2021-06-30 00:12:46 +09:00
[
{
"id" : 381392691 ,
"name" : "CVE-2021-1675" ,
"full_name" : "yu2u\/CVE-2021-1675" ,
"owner" : {
"login" : "yu2u" ,
"id" : 25322880 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/25322880?v=4" ,
"html_url" : "https:\/\/github.com\/yu2u"
} ,
"html_url" : "https:\/\/github.com\/yu2u\/CVE-2021-1675" ,
"description" : "CVE-2021-1675 exploit" ,
"fork" : false ,
"created_at" : "2021-06-29T14:24:30Z" ,
2021-07-02 12:11:29 +09:00
"updated_at" : "2021-07-02T01:01:45Z" ,
2021-06-30 00:12:46 +09:00
"pushed_at" : "2021-06-29T14:26:25Z" ,
2021-07-02 12:11:29 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-07-01 00:11:40 +09:00
"forks_count" : 1 ,
"forks" : 1 ,
2021-07-02 12:11:29 +09:00
"watchers" : 1 ,
2021-06-30 00:12:46 +09:00
"score" : 0
2021-06-30 06:12:38 +09:00
} ,
{
"id" : 381444656 ,
"name" : "CVE-2021-1675" ,
"full_name" : "cube0x0\/CVE-2021-1675" ,
"owner" : {
"login" : "cube0x0" ,
"id" : 39370848 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/39370848?v=4" ,
"html_url" : "https:\/\/github.com\/cube0x0"
} ,
"html_url" : "https:\/\/github.com\/cube0x0\/CVE-2021-1675" ,
2021-07-04 00:11:25 +09:00
"description" : "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527" ,
2021-06-30 06:12:38 +09:00
"fork" : false ,
"created_at" : "2021-06-29T17:24:14Z" ,
2021-09-11 12:11:58 +09:00
"updated_at" : "2021-09-11T01:24:08Z" ,
2021-07-21 06:11:48 +09:00
"pushed_at" : "2021-07-20T15:28:13Z" ,
2021-09-11 12:11:58 +09:00
"stargazers_count" : 1364 ,
"watchers_count" : 1364 ,
2021-09-12 18:12:31 +09:00
"forks_count" : 494 ,
"forks" : 494 ,
2021-09-11 12:11:58 +09:00
"watchers" : 1364 ,
2021-07-01 06:11:27 +09:00
"score" : 0
} ,
{
"id" : 381799016 ,
"name" : "CVE-2021-1675" ,
"full_name" : "LaresLLC\/CVE-2021-1675" ,
"owner" : {
"login" : "LaresLLC" ,
"id" : 63059624 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/63059624?v=4" ,
"html_url" : "https:\/\/github.com\/LaresLLC"
} ,
"html_url" : "https:\/\/github.com\/LaresLLC\/CVE-2021-1675" ,
"description" : "CVE-2021-1675 Detection Info" ,
"fork" : false ,
"created_at" : "2021-06-30T18:32:17Z" ,
2021-09-06 18:13:49 +09:00
"updated_at" : "2021-09-06T06:16:43Z" ,
2021-07-08 06:11:42 +09:00
"pushed_at" : "2021-07-07T15:43:05Z" ,
2021-09-06 18:13:49 +09:00
"stargazers_count" : 209 ,
"watchers_count" : 209 ,
2021-08-09 18:14:23 +09:00
"forks_count" : 34 ,
"forks" : 34 ,
2021-09-06 18:13:49 +09:00
"watchers" : 209 ,
2021-07-01 12:11:28 +09:00
"score" : 0
} ,
{
"id" : 381858715 ,
"name" : "patch-cve-2021-1675" ,
"full_name" : "kondah\/patch-cve-2021-1675" ,
"owner" : {
"login" : "kondah" ,
"id" : 7760108 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7760108?v=4" ,
"html_url" : "https:\/\/github.com\/kondah"
} ,
"html_url" : "https:\/\/github.com\/kondah\/patch-cve-2021-1675" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-06-30T23:39:21Z" ,
2021-07-02 06:13:22 +09:00
"updated_at" : "2021-07-01T19:35:37Z" ,
2021-07-01 12:11:28 +09:00
"pushed_at" : "2021-06-30T23:40:44Z" ,
