2021-06-30 00:12:46 +09:00
[
{
"id" : 381392691 ,
"name" : "CVE-2021-1675" ,
"full_name" : "yu2u\/CVE-2021-1675" ,
"owner" : {
"login" : "yu2u" ,
"id" : 25322880 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/25322880?v=4" ,
"html_url" : "https:\/\/github.com\/yu2u"
} ,
"html_url" : "https:\/\/github.com\/yu2u\/CVE-2021-1675" ,
"description" : "CVE-2021-1675 exploit" ,
"fork" : false ,
"created_at" : "2021-06-29T14:24:30Z" ,
2021-07-02 12:11:29 +09:00
"updated_at" : "2021-07-02T01:01:45Z" ,
2021-06-30 00:12:46 +09:00
"pushed_at" : "2021-06-29T14:26:25Z" ,
2021-07-02 12:11:29 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-07-01 00:11:40 +09:00
"forks_count" : 1 ,
"forks" : 1 ,
2021-07-02 12:11:29 +09:00
"watchers" : 1 ,
2021-06-30 00:12:46 +09:00
"score" : 0
2021-06-30 06:12:38 +09:00
} ,
{
"id" : 381444656 ,
"name" : "CVE-2021-1675" ,
"full_name" : "cube0x0\/CVE-2021-1675" ,
"owner" : {
"login" : "cube0x0" ,
"id" : 39370848 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/39370848?v=4" ,
"html_url" : "https:\/\/github.com\/cube0x0"
} ,
"html_url" : "https:\/\/github.com\/cube0x0\/CVE-2021-1675" ,
2021-07-04 00:11:25 +09:00
"description" : "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527" ,
2021-06-30 06:12:38 +09:00
"fork" : false ,
"created_at" : "2021-06-29T17:24:14Z" ,
2021-07-04 18:11:22 +09:00
"updated_at" : "2021-07-04T08:51:53Z" ,
"pushed_at" : "2021-07-04T08:26:00Z" ,
"stargazers_count" : 925 ,
"watchers_count" : 925 ,
"forks_count" : 349 ,
"forks" : 349 ,
"watchers" : 925 ,
2021-07-01 06:11:27 +09:00
"score" : 0
} ,
{
"id" : 381799016 ,
"name" : "CVE-2021-1675" ,
"full_name" : "LaresLLC\/CVE-2021-1675" ,
"owner" : {
"login" : "LaresLLC" ,
"id" : 63059624 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/63059624?v=4" ,
"html_url" : "https:\/\/github.com\/LaresLLC"
} ,
"html_url" : "https:\/\/github.com\/LaresLLC\/CVE-2021-1675" ,
"description" : "CVE-2021-1675 Detection Info" ,
"fork" : false ,
"created_at" : "2021-06-30T18:32:17Z" ,
2021-07-04 18:11:22 +09:00
"updated_at" : "2021-07-04T08:46:19Z" ,
2021-07-03 12:12:12 +09:00
"pushed_at" : "2021-07-02T21:27:47Z" ,
2021-07-04 18:11:22 +09:00
"stargazers_count" : 156 ,
"watchers_count" : 156 ,
2021-07-04 06:12:19 +09:00
"forks_count" : 21 ,
"forks" : 21 ,
2021-07-04 18:11:22 +09:00
"watchers" : 156 ,
2021-07-01 12:11:28 +09:00
"score" : 0
} ,
{
"id" : 381858715 ,
"name" : "patch-cve-2021-1675" ,
"full_name" : "kondah\/patch-cve-2021-1675" ,
"owner" : {
"login" : "kondah" ,
"id" : 7760108 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7760108?v=4" ,
"html_url" : "https:\/\/github.com\/kondah"
} ,
"html_url" : "https:\/\/github.com\/kondah\/patch-cve-2021-1675" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-06-30T23:39:21Z" ,
2021-07-02 06:13:22 +09:00
"updated_at" : "2021-07-01T19:35:37Z" ,
2021-07-01 12:11:28 +09:00
"pushed_at" : "2021-06-30T23:40:44Z" ,
2021-07-02 06:13:22 +09:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2021-07-02 00:11:43 +09:00
"forks_count" : 1 ,
"forks" : 1 ,
2021-07-02 06:13:22 +09:00
"watchers" : 3 ,
2021-07-01 18:11:50 +09:00
"score" : 0
} ,
{
"id" : 381971547 ,
"name" : "CVE-2021-1675-LPE-EXP" ,
"full_name" : "evilashz\/CVE-2021-1675-LPE-EXP" ,
"owner" : {
"login" : "evilashz" ,
"id" : 50722929 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/50722929?v=4" ,
"html_url" : "https:\/\/github.com\/evilashz"
} ,
"html_url" : "https:\/\/github.com\/evilashz\/CVE-2021-1675-LPE-EXP" ,
2021-07-03 00:11:48 +09:00
