2021-06-29 17:12:46 +02:00
[
{
"id" : 381392691 ,
"name" : "CVE-2021-1675" ,
"full_name" : "yu2u\/CVE-2021-1675" ,
"owner" : {
"login" : "yu2u" ,
"id" : 25322880 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/25322880?v=4" ,
"html_url" : "https:\/\/github.com\/yu2u"
} ,
"html_url" : "https:\/\/github.com\/yu2u\/CVE-2021-1675" ,
"description" : "CVE-2021-1675 exploit" ,
"fork" : false ,
"created_at" : "2021-06-29T14:24:30Z" ,
2021-07-02 05:11:29 +02:00
"updated_at" : "2021-07-02T01:01:45Z" ,
2021-06-29 17:12:46 +02:00
"pushed_at" : "2021-06-29T14:26:25Z" ,
2021-07-02 05:11:29 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-06-30 17:11:40 +02:00
"forks_count" : 1 ,
"forks" : 1 ,
2021-07-02 05:11:29 +02:00
"watchers" : 1 ,
2021-06-29 17:12:46 +02:00
"score" : 0
2021-06-29 23:12:38 +02:00
} ,
{
"id" : 381444656 ,
"name" : "CVE-2021-1675" ,
"full_name" : "cube0x0\/CVE-2021-1675" ,
"owner" : {
"login" : "cube0x0" ,
"id" : 39370848 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/39370848?v=4" ,
"html_url" : "https:\/\/github.com\/cube0x0"
} ,
"html_url" : "https:\/\/github.com\/cube0x0\/CVE-2021-1675" ,
2021-07-01 17:11:43 +02:00
"description" : "C# and Impacket implementation of CVE-2021-1675\/PrintNightmare" ,
2021-06-29 23:12:38 +02:00
"fork" : false ,
"created_at" : "2021-06-29T17:24:14Z" ,
2021-07-03 11:11:22 +02:00
"updated_at" : "2021-07-03T09:05:49Z" ,
"pushed_at" : "2021-07-03T07:59:54Z" ,
"stargazers_count" : 864 ,
"watchers_count" : 864 ,
"forks_count" : 327 ,
"forks" : 327 ,
"watchers" : 864 ,
2021-06-30 23:11:27 +02:00
"score" : 0
} ,
{
"id" : 381799016 ,
"name" : "CVE-2021-1675" ,
"full_name" : "LaresLLC\/CVE-2021-1675" ,
"owner" : {
"login" : "LaresLLC" ,
"id" : 63059624 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/63059624?v=4" ,
"html_url" : "https:\/\/github.com\/LaresLLC"
} ,
"html_url" : "https:\/\/github.com\/LaresLLC\/CVE-2021-1675" ,
"description" : "CVE-2021-1675 Detection Info" ,
"fork" : false ,
"created_at" : "2021-06-30T18:32:17Z" ,
2021-07-03 11:11:22 +02:00
"updated_at" : "2021-07-03T07:10:48Z" ,
2021-07-03 05:12:12 +02:00
"pushed_at" : "2021-07-02T21:27:47Z" ,
2021-07-03 11:11:22 +02:00
"stargazers_count" : 110 ,
"watchers_count" : 110 ,
"forks_count" : 19 ,
"forks" : 19 ,
"watchers" : 110 ,
2021-07-01 05:11:28 +02:00
"score" : 0
} ,
{
"id" : 381858715 ,
"name" : "patch-cve-2021-1675" ,
"full_name" : "kondah\/patch-cve-2021-1675" ,
"owner" : {
"login" : "kondah" ,
"id" : 7760108 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7760108?v=4" ,
"html_url" : "https:\/\/github.com\/kondah"
} ,
"html_url" : "https:\/\/github.com\/kondah\/patch-cve-2021-1675" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-06-30T23:39:21Z" ,
2021-07-01 23:13:22 +02:00
"updated_at" : "2021-07-01T19:35:37Z" ,
2021-07-01 05:11:28 +02:00
"pushed_at" : "2021-06-30T23:40:44Z" ,
2021-07-01 23:13:22 +02:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2021-07-01 17:11:43 +02:00
"forks_count" : 1 ,
"forks" : 1 ,
2021-07-01 23:13:22 +02:00
"watchers" : 3 ,
2021-07-01 11:11:50 +02:00
"score" : 0
} ,
{
"id" : 381971547 ,
"name" : "CVE-2021-1675-LPE-EXP" ,
"full_name" : "evilashz\/CVE-2021-1675-LPE-EXP" ,
"owner" : {
"login" : "evilashz" ,
"id" : 50722929 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/50722929?v=4" ,