2021-07-02 06:13:22 +09:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2021-07-02 00:11:43 +09:00
"forks_count" : 1 ,
"forks" : 1 ,
2021-07-02 06:13:22 +09:00
"watchers" : 3 ,
2021-07-01 18:11:50 +09:00
"score" : 0
} ,
{
"id" : 381971547 ,
"name" : "CVE-2021-1675-LPE-EXP" ,
"full_name" : "evilashz\/CVE-2021-1675-LPE-EXP" ,
"owner" : {
"login" : "evilashz" ,
"id" : 50722929 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/50722929?v=4" ,
"html_url" : "https:\/\/github.com\/evilashz"
} ,
"html_url" : "https:\/\/github.com\/evilashz\/CVE-2021-1675-LPE-EXP" ,
2021-07-06 12:11:32 +09:00
"description" : "PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527" ,
2021-07-01 18:11:50 +09:00
"fork" : false ,
"created_at" : "2021-07-01T09:00:31Z" ,
2021-09-06 12:12:28 +09:00
"updated_at" : "2021-09-06T01:05:25Z" ,
2021-07-03 00:11:48 +09:00
"pushed_at" : "2021-07-02T10:47:36Z" ,
2021-09-06 12:12:28 +09:00
"stargazers_count" : 27 ,
"watchers_count" : 27 ,
2021-09-11 00:13:00 +09:00
"forks_count" : 17 ,
"forks" : 17 ,
2021-09-06 12:12:28 +09:00
"watchers" : 27 ,
2021-07-02 00:11:43 +09:00
"score" : 0
} ,
{
"id" : 381984439 ,
"name" : "CVE-2021-1675-LPE" ,
"full_name" : "hlldz\/CVE-2021-1675-LPE" ,
"owner" : {
"login" : "hlldz" ,
"id" : 16455559 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16455559?v=4" ,
"html_url" : "https:\/\/github.com\/hlldz"
} ,
"html_url" : "https:\/\/github.com\/hlldz\/CVE-2021-1675-LPE" ,
2021-07-27 18:12:00 +09:00
"description" : "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527" ,
2021-07-02 00:11:43 +09:00
"fork" : false ,
"created_at" : "2021-07-01T09:47:13Z" ,
2021-09-11 00:13:00 +09:00
"updated_at" : "2021-09-10T14:21:51Z" ,
2021-07-05 18:11:42 +09:00
"pushed_at" : "2021-07-05T06:46:12Z" ,
2021-09-11 00:13:00 +09:00
"stargazers_count" : 296 ,
"watchers_count" : 296 ,
2021-08-22 00:12:03 +09:00
"forks_count" : 71 ,
"forks" : 71 ,
2021-09-11 00:13:00 +09:00
"watchers" : 296 ,
2021-07-02 00:11:43 +09:00
"score" : 0
} ,
{
"id" : 382024474 ,
"name" : "CVE-2021-1675" ,
"full_name" : "puckiestyle\/CVE-2021-1675" ,
"owner" : {
"login" : "puckiestyle" ,
"id" : 57447087 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4" ,
"html_url" : "https:\/\/github.com\/puckiestyle"
} ,
"html_url" : "https:\/\/github.com\/puckiestyle\/CVE-2021-1675" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-01T12:24:19Z" ,
2021-07-02 18:11:33 +09:00
"updated_at" : "2021-07-02T07:38:26Z" ,
2021-07-02 00:11:43 +09:00
"pushed_at" : "2021-07-01T12:24:29Z" ,
2021-07-02 18:11:33 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-07-26 18:12:10 +09:00
"forks_count" : 4 ,
"forks" : 4 ,
2021-07-02 18:11:33 +09:00
"watchers" : 1 ,
2021-07-02 00:11:43 +09:00
"score" : 0
} ,
{
"id" : 382050919 ,
"name" : "CVE-2021-1675_PrintNightMare" ,
"full_name" : "cybersecurityworks553\/CVE-2021-1675_PrintNightMare" ,
"owner" : {
"login" : "cybersecurityworks553" ,
"id" : 63910792 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4" ,