"description" : "CVE-2021-1675 LPE Exploit" ,
2021-07-01 18:11:50 +09:00
"fork" : false ,
"created_at" : "2021-07-01T09:00:31Z" ,
2021-07-03 18:11:22 +09:00
"updated_at" : "2021-07-03T08:14:41Z" ,
2021-07-03 00:11:48 +09:00
"pushed_at" : "2021-07-02T10:47:36Z" ,
2021-07-03 18:11:22 +09:00
"stargazers_count" : 9 ,
"watchers_count" : 9 ,
"forks_count" : 4 ,
"forks" : 4 ,
"watchers" : 9 ,
2021-07-02 00:11:43 +09:00
"score" : 0
} ,
{
"id" : 381984439 ,
"name" : "CVE-2021-1675-LPE" ,
"full_name" : "hlldz\/CVE-2021-1675-LPE" ,
"owner" : {
"login" : "hlldz" ,
"id" : 16455559 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16455559?v=4" ,
"html_url" : "https:\/\/github.com\/hlldz"
} ,
"html_url" : "https:\/\/github.com\/hlldz\/CVE-2021-1675-LPE" ,
"description" : "Local Privilege Escalation Edition for CVE-2021-1675" ,
"fork" : false ,
"created_at" : "2021-07-01T09:47:13Z" ,
2021-07-04 18:11:22 +09:00
"updated_at" : "2021-07-04T08:37:19Z" ,
2021-07-02 00:11:43 +09:00
"pushed_at" : "2021-07-01T13:24:06Z" ,
2021-07-04 18:11:22 +09:00
"stargazers_count" : 208 ,
"watchers_count" : 208 ,
"forks_count" : 40 ,
"forks" : 40 ,
"watchers" : 208 ,
2021-07-02 00:11:43 +09:00
"score" : 0
} ,
{
"id" : 382024474 ,
"name" : "CVE-2021-1675" ,
"full_name" : "puckiestyle\/CVE-2021-1675" ,
"owner" : {
"login" : "puckiestyle" ,
"id" : 57447087 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4" ,
"html_url" : "https:\/\/github.com\/puckiestyle"
} ,
"html_url" : "https:\/\/github.com\/puckiestyle\/CVE-2021-1675" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-01T12:24:19Z" ,
2021-07-02 18:11:33 +09:00
"updated_at" : "2021-07-02T07:38:26Z" ,
2021-07-02 00:11:43 +09:00
"pushed_at" : "2021-07-01T12:24:29Z" ,
2021-07-02 18:11:33 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 2 ,
"forks" : 2 ,
"watchers" : 1 ,
2021-07-02 00:11:43 +09:00
"score" : 0
} ,
{
"id" : 382050919 ,
"name" : "CVE-2021-1675_PrintNightMare" ,
"full_name" : "cybersecurityworks553\/CVE-2021-1675_PrintNightMare" ,
"owner" : {
"login" : "cybersecurityworks553" ,
"id" : 63910792 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4" ,
"html_url" : "https:\/\/github.com\/cybersecurityworks553"
} ,
"html_url" : "https:\/\/github.com\/cybersecurityworks553\/CVE-2021-1675_PrintNightMare" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-01T13:58:01Z" ,
2021-07-04 18:11:22 +09:00
"updated_at" : "2021-07-04T03:57:15Z" ,
2021-07-02 00:11:43 +09:00
"pushed_at" : "2021-07-01T14:26:05Z" ,
2021-07-04 18:11:22 +09:00
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
2021-07-02 18:11:33 +09:00
"forks_count" : 2 ,
"forks" : 2 ,
2021-07-04 18:11:22 +09:00
"watchers" : 6 ,
2021-07-02 06:13:22 +09:00
"score" : 0
} ,
{
"id" : 382141130 ,
"name" : "CVE-2021-1675" ,
"full_name" : "tanarchytan\/CVE-2021-1675" ,
"owner" : {
"login" : "tanarchytan" ,
"id" : 2339027 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2339027?v=4" ,
"html_url" : "https:\/\/github.com\/tanarchytan"
} ,
"html_url" : "https:\/\/github.com\/tanarchytan\/CVE-2021-1675" ,
"description" : "Fix without disabling Print Spooler" ,
"fork" : false ,
"created_at" : "2021-07-01T19:50:46Z" ,
2021-07-02 18:11:33 +09:00
"updated_at" : "2021-07-02T04:32:21Z" ,
"pushed_at" : "2021-07-02T04:32:18Z" ,
2021-07-02 06:13:22 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2021-07-03 06:11:28 +09:00
"forks_count" : 1 ,
"forks" : 1 ,
2021-07-01 12:11:28 +09:00
"watchers" : 0 ,
2021-06-30 06:12:38 +09:00
"score" : 0
2021-07-02 12:11:29 +09:00
