2021-07-02 18:11:33 +09:00
[
{
"id" : 382021281 ,
"name" : "CVE-2021-34527" ,
"full_name" : "DenizSe\/CVE-2021-34527" ,
"owner" : {
"login" : "DenizSe" ,
"id" : 43039427 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/43039427?v=4" ,
"html_url" : "https:\/\/github.com\/DenizSe"
} ,
"html_url" : "https:\/\/github.com\/DenizSe\/CVE-2021-34527" ,
"description" : "Small Powershell Script to detect Running Printer Spoolers on Domain Controller" ,
"fork" : false ,
"created_at" : "2021-07-01T12:12:16Z" ,
"updated_at" : "2021-07-02T07:49:06Z" ,
"pushed_at" : "2021-07-02T07:45:59Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2021-07-07 00:11:52 +09:00
"forks_count" : 1 ,
"forks" : 1 ,
2021-07-02 18:11:33 +09:00
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 382267064 ,
"name" : "PrintNightmare" ,
"full_name" : "glshnu\/PrintNightmare" ,
"owner" : {
"login" : "glshnu" ,
"id" : 7205231 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7205231?v=4" ,
"html_url" : "https:\/\/github.com\/glshnu"
} ,
"html_url" : "https:\/\/github.com\/glshnu\/PrintNightmare" ,
"description" : "Kritische Sicherheitslücke PrintNightmare CVE-2021-34527" ,
"fork" : false ,
"created_at" : "2021-07-02T07:30:52Z" ,
2021-07-09 00:12:02 +09:00
"updated_at" : "2021-07-08T11:34:54Z" ,
"pushed_at" : "2021-07-08T11:34:51Z" ,
2021-07-03 12:12:12 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-07-05 06:11:25 +09:00
"forks_count" : 4 ,
"forks" : 4 ,
2021-07-03 12:12:12 +09:00
"watchers" : 2 ,
2021-07-02 18:11:33 +09:00
"score" : 0
2021-07-03 00:11:48 +09:00
} ,
{
"id" : 382335385 ,
"name" : "CVE-2021-34527" ,
"full_name" : "JohnHammond\/CVE-2021-34527" ,
"owner" : {
"login" : "JohnHammond" ,
"id" : 6288722 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6288722?v=4" ,
"html_url" : "https:\/\/github.com\/JohnHammond"
} ,
"html_url" : "https:\/\/github.com\/JohnHammond\/CVE-2021-34527" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-02T12:10:49Z" ,
2021-07-09 00:12:02 +09:00
"updated_at" : "2021-07-08T13:07:25Z" ,
2021-07-03 00:11:48 +09:00
"pushed_at" : "2021-07-02T12:17:50Z" ,
2021-07-09 00:12:02 +09:00
"stargazers_count" : 90 ,
"watchers_count" : 90 ,
2021-07-08 12:11:34 +09:00
"forks_count" : 16 ,
"forks" : 16 ,
2021-07-09 00:12:02 +09:00
"watchers" : 90 ,
2021-07-03 00:11:48 +09:00
"score" : 0
} ,
{
"id" : 382370746 ,
"name" : "Fix-CVE-2021-34527" ,
"full_name" : "fardinbarashi\/Fix-CVE-2021-34527" ,
"owner" : {
"login" : "fardinbarashi" ,
"id" : 15907769 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/15907769?v=4" ,
"html_url" : "https:\/\/github.com\/fardinbarashi"
} ,
"html_url" : "https:\/\/github.com\/fardinbarashi\/Fix-CVE-2021-34527" ,
"description" : "Fix for the security" ,
"fork" : false ,
"created_at" : "2021-07-02T14:25:44Z" ,
2021-07-03 18:11:22 +09:00
"updated_at" : "2021-07-03T09:03:00Z" ,
"pushed_at" : "2021-07-03T09:02:58Z" ,
2021-07-03 00:11:48 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-07-04 18:11:22 +09:00
} ,
{
"id" : 382645654 ,
"name" : "PrintNightmare-CVE-2021-34527" ,
"full_name" : "nemo-wq\/PrintNightmare-CVE-2021-34527" ,
"owner" : {
"login" : "nemo-wq" ,
"id" : 28733668 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/28733668?v=4" ,
"html_url" : "https:\/\/github.com\/nemo-wq"
} ,
"html_url" : "https:\/\/github.com\/nemo-wq\/PrintNightmare-CVE-2021-34527" ,
"description" : "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits" ,
"fork" : false ,