"html_url" : "https:\/\/github.com\/cybersecurityworks553"
} ,
"html_url" : "https:\/\/github.com\/cybersecurityworks553\/CVE-2021-1675_PrintNightMare" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-01T13:58:01Z" ,
2021-08-26 06:12:20 +09:00
"updated_at" : "2021-08-25T16:32:47Z" ,
2021-07-02 00:11:43 +09:00
"pushed_at" : "2021-07-01T14:26:05Z" ,
2021-08-26 06:12:20 +09:00
"stargazers_count" : 13 ,
"watchers_count" : 13 ,
2021-07-28 12:12:01 +09:00
"forks_count" : 8 ,
"forks" : 8 ,
2021-08-26 06:12:20 +09:00
"watchers" : 13 ,
2021-07-02 06:13:22 +09:00
"score" : 0
} ,
{
"id" : 382141130 ,
"name" : "CVE-2021-1675" ,
"full_name" : "tanarchytan\/CVE-2021-1675" ,
"owner" : {
"login" : "tanarchytan" ,
"id" : 2339027 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2339027?v=4" ,
"html_url" : "https:\/\/github.com\/tanarchytan"
} ,
"html_url" : "https:\/\/github.com\/tanarchytan\/CVE-2021-1675" ,
"description" : "Fix without disabling Print Spooler" ,
"fork" : false ,
"created_at" : "2021-07-01T19:50:46Z" ,
2021-08-05 12:11:45 +09:00
"updated_at" : "2021-08-05T03:00:30Z" ,
2021-07-02 18:11:33 +09:00
"pushed_at" : "2021-07-02T04:32:18Z" ,
2021-08-05 12:11:45 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-07-19 00:11:38 +09:00
"forks_count" : 2 ,
"forks" : 2 ,
2021-08-05 12:11:45 +09:00
"watchers" : 2 ,
2021-06-30 06:12:38 +09:00
"score" : 0
2021-07-02 12:11:29 +09:00
} ,
{
"id" : 382182179 ,
"name" : "CVE-2021-1675" ,
"full_name" : "calebstewart\/CVE-2021-1675" ,
"owner" : {
"login" : "calebstewart" ,
"id" : 7529189 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/7529189?v=4" ,
"html_url" : "https:\/\/github.com\/calebstewart"
} ,
"html_url" : "https:\/\/github.com\/calebstewart\/CVE-2021-1675" ,
"description" : "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)" ,
"fork" : false ,
"created_at" : "2021-07-01T23:45:58Z" ,
2021-09-12 06:13:54 +09:00
"updated_at" : "2021-09-11T15:23:43Z" ,
2021-07-05 18:11:42 +09:00
"pushed_at" : "2021-07-05T08:54:06Z" ,
2021-09-12 06:13:54 +09:00
"stargazers_count" : 599 ,
"watchers_count" : 599 ,
2021-09-11 00:13:00 +09:00
"forks_count" : 161 ,
"forks" : 161 ,
2021-09-12 06:13:54 +09:00
"watchers" : 599 ,
2021-07-02 12:11:29 +09:00
"score" : 0
} ,
{
"id" : 382200984 ,
"name" : "CVE-2021-1675-SCANNER" ,
"full_name" : "Leonidus0x10\/CVE-2021-1675-SCANNER" ,
"owner" : {
"login" : "Leonidus0x10" ,
"id" : 72128281 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/72128281?v=4" ,
"html_url" : "https:\/\/github.com\/Leonidus0x10"
} ,
"html_url" : "https:\/\/github.com\/Leonidus0x10\/CVE-2021-1675-SCANNER" ,
"description" : "Vulnerability Scanner for CVE-2021-1675\/PrintNightmare" ,
"fork" : false ,
"created_at" : "2021-07-02T01:45:00Z" ,
2021-09-11 18:12:22 +09:00
"updated_at" : "2021-09-11T06:40:24Z" ,
2021-07-02 12:11:29 +09:00
"pushed_at" : "2021-07-02T01:52:46Z" ,
2021-09-11 18:12:22 +09:00
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
2021-07-31 12:12:07 +09:00