} ,
{
"id" : 382182179 ,
"name" : "CVE-2021-1675" ,
"full_name" : "calebstewart\/CVE-2021-1675" ,
"owner" : {
"login" : "calebstewart" ,
"id" : 7529189 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7529189?v=4" ,
"html_url" : "https:\/\/github.com\/calebstewart"
} ,
"html_url" : "https:\/\/github.com\/calebstewart\/CVE-2021-1675" ,
"description" : "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)" ,
"fork" : false ,
"created_at" : "2021-07-01T23:45:58Z" ,
2021-07-04 18:11:22 +09:00
"updated_at" : "2021-07-04T08:52:55Z" ,
2021-07-03 06:11:28 +09:00
"pushed_at" : "2021-07-02T16:03:25Z" ,
2021-07-04 18:11:22 +09:00
"stargazers_count" : 303 ,
"watchers_count" : 303 ,
"forks_count" : 83 ,
"forks" : 83 ,
"watchers" : 303 ,
2021-07-02 12:11:29 +09:00
"score" : 0
} ,
{
"id" : 382200984 ,
"name" : "CVE-2021-1675-SCANNER" ,
"full_name" : "Leonidus0x10\/CVE-2021-1675-SCANNER" ,
"owner" : {
"login" : "Leonidus0x10" ,
"id" : 72128281 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/72128281?v=4" ,
"html_url" : "https:\/\/github.com\/Leonidus0x10"
} ,
"html_url" : "https:\/\/github.com\/Leonidus0x10\/CVE-2021-1675-SCANNER" ,
"description" : "Vulnerability Scanner for CVE-2021-1675\/PrintNightmare" ,
"fork" : false ,
"created_at" : "2021-07-02T01:45:00Z" ,
2021-07-04 06:12:19 +09:00
"updated_at" : "2021-07-03T20:32:06Z" ,
2021-07-02 12:11:29 +09:00
"pushed_at" : "2021-07-02T01:52:46Z" ,
2021-07-03 18:11:22 +09:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
2021-07-02 18:11:33 +09:00
"forks_count" : 0 ,
"forks" : 0 ,
2021-07-03 18:11:22 +09:00
"watchers" : 4 ,
2021-07-02 18:11:33 +09:00
"score" : 0
} ,
{
"id" : 382249207 ,
"name" : "CVE-2021-1675" ,
"full_name" : "thomasgeens\/CVE-2021-1675" ,
"owner" : {
"login" : "thomasgeens" ,
"id" : 2236721 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2236721?v=4" ,
"html_url" : "https:\/\/github.com\/thomasgeens"
} ,
"html_url" : "https:\/\/github.com\/thomasgeens\/CVE-2021-1675" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-02T06:14:29Z" ,
2021-07-03 00:11:48 +09:00
"updated_at" : "2021-07-02T12:17:58Z" ,
2021-07-02 18:11:33 +09:00
"pushed_at" : "2021-07-02T06:14:39Z" ,
2021-07-03 00:11:48 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-07-02 18:11:33 +09:00
"forks_count" : 0 ,
"forks" : 0 ,
2021-07-03 00:11:48 +09:00
"watchers" : 2 ,
2021-07-02 18:11:33 +09:00
"score" : 0
} ,
{
"id" : 382266932 ,
"name" : "CVE-2021-1675_CarbonBlack_HuntingQuery" ,
"full_name" : "mrezqi\/CVE-2021-1675_CarbonBlack_HuntingQuery" ,
"owner" : {
"login" : "mrezqi" ,
"id" : 2455832 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2455832?v=4" ,
"html_url" : "https:\/\/github.com\/mrezqi"
} ,
"html_url" : "https:\/\/github.com\/mrezqi\/CVE-2021-1675_CarbonBlack_HuntingQuery" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-02T07:30:24Z" ,
"updated_at" : "2021-07-02T08:01:10Z" ,
"pushed_at" : "2021-07-02T08:01:07Z" ,
2021-07-02 12:11:29 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-07-03 06:11:28 +09:00
} ,
{
"id" : 382399375 ,
"name" : "CVE-2021-1675-PrintNightmare" ,
"full_name" : "killtr0\/CVE-2021-1675-PrintNightmare" ,
"owner" : {
"login" : "killtr0" ,
"id" : 22793707 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/22793707?v=4" ,
"html_url" : "https:\/\/github.com\/killtr0"
} ,
"html_url" : "https:\/\/github.com\/killtr0\/CVE-2021-1675-PrintNightmare" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-02T16:12:15Z" ,
"updated_at" : "2021-07-02T16:13:01Z" ,
