-12 17:50:03Amazing work by @peleghd and Tomer Bar from @SafeBreach Labs led to CVE-2020-1048. Patch was release today by… https://t.co/dwtvfYr6FN https://twitter.com/i/web/status/1260265275322056710itzikkotler
2020-05-12 17:40:03CVE-2020-1048: A cool Windows Spooler vulnerability (Win10, Win8, Win7) which I found with Tomer Bar at… https://t.co/OWahCXsgX0 https://twitter.com/i/web/status/1260263152542986241peleghd