"forks_count" : 2 ,
"forks" : 2 ,
2021-09-11 18:12:22 +09:00
"watchers" : 7 ,
2021-07-02 18:11:33 +09:00
"score" : 0
} ,
{
"id" : 382249207 ,
"name" : "CVE-2021-1675" ,
"full_name" : "thomasgeens\/CVE-2021-1675" ,
"owner" : {
"login" : "thomasgeens" ,
"id" : 2236721 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2236721?v=4" ,
"html_url" : "https:\/\/github.com\/thomasgeens"
} ,
"html_url" : "https:\/\/github.com\/thomasgeens\/CVE-2021-1675" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-02T06:14:29Z" ,
2021-07-03 00:11:48 +09:00
"updated_at" : "2021-07-02T12:17:58Z" ,
2021-07-02 18:11:33 +09:00
"pushed_at" : "2021-07-02T06:14:39Z" ,
2021-07-03 00:11:48 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-07-02 18:11:33 +09:00
"forks_count" : 0 ,
"forks" : 0 ,
2021-07-03 00:11:48 +09:00
"watchers" : 2 ,
2021-07-02 18:11:33 +09:00
"score" : 0
} ,
{
"id" : 382266932 ,
"name" : "CVE-2021-1675_CarbonBlack_HuntingQuery" ,
"full_name" : "mrezqi\/CVE-2021-1675_CarbonBlack_HuntingQuery" ,
"owner" : {
"login" : "mrezqi" ,
"id" : 2455832 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2455832?v=4" ,
"html_url" : "https:\/\/github.com\/mrezqi"
} ,
"html_url" : "https:\/\/github.com\/mrezqi\/CVE-2021-1675_CarbonBlack_HuntingQuery" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-02T07:30:24Z" ,
"updated_at" : "2021-07-02T08:01:10Z" ,
"pushed_at" : "2021-07-02T08:01:07Z" ,
2021-07-02 12:11:29 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-07-03 06:11:28 +09:00
} ,
{
"id" : 382399375 ,
"name" : "CVE-2021-1675-PrintNightmare" ,
"full_name" : "killtr0\/CVE-2021-1675-PrintNightmare" ,
"owner" : {
"login" : "killtr0" ,
"id" : 22793707 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/22793707?v=4" ,
"html_url" : "https:\/\/github.com\/killtr0"
} ,
"html_url" : "https:\/\/github.com\/killtr0\/CVE-2021-1675-PrintNightmare" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-02T16:12:15Z" ,
2021-07-07 00:11:52 +09:00
"updated_at" : "2021-07-06T12:54:30Z" ,
2021-07-03 06:11:28 +09:00
"pushed_at" : "2021-07-02T16:12:59Z" ,
2021-07-07 00:11:52 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-07-03 06:11:28 +09:00
"forks_count" : 0 ,
"forks" : 0 ,
2021-07-07 00:11:52 +09:00
"watchers" : 1 ,
2021-07-03 06:11:28 +09:00
"score" : 0
} ,
2021-07-08 06:11:42 +09:00
{
"id" : 382407157 ,
"name" : "CVE-2021-1675" ,
"full_name" : "corelight\/CVE-2021-1675" ,
"owner" : {
"login" : "corelight" ,
"id" : 21672558 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4" ,
"html_url" : "https:\/\/github.com\/corelight"
} ,
"html_url" : "https:\/\/github.com\/corelight\/CVE-2021-1675" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-02T16:44:24Z" ,
2021-08-07 12:14:07 +09:00
"updated_at" : "2021-08-06T21:45:23Z" ,
2021-07-10 00:11:46 +09:00
"pushed_at" : "2021-07-09T14:17:40Z" ,
2021-08-07 12:14:07 +09:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2021-07-21 06:11:48 +09:00
"forks_count" : 2 ,
"forks" : 2 ,
2021-08-07 12:14:07 +09:00
"watchers" : 5 ,