"pushed_at" : "2021-07-02T16:12:59Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 382418030 ,
"name" : "CVE-2021-1675" ,
"full_name" : "kougyokugentou\/CVE-2021-1675" ,
"owner" : {
"login" : "kougyokugentou" ,
"id" : 41278462 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/41278462?v=4" ,
"html_url" : "https:\/\/github.com\/kougyokugentou"
} ,
"html_url" : "https:\/\/github.com\/kougyokugentou\/CVE-2021-1675" ,
"description" : "A small powershell script to disable print spooler service using desired state configuration" ,
"fork" : false ,
"created_at" : "2021-07-02T17:29:04Z" ,
"updated_at" : "2021-07-02T17:41:53Z" ,
"pushed_at" : "2021-07-02T17:40:09Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 382425733 ,
"name" : "CVE-2021-1675" ,
"full_name" : "ptter23\/CVE-2021-1675" ,
"owner" : {
"login" : "ptter23" ,
"id" : 55167410 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/55167410?v=4" ,
"html_url" : "https:\/\/github.com\/ptter23"
} ,
"html_url" : "https:\/\/github.com\/ptter23\/CVE-2021-1675" ,
"description" : "CVE-2021-1675: ZERO-DAY VULNERABILITY IN WINDOWS PRINTER SERVICE WITH AN EXPLOIT AVAILABLE IN ALL OPERATING SYSTEM VERSIONS" ,
"fork" : false ,
"created_at" : "2021-07-02T18:01:21Z" ,
"updated_at" : "2021-07-02T18:07:48Z" ,
"pushed_at" : "2021-07-02T18:07:45Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-07-03 12:12:12 +09:00
} ,
{
"id" : 382466613 ,
"name" : "CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler" ,
"full_name" : "gohrenberg\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler" ,
"owner" : {
"login" : "gohrenberg" ,
"id" : 80491750 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/80491750?v=4" ,
"html_url" : "https:\/\/github.com\/gohrenberg"
} ,
"html_url" : "https:\/\/github.com\/gohrenberg\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler" ,
"description" : "Temporary mitigation to the CVE-2021-1675. 'Spooler' service-disabled based on time schedule. PowerShell Scripts and Task Scheduler code provided. " ,
"fork" : false ,
"created_at" : "2021-07-02T21:18:11Z" ,
2021-07-04 06:12:19 +09:00
"updated_at" : "2021-07-03T17:29:23Z" ,
"pushed_at" : "2021-07-03T17:29:54Z" ,
2021-07-03 12:12:12 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 382496518 ,
"name" : "cve-2021-1675-printnightmare" ,
"full_name" : "initconf\/cve-2021-1675-printnightmare" ,
"owner" : {
"login" : "initconf" ,
"id" : 4044729 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4" ,
"html_url" : "https:\/\/github.com\/initconf"
} ,
"html_url" : "https:\/\/github.com\/initconf\/cve-2021-1675-printnightmare" ,
"description" : "to catch cve-2021-1675-printnightmare" ,
"fork" : false ,
"created_at" : "2021-07-03T01:04:06Z" ,
"updated_at" : "2021-07-03T01:08:45Z" ,
"pushed_at" : "2021-07-03T01:08:43Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-07-04 00:11:25 +09:00
} ,
{
"id" : 382609559 ,
"name" : "PrintNightmare" ,
"full_name" : "ozergoker\/PrintNightmare" ,
"owner" : {
"login" : "ozergoker" ,
"id" : 86879266 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/86879266?v=4" ,
"html_url" : "https:\/\/github.com\/ozergoker"
} ,
"html_url" : "https:\/\/github.com\/ozergoker\/PrintNightmare" ,
"description" : "Windows Print Spooler Service RCE CVE-2021-1675 (PrintNightmare)" ,
"fork" : false ,
"created_at" : "2021-07-03T12:25:21Z" ,
"updated_at" : "2021-07-03T12:44:08Z" ,
"pushed_at" : "2021-07-03T12:43:26Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-06-30 00:12:46 +09:00
}
]