{"uuid": "a3d9f1ec-55d3-4fe8-bcae-2b1f2011d78a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-1675", "type": "seen", "source": "https://t.me/information_security_channel/44635", "content": "Did Microsoft Botch the PrintNightmare Patch?\nhttp://feedproxy.google.com/~r/securityweek/~3/PqEJjMi6APQ/did-microsoft-botch-printnightmare-patch\n\nJust days after shipping an emergency Windows update to cover a dangerous code execution flaw (CVE-2021-1675 (https://www.securityweek.com/windows-admins-scrambling-contain-printnightmare-flaw-exposure)) in the Print Spooler service, Microsoft is investigating a new set of claims that its so-called \u2018PrintNightmare\u2019 patch has not properly fixed the underlying vulnerability.\nread more (https://www.securityweek.com/did-microsoft-botch-printnightmare-patch)", "creation_timestamp": "2021-07-09T17:30:01.000000Z"}