2021-07-08 06:11:42 +09:00
"score" : 0
} ,
2021-07-03 06:11:28 +09:00
{
"id" : 382418030 ,
"name" : "CVE-2021-1675" ,
"full_name" : "kougyokugentou\/CVE-2021-1675" ,
"owner" : {
"login" : "kougyokugentou" ,
"id" : 41278462 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/41278462?v=4" ,
"html_url" : "https:\/\/github.com\/kougyokugentou"
} ,
"html_url" : "https:\/\/github.com\/kougyokugentou\/CVE-2021-1675" ,
"description" : "A small powershell script to disable print spooler service using desired state configuration" ,
"fork" : false ,
"created_at" : "2021-07-02T17:29:04Z" ,
"updated_at" : "2021-07-02T17:41:53Z" ,
"pushed_at" : "2021-07-02T17:40:09Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 382425733 ,
"name" : "CVE-2021-1675" ,
"full_name" : "ptter23\/CVE-2021-1675" ,
"owner" : {
"login" : "ptter23" ,
"id" : 55167410 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/55167410?v=4" ,
"html_url" : "https:\/\/github.com\/ptter23"
} ,
"html_url" : "https:\/\/github.com\/ptter23\/CVE-2021-1675" ,
"description" : "CVE-2021-1675: ZERO-DAY VULNERABILITY IN WINDOWS PRINTER SERVICE WITH AN EXPLOIT AVAILABLE IN ALL OPERATING SYSTEM VERSIONS" ,
"fork" : false ,
"created_at" : "2021-07-02T18:01:21Z" ,
"updated_at" : "2021-07-02T18:07:48Z" ,
"pushed_at" : "2021-07-02T18:07:45Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-07-03 12:12:12 +09:00
} ,
{
"id" : 382466613 ,
"name" : "CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler" ,
"full_name" : "gohrenberg\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler" ,
"owner" : {
"login" : "gohrenberg" ,
"id" : 80491750 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/80491750?v=4" ,
"html_url" : "https:\/\/github.com\/gohrenberg"
} ,
"html_url" : "https:\/\/github.com\/gohrenberg\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler" ,
"description" : "Temporary mitigation to the CVE-2021-1675. 'Spooler' service-disabled based on time schedule. PowerShell Scripts and Task Scheduler code provided. " ,
"fork" : false ,
"created_at" : "2021-07-02T21:18:11Z" ,
2021-07-04 06:12:19 +09:00
"updated_at" : "2021-07-03T17:29:23Z" ,
2021-07-05 18:11:42 +09:00
"pushed_at" : "2021-07-05T05:41:30Z" ,
2021-07-03 12:12:12 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 382496518 ,
"name" : "cve-2021-1675-printnightmare" ,
"full_name" : "initconf\/cve-2021-1675-printnightmare" ,
"owner" : {
"login" : "initconf" ,
"id" : 4044729 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4" ,
"html_url" : "https:\/\/github.com\/initconf"
} ,
"html_url" : "https:\/\/github.com\/initconf\/cve-2021-1675-printnightmare" ,
"description" : "to catch cve-2021-1675-printnightmare" ,
"fork" : false ,
"created_at" : "2021-07-03T01:04:06Z" ,
"updated_at" : "2021-07-03T01:08:45Z" ,
"pushed_at" : "2021-07-03T01:08:43Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-07-04 00:11:25 +09:00
} ,
{
"id" : 382609559 ,
"name" : "PrintNightmare" ,
"full_name" : "ozergoker\/PrintNightmare" ,
"owner" : {
