PoC-in-GitHub/2021/CVE-2021-1675.json

416 lines
15 KiB
JSON
Raw Normal View History

2021-06-29 17:12:46 +02:00
[
{
"id": 381392691,
"name": "CVE-2021-1675",
"full_name": "yu2u\/CVE-2021-1675",
"owner": {
"login": "yu2u",
"id": 25322880,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25322880?v=4",
"html_url": "https:\/\/github.com\/yu2u"
},
"html_url": "https:\/\/github.com\/yu2u\/CVE-2021-1675",
"description": "CVE-2021-1675 exploit",
"fork": false,
"created_at": "2021-06-29T14:24:30Z",
2021-07-02 05:11:29 +02:00
"updated_at": "2021-07-02T01:01:45Z",
2021-06-29 17:12:46 +02:00
"pushed_at": "2021-06-29T14:26:25Z",
2021-07-02 05:11:29 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2021-06-30 17:11:40 +02:00
"forks_count": 1,
"forks": 1,
2021-07-02 05:11:29 +02:00
"watchers": 1,
2021-06-29 17:12:46 +02:00
"score": 0
2021-06-29 23:12:38 +02:00
},
{
"id": 381444656,
"name": "CVE-2021-1675",
"full_name": "cube0x0\/CVE-2021-1675",
"owner": {
"login": "cube0x0",
"id": 39370848,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39370848?v=4",
"html_url": "https:\/\/github.com\/cube0x0"
},
"html_url": "https:\/\/github.com\/cube0x0\/CVE-2021-1675",
2021-07-01 17:11:43 +02:00
"description": "C# and Impacket implementation of CVE-2021-1675\/PrintNightmare",
2021-06-29 23:12:38 +02:00
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
2021-07-03 11:11:22 +02:00
"updated_at": "2021-07-03T09:05:49Z",
"pushed_at": "2021-07-03T07:59:54Z",
"stargazers_count": 864,
"watchers_count": 864,
"forks_count": 327,
"forks": 327,
"watchers": 864,
2021-06-30 23:11:27 +02:00
"score": 0
},
{
"id": 381799016,
"name": "CVE-2021-1675",
"full_name": "LaresLLC\/CVE-2021-1675",
"owner": {
"login": "LaresLLC",
"id": 63059624,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63059624?v=4",
"html_url": "https:\/\/github.com\/LaresLLC"
},
"html_url": "https:\/\/github.com\/LaresLLC\/CVE-2021-1675",
"description": "CVE-2021-1675 Detection Info",
"fork": false,
"created_at": "2021-06-30T18:32:17Z",
2021-07-03 11:11:22 +02:00
"updated_at": "2021-07-03T07:10:48Z",
2021-07-03 05:12:12 +02:00
"pushed_at": "2021-07-02T21:27:47Z",
2021-07-03 11:11:22 +02:00
"stargazers_count": 110,
"watchers_count": 110,
"forks_count": 19,
"forks": 19,
"watchers": 110,
2021-07-01 05:11:28 +02:00
"score": 0
},
{
"id": 381858715,
"name": "patch-cve-2021-1675",
"full_name": "kondah\/patch-cve-2021-1675",
"owner": {
"login": "kondah",
"id": 7760108,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7760108?v=4",
"html_url": "https:\/\/github.com\/kondah"
},
"html_url": "https:\/\/github.com\/kondah\/patch-cve-2021-1675",
"description": null,
"fork": false,
"created_at": "2021-06-30T23:39:21Z",
2021-07-01 23:13:22 +02:00
"updated_at": "2021-07-01T19:35:37Z",
2021-07-01 05:11:28 +02:00
"pushed_at": "2021-06-30T23:40:44Z",
2021-07-01 23:13:22 +02:00
"stargazers_count": 3,
"watchers_count": 3,
2021-07-01 17:11:43 +02:00
"forks_count": 1,
"forks": 1,
2021-07-01 23:13:22 +02:00
"watchers": 3,
2021-07-01 11:11:50 +02:00
"score": 0
},
{
"id": 381971547,
"name": "CVE-2021-1675-LPE-EXP",
"full_name": "evilashz\/CVE-2021-1675-LPE-EXP",
"owner": {
"login": "evilashz",