"html_url" : "https:\/\/github.com\/evilashz"
} ,
"html_url" : "https:\/\/github.com\/evilashz\/CVE-2021-1675-LPE-EXP" ,
2021-07-02 17:11:48 +02:00
"description" : "CVE-2021-1675 LPE Exploit" ,
2021-07-01 11:11:50 +02:00
"fork" : false ,
"created_at" : "2021-07-01T09:00:31Z" ,
2021-07-03 11:11:22 +02:00
"updated_at" : "2021-07-03T08:14:41Z" ,
2021-07-02 17:11:48 +02:00
"pushed_at" : "2021-07-02T10:47:36Z" ,
2021-07-03 11:11:22 +02:00
"stargazers_count" : 9 ,
"watchers_count" : 9 ,
"forks_count" : 4 ,
"forks" : 4 ,
"watchers" : 9 ,
2021-07-01 17:11:43 +02:00
"score" : 0
} ,
{
"id" : 381984439 ,
"name" : "CVE-2021-1675-LPE" ,
"full_name" : "hlldz\/CVE-2021-1675-LPE" ,
"owner" : {
"login" : "hlldz" ,
"id" : 16455559 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16455559?v=4" ,
"html_url" : "https:\/\/github.com\/hlldz"
} ,
"html_url" : "https:\/\/github.com\/hlldz\/CVE-2021-1675-LPE" ,
"description" : "Local Privilege Escalation Edition for CVE-2021-1675" ,
"fork" : false ,
"created_at" : "2021-07-01T09:47:13Z" ,
2021-07-03 11:11:22 +02:00
"updated_at" : "2021-07-03T08:52:09Z" ,
2021-07-01 17:11:43 +02:00
"pushed_at" : "2021-07-01T13:24:06Z" ,
2021-07-03 11:11:22 +02:00
"stargazers_count" : 157 ,
"watchers_count" : 157 ,
"forks_count" : 38 ,
"forks" : 38 ,
"watchers" : 157 ,
2021-07-01 17:11:43 +02:00
"score" : 0
} ,
{
"id" : 382024474 ,
"name" : "CVE-2021-1675" ,
"full_name" : "puckiestyle\/CVE-2021-1675" ,
"owner" : {
"login" : "puckiestyle" ,
"id" : 57447087 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4" ,
"html_url" : "https:\/\/github.com\/puckiestyle"
} ,
"html_url" : "https:\/\/github.com\/puckiestyle\/CVE-2021-1675" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-01T12:24:19Z" ,
2021-07-02 11:11:33 +02:00
"updated_at" : "2021-07-02T07:38:26Z" ,
2021-07-01 17:11:43 +02:00
"pushed_at" : "2021-07-01T12:24:29Z" ,
2021-07-02 11:11:33 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 2 ,
"forks" : 2 ,
"watchers" : 1 ,
2021-07-01 17:11:43 +02:00
"score" : 0
} ,
{
"id" : 382050919 ,
"name" : "CVE-2021-1675_PrintNightMare" ,
"full_name" : "cybersecurityworks553\/CVE-2021-1675_PrintNightMare" ,
"owner" : {
"login" : "cybersecurityworks553" ,
"id" : 63910792 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4" ,
"html_url" : "https:\/\/github.com\/cybersecurityworks553"
} ,
"html_url" : "https:\/\/github.com\/cybersecurityworks553\/CVE-2021-1675_PrintNightMare" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-01T13:58:01Z" ,
2021-07-03 05:12:12 +02:00
"updated_at" : "2021-07-02T23:47:12Z" ,
2021-07-01 17:11:43 +02:00
"pushed_at" : "2021-07-01T14:26:05Z" ,
2021-07-03 05:12:12 +02:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2021-07-02 11:11:33 +02:00
"forks_count" : 2 ,
"forks" : 2 ,
2021-07-03 05:12:12 +02:00
"watchers" : 3 ,
2021-07-01 23:13:22 +02:00
"score" : 0
} ,
{
"id" : 382141130 ,
"name" : "CVE-2021-1675" ,
"full_name" : "tanarchytan\/CVE-2021-1675" ,
"owner" : {
"login" : "tanarchytan" ,
"id" : 2339027 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2339027?v=4" ,
"html_url" : "https:\/\/github.com\/tanarchytan"
} ,
"html_url" : "https:\/\/github.com\/tanarchytan\/CVE-2021-1675" ,
"description" : "Fix without disabling Print Spooler" ,
"fork" : false ,
"created_at" : "2021-07-01T19:50:46Z" ,
2021-07-02 11:11:33 +02:00