"login" : "ozergoker" ,
"id" : 86879266 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/86879266?v=4" ,
"html_url" : "https:\/\/github.com\/ozergoker"
} ,
"html_url" : "https:\/\/github.com\/ozergoker\/PrintNightmare" ,
"description" : "Windows Print Spooler Service RCE CVE-2021-1675 (PrintNightmare)" ,
"fork" : false ,
"created_at" : "2021-07-03T12:25:21Z" ,
"updated_at" : "2021-07-03T12:44:08Z" ,
"pushed_at" : "2021-07-03T12:43:26Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-07-05 00:11:22 +09:00
} ,
{
"id" : 382815972 ,
"name" : "PrintNightmare-CVE-2021-1675" ,
"full_name" : "exploitblizzard\/PrintNightmare-CVE-2021-1675" ,
"owner" : {
"login" : "exploitblizzard" ,
"id" : 61627070 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4" ,
"html_url" : "https:\/\/github.com\/exploitblizzard"
} ,
"html_url" : "https:\/\/github.com\/exploitblizzard\/PrintNightmare-CVE-2021-1675" ,
"description" : "Youtube : https:\/\/youtu.be\/Zr0KjYDSFKQ" ,
"fork" : false ,
"created_at" : "2021-07-04T09:50:39Z" ,
2021-09-01 00:12:39 +09:00
"updated_at" : "2021-08-31T12:34:53Z" ,
2021-07-05 00:11:22 +09:00
"pushed_at" : "2021-07-04T09:57:46Z" ,
2021-09-01 00:12:39 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-07-22 06:11:51 +09:00
"forks_count" : 1 ,
"forks" : 1 ,
2021-09-01 00:12:39 +09:00
"watchers" : 2 ,
2021-07-05 00:11:22 +09:00
"score" : 0
2021-07-06 00:11:48 +09:00
} ,
{
"id" : 383128850 ,
"name" : "CVE-2021-1675" ,
"full_name" : "edsonjt81\/CVE-2021-1675" ,
"owner" : {
"login" : "edsonjt81" ,
"id" : 27496739 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/27496739?v=4" ,
"html_url" : "https:\/\/github.com\/edsonjt81"
} ,
"html_url" : "https:\/\/github.com\/edsonjt81\/CVE-2021-1675" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-05T12:10:43Z" ,
"updated_at" : "2021-07-05T12:10:59Z" ,
"pushed_at" : "2021-07-05T12:10:55Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 383165321 ,
"name" : "PrintNightmare-LPE" ,
"full_name" : "sailay1996\/PrintNightmare-LPE" ,
"owner" : {
"login" : "sailay1996" ,
"id" : 16739401 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16739401?v=4" ,
"html_url" : "https:\/\/github.com\/sailay1996"
} ,
"html_url" : "https:\/\/github.com\/sailay1996\/PrintNightmare-LPE" ,
"description" : "CVE-2021-1675 (PrintNightmare)" ,
"fork" : false ,
"created_at" : "2021-07-05T14:17:03Z" ,
2021-09-02 12:12:20 +09:00
"updated_at" : "2021-09-02T02:28:49Z" ,
2021-07-06 00:11:48 +09:00
"pushed_at" : "2021-07-05T14:34:34Z" ,
2021-09-02 12:12:20 +09:00
"stargazers_count" : 53 ,
"watchers_count" : 53 ,
2021-09-03 18:12:36 +09:00
"forks_count" : 21 ,
"forks" : 21 ,
2021-09-02 12:12:20 +09:00
"watchers" : 53 ,
2021-07-06 00:11:48 +09:00
"score" : 0
2021-07-07 18:11:46 +09:00
} ,
{
"id" : 383728669 ,
"name" : "PrintNightmare" ,
"full_name" : "JumpsecLabs\/PrintNightmare" ,
"owner" : {
"login" : "JumpsecLabs" ,
"id" : 49488209 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/49488209?v=4" ,