"id": 50722929,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50722929?v=4",
"html_url": "https:\/\/github.com\/evilashz"
},
"html_url": "https:\/\/github.com\/evilashz\/CVE-2021-1675-LPE-EXP",
2021-07-02 17:11:48 +02:00
"description": "CVE-2021-1675 LPE Exploit",
2021-07-01 11:11:50 +02:00
"fork": false,
"created_at": "2021-07-01T09:00:31Z",
2021-07-03 11:11:22 +02:00
"updated_at": "2021-07-03T08:14:41Z",
2021-07-02 17:11:48 +02:00
"pushed_at": "2021-07-02T10:47:36Z",
2021-07-03 11:11:22 +02:00
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 4,
"forks": 4,
"watchers": 9,
2021-07-01 17:11:43 +02:00
"score": 0
},
{
"id": 381984439,
"name": "CVE-2021-1675-LPE",
"full_name": "hlldz\/CVE-2021-1675-LPE",
"owner": {
"login": "hlldz",
"id": 16455559,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16455559?v=4",
"html_url": "https:\/\/github.com\/hlldz"
},
"html_url": "https:\/\/github.com\/hlldz\/CVE-2021-1675-LPE",
"description": "Local Privilege Escalation Edition for CVE-2021-1675",
"fork": false,
"created_at": "2021-07-01T09:47:13Z",
2021-07-03 11:11:22 +02:00
"updated_at": "2021-07-03T08:52:09Z",
2021-07-01 17:11:43 +02:00
"pushed_at": "2021-07-01T13:24:06Z",
2021-07-03 11:11:22 +02:00
"stargazers_count": 157,
"watchers_count": 157,
"forks_count": 38,
"forks": 38,
"watchers": 157,
2021-07-01 17:11:43 +02:00
"score": 0
},
{
"id": 382024474,
"name": "CVE-2021-1675",
"full_name": "puckiestyle\/CVE-2021-1675",
"owner": {
"login": "puckiestyle",
"id": 57447087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
"html_url": "https:\/\/github.com\/puckiestyle"
},
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-1675",
"description": null,
"fork": false,
"created_at": "2021-07-01T12:24:19Z",
2021-07-02 11:11:33 +02:00
"updated_at": "2021-07-02T07:38:26Z",
2021-07-01 17:11:43 +02:00
"pushed_at": "2021-07-01T12:24:29Z",
2021-07-02 11:11:33 +02:00
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
2021-07-01 17:11:43 +02:00
"score": 0
},
{
"id": 382050919,
"name": "CVE-2021-1675_PrintNightMare",
"full_name": "cybersecurityworks553\/CVE-2021-1675_PrintNightMare",
"owner": {
"login": "cybersecurityworks553",
"id": 63910792,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4",
"html_url": "https:\/\/github.com\/cybersecurityworks553"
},
"html_url": "https:\/\/github.com\/cybersecurityworks553\/CVE-2021-1675_PrintNightMare",
"description": null,
"fork": false,
"created_at": "2021-07-01T13:58:01Z",
2021-07-03 05:12:12 +02:00
"updated_at": "2021-07-02T23:47:12Z",
2021-07-01 17:11:43 +02:00
"pushed_at": "2021-07-01T14:26:05Z",
2021-07-03 05:12:12 +02:00
"stargazers_count": 3,
"watchers_count": 3,
2021-07-02 11:11:33 +02:00
"forks_count": 2,
"forks": 2,
2021-07-03 05:12:12 +02:00
"watchers": 3,
2021-07-01 23:13:22 +02:00
"score": 0
},
{
"id": 382141130,
"name": "CVE-2021-1675",
"full_name": "tanarchytan\/CVE-2021-1675",
"owner": {
"login": "tanarchytan",
"id": 2339027,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2339027?v=4",
"html_url": "https:\/\/github.com\/tanarchytan"
},
"html_url": "https:\/\/github.com\/tanarchytan\/CVE-2021-1675",
"description": "Fix without disabling Print Spooler",
"fork": false,