"updated_at" : "2021-07-02T04:32:21Z" ,
"pushed_at" : "2021-07-02T04:32:18Z" ,
2021-07-01 23:13:22 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2021-07-02 23:11:28 +02:00
"forks_count" : 1 ,
"forks" : 1 ,
2021-07-01 05:11:28 +02:00
"watchers" : 0 ,
2021-06-29 23:12:38 +02:00
"score" : 0
2021-07-02 05:11:29 +02:00
} ,
{
"id" : 382182179 ,
"name" : "CVE-2021-1675" ,
"full_name" : "calebstewart\/CVE-2021-1675" ,
"owner" : {
"login" : "calebstewart" ,
"id" : 7529189 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7529189?v=4" ,
"html_url" : "https:\/\/github.com\/calebstewart"
} ,
"html_url" : "https:\/\/github.com\/calebstewart\/CVE-2021-1675" ,
"description" : "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)" ,
"fork" : false ,
"created_at" : "2021-07-01T23:45:58Z" ,
2021-07-03 11:11:22 +02:00
"updated_at" : "2021-07-03T09:04:58Z" ,
2021-07-02 23:11:28 +02:00
"pushed_at" : "2021-07-02T16:03:25Z" ,
2021-07-03 11:11:22 +02:00
"stargazers_count" : 272 ,
"watchers_count" : 272 ,
"forks_count" : 74 ,
"forks" : 74 ,
"watchers" : 272 ,
2021-07-02 05:11:29 +02:00
"score" : 0
} ,
{
"id" : 382200984 ,
"name" : "CVE-2021-1675-SCANNER" ,
"full_name" : "Leonidus0x10\/CVE-2021-1675-SCANNER" ,
"owner" : {
"login" : "Leonidus0x10" ,
"id" : 72128281 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/72128281?v=4" ,
"html_url" : "https:\/\/github.com\/Leonidus0x10"
} ,
"html_url" : "https:\/\/github.com\/Leonidus0x10\/CVE-2021-1675-SCANNER" ,
"description" : "Vulnerability Scanner for CVE-2021-1675\/PrintNightmare" ,
"fork" : false ,
"created_at" : "2021-07-02T01:45:00Z" ,
2021-07-03 11:11:22 +02:00
"updated_at" : "2021-07-03T03:46:32Z" ,
2021-07-02 05:11:29 +02:00
"pushed_at" : "2021-07-02T01:52:46Z" ,
2021-07-03 11:11:22 +02:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
2021-07-02 11:11:33 +02:00
"forks_count" : 0 ,
"forks" : 0 ,
2021-07-03 11:11:22 +02:00
"watchers" : 4 ,
2021-07-02 11:11:33 +02:00
"score" : 0
} ,
{
"id" : 382249207 ,
"name" : "CVE-2021-1675" ,
"full_name" : "thomasgeens\/CVE-2021-1675" ,
"owner" : {
"login" : "thomasgeens" ,
"id" : 2236721 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2236721?v=4" ,
"html_url" : "https:\/\/github.com\/thomasgeens"
} ,
"html_url" : "https:\/\/github.com\/thomasgeens\/CVE-2021-1675" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-02T06:14:29Z" ,
2021-07-02 17:11:48 +02:00
"updated_at" : "2021-07-02T12:17:58Z" ,
2021-07-02 11:11:33 +02:00
"pushed_at" : "2021-07-02T06:14:39Z" ,
2021-07-02 17:11:48 +02:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-07-02 11:11:33 +02:00
"forks_count" : 0 ,
"forks" : 0 ,
2021-07-02 17:11:48 +02:00
"watchers" : 2 ,
2021-07-02 11:11:33 +02:00
"score" : 0
} ,
{
"id" : 382266932 ,
"name" : "CVE-2021-1675_CarbonBlack_HuntingQuery" ,
"full_name" : "mrezqi\/CVE-2021-1675_CarbonBlack_HuntingQuery" ,
"owner" : {
"login" : "mrezqi" ,
"id" : 2455832 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2455832?v=4" ,
"html_url" : "https:\/\/github.com\/mrezqi"
} ,
"html_url" : "https:\/\/github.com\/mrezqi\/CVE-2021-1675_CarbonBlack_HuntingQuery" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-02T07:30:24Z" ,
"updated_at" : "2021-07-02T08:01:10Z" ,
"pushed_at" : "2021-07-02T08:01:07Z" ,
2021-07-02 05:11:29 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-07-02 23:11:28 +02:00
