Description
CVE-2021-34527 (object exported from CVE-Search)
Owning organization
Validating JSON schema
CVE objects from CVE-Search (provided by CVE-Search)
Creator
License
Creative Commons Zero v1.0 Universal
Related objects
Definition of the object
{
"Modified": "2021-07-14T18:15:00",
"Published": "2021-07-02T22:15:00",
"access": {
"authentication": "SINGLE",
"complexity": "LOW",
"vector": "NETWORK"
},
"assigner": "secure@microsoft.com",
"cvss": 9,
"cvss-time": "2021-07-14T18:15:00",
"cvss-vector": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"cwe": "CWE-269",
"id": "CVE-2021-34527",
"impact": {
"availability": "COMPLETE",
"confidentiality": "COMPLETE",
"integrity": "COMPLETE"
},
"last-modified": "2021-07-14T18:15:00",
"products": [],
"references": [
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34527",
"https://www.kb.cert.org/vuls/id/383432"
],
"summary": "Windows Print Spooler Remote Code Execution Vulnerability",
"vendors": [],
"vulnerable_configuration": [
"{\"id\":\"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*\"}",
"{\"id\":\"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*\"}",
"{\"id\":\"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*\"}",
"{\"id\":\"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*\"}",
"{\"id\":\"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*\"}",
"{\"id\":\"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*\"}",
"{\"id\":\"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*\"}",
"{\"id\":\"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*\"}",
"{\"id\":\"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*\"}",
"{\"id\":\"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*\"}",
"{\"id\":\"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*\"}",
"{\"id\":\"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*\",\"title\":\"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*\"}",
"{\"id\":\"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*\"}",
"{\"id\":\"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*\"}",
"{\"id\":\"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*\"}",
"{\"id\":\"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*\"}",
"{\"id\":\"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*\"}",
"{\"id\":\"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*\",\"title\":\"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*\"}"
],
"vulnerable_configuration_cpe_2_2": [],
"vulnerable_configuration_stems": [],
"vulnerable_product": [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*"
],
"vulnerable_product_stems": []
}