"created_at": "2021-07-01T19:50:46Z",
2021-07-02 11:11:33 +02:00
"updated_at": "2021-07-02T04:32:21Z",
"pushed_at": "2021-07-02T04:32:18Z",
2021-07-01 23:13:22 +02:00
"stargazers_count": 0,
"watchers_count": 0,
2021-07-02 23:11:28 +02:00
"forks_count": 1,
"forks": 1,
2021-07-01 05:11:28 +02:00
"watchers": 0,
2021-06-29 23:12:38 +02:00
"score": 0
2021-07-02 05:11:29 +02:00
},
{
"id": 382182179,
"name": "CVE-2021-1675",
"full_name": "calebstewart\/CVE-2021-1675",
"owner": {
"login": "calebstewart",
"id": 7529189,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7529189?v=4",
"html_url": "https:\/\/github.com\/calebstewart"
},
"html_url": "https:\/\/github.com\/calebstewart\/CVE-2021-1675",
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
2021-07-03 11:11:22 +02:00
"updated_at": "2021-07-03T09:04:58Z",
2021-07-02 23:11:28 +02:00
"pushed_at": "2021-07-02T16:03:25Z",
2021-07-03 11:11:22 +02:00
"stargazers_count": 272,
"watchers_count": 272,
"forks_count": 74,
"forks": 74,
"watchers": 272,
2021-07-02 05:11:29 +02:00
"score": 0
},
{
"id": 382200984,
"name": "CVE-2021-1675-SCANNER",
"full_name": "Leonidus0x10\/CVE-2021-1675-SCANNER",
"owner": {
"login": "Leonidus0x10",
"id": 72128281,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72128281?v=4",
"html_url": "https:\/\/github.com\/Leonidus0x10"
},
"html_url": "https:\/\/github.com\/Leonidus0x10\/CVE-2021-1675-SCANNER",
"description": "Vulnerability Scanner for CVE-2021-1675\/PrintNightmare",
"fork": false,
"created_at": "2021-07-02T01:45:00Z",
2021-07-03 11:11:22 +02:00
"updated_at": "2021-07-03T03:46:32Z",
2021-07-02 05:11:29 +02:00
"pushed_at": "2021-07-02T01:52:46Z",
2021-07-03 11:11:22 +02:00
"stargazers_count": 4,
"watchers_count": 4,
2021-07-02 11:11:33 +02:00
"forks_count": 0,
"forks": 0,
2021-07-03 11:11:22 +02:00
"watchers": 4,
2021-07-02 11:11:33 +02:00
"score": 0
},
{
"id": 382249207,
"name": "CVE-2021-1675",
"full_name": "thomasgeens\/CVE-2021-1675",
"owner": {
"login": "thomasgeens",
"id": 2236721,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2236721?v=4",
"html_url": "https:\/\/github.com\/thomasgeens"
},
"html_url": "https:\/\/github.com\/thomasgeens\/CVE-2021-1675",
"description": null,
"fork": false,
"created_at": "2021-07-02T06:14:29Z",
2021-07-02 17:11:48 +02:00
"updated_at": "2021-07-02T12:17:58Z",
2021-07-02 11:11:33 +02:00
"pushed_at": "2021-07-02T06:14:39Z",
2021-07-02 17:11:48 +02:00
"stargazers_count": 2,
"watchers_count": 2,
2021-07-02 11:11:33 +02:00
"forks_count": 0,
"forks": 0,
2021-07-02 17:11:48 +02:00
"watchers": 2,
2021-07-02 11:11:33 +02:00
"score": 0
},
{
"id": 382266932,
"name": "CVE-2021-1675_CarbonBlack_HuntingQuery",
"full_name": "mrezqi\/CVE-2021-1675_CarbonBlack_HuntingQuery",
"owner": {
"login": "mrezqi",
"id": 2455832,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2455832?v=4",
"html_url": "https:\/\/github.com\/mrezqi"
},
"html_url": "https:\/\/github.com\/mrezqi\/CVE-2021-1675_CarbonBlack_HuntingQuery",
"description": null,
"fork": false,
"created_at": "2021-07-02T07:30:24Z",
"updated_at": "2021-07-02T08:01:10Z",
"pushed_at": "2021-07-02T08:01:07Z",
2021-07-02 05:11:29 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2021-07-02 23:11:28 +02:00