"created_at" : "2021-07-03T15:15:12Z" ,
2021-07-08 12:11:34 +09:00
"updated_at" : "2021-07-07T23:53:31Z" ,
2021-07-04 18:11:22 +09:00
"pushed_at" : "2021-07-04T06:26:48Z" ,
2021-07-08 12:11:34 +09:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
2021-07-08 00:12:18 +09:00
"forks_count" : 2 ,
"forks" : 2 ,
2021-07-08 12:11:34 +09:00
"watchers" : 4 ,
2021-07-04 18:11:22 +09:00
"score" : 0
2021-07-05 06:11:25 +09:00
} ,
{
"id" : 382894525 ,
"name" : "CVE-2021-34527-1675" ,
"full_name" : "CnOxx1\/CVE-2021-34527-1675" ,
"owner" : {
"login" : "CnOxx1" ,
"id" : 86923954 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/86923954?v=4" ,
"html_url" : "https:\/\/github.com\/CnOxx1"
} ,
"html_url" : "https:\/\/github.com\/CnOxx1\/CVE-2021-34527-1675" ,
"description" : "Cve-2021-1675 or cve-2021-34527? Detailed analysis and exploitation of windows print spooler 0day vulnerability! ! ! " ,
"fork" : false ,
"created_at" : "2021-07-04T16:09:18Z" ,
2021-07-05 12:11:34 +09:00
"updated_at" : "2021-07-05T01:15:21Z" ,
2021-07-05 06:11:25 +09:00
"pushed_at" : "2021-07-04T16:31:21Z" ,
2021-07-05 12:11:34 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-07-05 06:11:25 +09:00
"forks_count" : 0 ,
"forks" : 0 ,
2021-07-05 12:11:34 +09:00
"watchers" : 2 ,
2021-07-05 06:11:25 +09:00
"score" : 0
2021-07-06 06:11:36 +09:00
} ,
{
"id" : 383207766 ,
"name" : "disable-RegisterSpoolerRemoteRpcEndPoint" ,
"full_name" : "rdboboia\/disable-RegisterSpoolerRemoteRpcEndPoint" ,
"owner" : {
"login" : "rdboboia" ,
"id" : 37208426 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/37208426?v=4" ,
"html_url" : "https:\/\/github.com\/rdboboia"
} ,
"html_url" : "https:\/\/github.com\/rdboboia\/disable-RegisterSpoolerRemoteRpcEndPoint" ,
"description" : "Workaround for Windows Print Spooler Remote Code Execution Vulnerability(CVE-2021-34527). See: https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34527" ,
"fork" : false ,
"created_at" : "2021-07-05T16:49:32Z" ,
2021-07-07 18:11:46 +09:00
"updated_at" : "2021-07-07T05:11:13Z" ,
2021-07-06 06:11:36 +09:00
"pushed_at" : "2021-07-05T17:51:30Z" ,
2021-07-07 18:11:46 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-07-06 06:11:36 +09:00
"forks_count" : 0 ,
"forks" : 0 ,
2021-07-07 18:11:46 +09:00
"watchers" : 1 ,
2021-07-06 06:11:36 +09:00
"score" : 0
} ,
{
"id" : 383223006 ,
"name" : "CVE-2021-34527-PrintNightmare-Workaround" ,
"full_name" : "geekbrett\/CVE-2021-34527-PrintNightmare-Workaround" ,
"owner" : {
"login" : "geekbrett" ,
"id" : 22183376 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/22183376?v=4" ,
"html_url" : "https:\/\/github.com\/geekbrett"
} ,
"html_url" : "https:\/\/github.com\/geekbrett\/CVE-2021-34527-PrintNightmare-Workaround" ,
"description" : "This simple PowerShell script is in response to the \"PrintNightmare\" vulnerability. This was designed to give a end user the ability to stop and disable the \"Print Spooler\" service on their computer while awaiting a fix from Microsoft." ,
"fork" : false ,
"created_at" : "2021-07-05T17:50:56Z" ,
2021-07-08 06:11:42 +09:00
"updated_at" : "2021-07-07T17:18:09Z" ,
"pushed_at" : "2021-07-07T17:18:07Z" ,
2021-07-06 06:11:36 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 383252170 ,
"name" : "CVE-2021-34527-workaround" ,
"full_name" : "officedrone\/CVE-2021-34527-workaround" ,
"owner" : {
"login" : "officedrone" ,
"id" : 67024372 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/67024372?v=4" ,