} ,
{
"id" : 382399375 ,
"name" : "CVE-2021-1675-PrintNightmare" ,
"full_name" : "killtr0\/CVE-2021-1675-PrintNightmare" ,
"owner" : {
"login" : "killtr0" ,
"id" : 22793707 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/22793707?v=4" ,
"html_url" : "https:\/\/github.com\/killtr0"
} ,
"html_url" : "https:\/\/github.com\/killtr0\/CVE-2021-1675-PrintNightmare" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-02T16:12:15Z" ,
"updated_at" : "2021-07-02T16:13:01Z" ,
"pushed_at" : "2021-07-02T16:12:59Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 382418030 ,
"name" : "CVE-2021-1675" ,
"full_name" : "kougyokugentou\/CVE-2021-1675" ,
"owner" : {
"login" : "kougyokugentou" ,
"id" : 41278462 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/41278462?v=4" ,
"html_url" : "https:\/\/github.com\/kougyokugentou"
} ,
"html_url" : "https:\/\/github.com\/kougyokugentou\/CVE-2021-1675" ,
"description" : "A small powershell script to disable print spooler service using desired state configuration" ,
"fork" : false ,
"created_at" : "2021-07-02T17:29:04Z" ,
"updated_at" : "2021-07-02T17:41:53Z" ,
"pushed_at" : "2021-07-02T17:40:09Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 382425733 ,
"name" : "CVE-2021-1675" ,
"full_name" : "ptter23\/CVE-2021-1675" ,
"owner" : {
"login" : "ptter23" ,
"id" : 55167410 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/55167410?v=4" ,
"html_url" : "https:\/\/github.com\/ptter23"
} ,
"html_url" : "https:\/\/github.com\/ptter23\/CVE-2021-1675" ,
"description" : "CVE-2021-1675: ZERO-DAY VULNERABILITY IN WINDOWS PRINTER SERVICE WITH AN EXPLOIT AVAILABLE IN ALL OPERATING SYSTEM VERSIONS" ,
"fork" : false ,
"created_at" : "2021-07-02T18:01:21Z" ,
"updated_at" : "2021-07-02T18:07:48Z" ,
"pushed_at" : "2021-07-02T18:07:45Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-07-03 05:12:12 +02:00
} ,
{
"id" : 382466613 ,
"name" : "CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler" ,
"full_name" : "gohrenberg\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler" ,
"owner" : {
"login" : "gohrenberg" ,
"id" : 80491750 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/80491750?v=4" ,
"html_url" : "https:\/\/github.com\/gohrenberg"
} ,
"html_url" : "https:\/\/github.com\/gohrenberg\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler" ,
"description" : "Temporary mitigation to the CVE-2021-1675. 'Spooler' service-disabled based on time schedule. PowerShell Scripts and Task Scheduler code provided. " ,
"fork" : false ,
"created_at" : "2021-07-02T21:18:11Z" ,
"updated_at" : "2021-07-02T22:08:33Z" ,
"pushed_at" : "2021-07-02T22:06:46Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 382496518 ,
"name" : "cve-2021-1675-printnightmare" ,
"full_name" : "initconf\/cve-2021-1675-printnightmare" ,
"owner" : {
"login" : "initconf" ,
"id" : 4044729 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4" ,
"html_url" : "https:\/\/github.com\/initconf"
} ,
"html_url" : "https:\/\/github.com\/initconf\/cve-2021-1675-printnightmare" ,
"description" : "to catch cve-2021-1675-printnightmare" ,
"fork" : false ,
"created_at" : "2021-07-03T01:04:06Z" ,
"updated_at" : "2021-07-03T01:08:45Z" ,
"pushed_at" : "2021-07-03T01:08:43Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-06-29 17:12:46 +02:00
}
]