},
{
"id": 382399375,
"name": "CVE-2021-1675-PrintNightmare",
"full_name": "killtr0\/CVE-2021-1675-PrintNightmare",
"owner": {
"login": "killtr0",
"id": 22793707,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22793707?v=4",
"html_url": "https:\/\/github.com\/killtr0"
},
"html_url": "https:\/\/github.com\/killtr0\/CVE-2021-1675-PrintNightmare",
"description": null,
"fork": false,
"created_at": "2021-07-02T16:12:15Z",
"updated_at": "2021-07-02T16:13:01Z",
"pushed_at": "2021-07-02T16:12:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 382418030,
"name": "CVE-2021-1675",
"full_name": "kougyokugentou\/CVE-2021-1675",
"owner": {
"login": "kougyokugentou",
"id": 41278462,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41278462?v=4",
"html_url": "https:\/\/github.com\/kougyokugentou"
},
"html_url": "https:\/\/github.com\/kougyokugentou\/CVE-2021-1675",
"description": "A small powershell script to disable print spooler service using desired state configuration",
"fork": false,
"created_at": "2021-07-02T17:29:04Z",
"updated_at": "2021-07-02T17:41:53Z",
"pushed_at": "2021-07-02T17:40:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 382425733,
"name": "CVE-2021-1675",
"full_name": "ptter23\/CVE-2021-1675",
"owner": {
"login": "ptter23",
"id": 55167410,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55167410?v=4",
"html_url": "https:\/\/github.com\/ptter23"
},
"html_url": "https:\/\/github.com\/ptter23\/CVE-2021-1675",
"description": "CVE-2021-1675: ZERO-DAY VULNERABILITY IN WINDOWS PRINTER SERVICE WITH AN EXPLOIT AVAILABLE IN ALL OPERATING SYSTEM VERSIONS",
"fork": false,
"created_at": "2021-07-02T18:01:21Z",
"updated_at": "2021-07-02T18:07:48Z",
"pushed_at": "2021-07-02T18:07:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2021-07-03 05:12:12 +02:00
},
{
"id": 382466613,
"name": "CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
"full_name": "gohrenberg\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
"owner": {
"login": "gohrenberg",
"id": 80491750,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80491750?v=4",
"html_url": "https:\/\/github.com\/gohrenberg"
},
"html_url": "https:\/\/github.com\/gohrenberg\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
"description": "Temporary mitigation to the CVE-2021-1675. 'Spooler' service-disabled based on time schedule. PowerShell Scripts and Task Scheduler code provided. ",
"fork": false,
"created_at": "2021-07-02T21:18:11Z",
"updated_at": "2021-07-02T22:08:33Z",
"pushed_at": "2021-07-02T22:06:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 382496518,
"name": "cve-2021-1675-printnightmare",
"full_name": "initconf\/cve-2021-1675-printnightmare",
"owner": {
"login": "initconf",
"id": 4044729,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4",
"html_url": "https:\/\/github.com\/initconf"
},
"html_url": "https:\/\/github.com\/initconf\/cve-2021-1675-printnightmare",
"description": "to catch cve-2021-1675-printnightmare",
"fork": false,
"created_at": "2021-07-03T01:04:06Z",
"updated_at": "2021-07-03T01:08:45Z",
"pushed_at": "2021-07-03T01:08:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2021-06-29 17:12:46 +02:00
}
]