"html_url" : "https:\/\/github.com\/officedrone"
} ,
"html_url" : "https:\/\/github.com\/officedrone\/CVE-2021-34527-workaround" ,
"description" : "Disable remote sessions to print spooler withtout disabling the print spooler service " ,
"fork" : false ,
"created_at" : "2021-07-05T20:02:50Z" ,
2021-07-08 00:12:18 +09:00
"updated_at" : "2021-07-07T13:34:12Z" ,
"pushed_at" : "2021-07-07T13:34:09Z" ,
2021-07-06 06:11:36 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-07-07 06:11:35 +09:00
} ,
{
"id" : 383254488 ,
"name" : "ItWasAllADream" ,
"full_name" : "byt3bl33d3r\/ItWasAllADream" ,
"owner" : {
"login" : "byt3bl33d3r" ,
"id" : 5151193 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5151193?v=4" ,
"html_url" : "https:\/\/github.com\/byt3bl33d3r"
} ,
"html_url" : "https:\/\/github.com\/byt3bl33d3r\/ItWasAllADream" ,
"description" : "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE" ,
"fork" : false ,
"created_at" : "2021-07-05T20:13:49Z" ,
2021-07-09 00:12:02 +09:00
"updated_at" : "2021-07-08T15:16:04Z" ,
"pushed_at" : "2021-07-08T12:00:11Z" ,
"stargazers_count" : 404 ,
"watchers_count" : 404 ,
"forks_count" : 53 ,
"forks" : 53 ,
"watchers" : 404 ,
2021-07-07 18:11:46 +09:00
"score" : 0
} ,
{
"id" : 383699836 ,
"name" : "Disable-Spooler-Service-PrintNightmare-CVE-2021-34527" ,
"full_name" : "vinaysudheer\/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527" ,
"owner" : {
"login" : "vinaysudheer" ,
"id" : 29897973 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29897973?v=4" ,
"html_url" : "https:\/\/github.com\/vinaysudheer"
} ,
"html_url" : "https:\/\/github.com\/vinaysudheer\/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527" ,
"description" : "Simple batch script to disable the Microsoft Print Spooler service from system" ,
"fork" : false ,
"created_at" : "2021-07-07T06:41:15Z" ,
"updated_at" : "2021-07-07T06:47:16Z" ,
"pushed_at" : "2021-07-07T06:47:13Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 383719689 ,
"name" : "PrintNightmare-CVE-2021-34527" ,
"full_name" : "powershellpr0mpt\/PrintNightmare-CVE-2021-34527" ,
"owner" : {
"login" : "powershellpr0mpt" ,
"id" : 9294993 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/9294993?v=4" ,
"html_url" : "https:\/\/github.com\/powershellpr0mpt"
} ,
"html_url" : "https:\/\/github.com\/powershellpr0mpt\/PrintNightmare-CVE-2021-34527" ,
"description" : "How to fix the PrintNightmare vulnerability" ,
"fork" : false ,
"created_at" : "2021-07-07T07:58:53Z" ,
2021-07-08 00:12:18 +09:00
"updated_at" : "2021-07-07T10:00:34Z" ,
"pushed_at" : "2021-07-07T10:00:32Z" ,
2021-07-07 18:11:46 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
2021-07-07 06:11:35 +09:00
"score" : 0
2021-07-08 12:11:34 +09:00
} ,
{
"id" : 383968301 ,
"name" : "CVE-2021-34527_ACL_mitigation" ,
"full_name" : "WidespreadPandemic\/CVE-2021-34527_ACL_mitigation" ,
"owner" : {
"login" : "WidespreadPandemic" ,
"id" : 75406207 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/75406207?v=4" ,
"html_url" : "https:\/\/github.com\/WidespreadPandemic"
} ,
"html_url" : "https:\/\/github.com\/WidespreadPandemic\/CVE-2021-34527_ACL_mitigation" ,
"description" : "Mitigation for CVE-2021-34527 RCE by setting WRITE ACLs" ,
"fork" : false ,
"created_at" : "2021-07-08T01:32:18Z" ,
"updated_at" : "2021-07-08T02:46:52Z" ,
"pushed_at" : "2021-07-08T02:46:49Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-07-02 18:11:33 +09:00
}
]