"html_url" : "https:\/\/github.com\/JumpsecLabs"
} ,
"html_url" : "https:\/\/github.com\/JumpsecLabs\/PrintNightmare" ,
"description" : "Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527" ,
"fork" : false ,
"created_at" : "2021-07-07T08:32:09Z" ,
2021-08-23 18:14:34 +09:00
"updated_at" : "2021-08-23T04:38:37Z" ,
2021-07-13 00:13:18 +09:00
"pushed_at" : "2021-07-12T09:28:16Z" ,
2021-08-23 18:14:34 +09:00
"stargazers_count" : 16 ,
"watchers_count" : 16 ,
2021-08-19 00:12:20 +09:00
"forks_count" : 9 ,
"forks" : 9 ,
2021-08-23 18:14:34 +09:00
"watchers" : 16 ,
2021-07-07 18:11:46 +09:00
"score" : 0
2021-07-09 06:11:37 +09:00
} ,
{
"id" : 384183711 ,
"name" : "CVE-2021-1675-Yara" ,
"full_name" : "bartimus-primed\/CVE-2021-1675-Yara" ,
"owner" : {
"login" : "bartimus-primed" ,
"id" : 465079 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/465079?v=4" ,
"html_url" : "https:\/\/github.com\/bartimus-primed"
} ,
"html_url" : "https:\/\/github.com\/bartimus-primed\/CVE-2021-1675-Yara" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-08T16:18:52Z" ,
2021-07-20 06:12:02 +09:00
"updated_at" : "2021-07-19T18:33:55Z" ,
2021-07-09 06:11:37 +09:00
"pushed_at" : "2021-07-08T16:19:45Z" ,
2021-07-20 06:12:02 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-07-09 06:11:37 +09:00
"forks_count" : 0 ,
"forks" : 0 ,
2021-07-20 06:12:02 +09:00
"watchers" : 2 ,
2021-07-09 06:11:37 +09:00
"score" : 0
2021-07-11 18:12:17 +09:00
} ,
{
"id" : 384854320 ,
"name" : "cve-2021-1675" ,
"full_name" : "k8gege\/cve-2021-1675" ,
"owner" : {
"login" : "k8gege" ,
"id" : 42312878 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/42312878?v=4" ,
"html_url" : "https:\/\/github.com\/k8gege"
} ,
"html_url" : "https:\/\/github.com\/k8gege\/cve-2021-1675" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-11T03:48:25Z" ,
2021-07-19 12:12:00 +09:00
"updated_at" : "2021-07-19T01:24:36Z" ,
2021-07-11 18:12:17 +09:00
"pushed_at" : "2021-07-11T03:49:44Z" ,
2021-07-19 12:12:00 +09:00
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
2021-07-11 18:12:17 +09:00
"forks_count" : 0 ,
"forks" : 0 ,
2021-07-19 12:12:00 +09:00
"watchers" : 8 ,
2021-07-12 18:11:54 +09:00
"score" : 0
} ,
{
"id" : 385174791 ,
"name" : "PrintNightmare-CVE-2021-1675-CVE-2021-34527" ,
"full_name" : "galoget\/PrintNightmare-CVE-2021-1675-CVE-2021-34527" ,
"owner" : {
"login" : "galoget" ,
"id" : 8353133 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/8353133?v=4" ,
"html_url" : "https:\/\/github.com\/galoget"
} ,
"html_url" : "https:\/\/github.com\/galoget\/PrintNightmare-CVE-2021-1675-CVE-2021-34527" ,
"description" : "CVE-2021-1675 \/ CVE-2021-34527 - PrintNightmare Python, C# and PowerShell Exploits Implementations (LPE & RCE)" ,
"fork" : false ,
"created_at" : "2021-07-12T08:18:40Z" ,
"updated_at" : "2021-07-12T08:51:24Z" ,
"pushed_at" : "2021-07-12T08:35:30Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2021-07-26 18:12:10 +09:00
"forks_count" : 1 ,
"forks" : 1 ,
2021-07-12 18:11:54 +09:00
"watchers" : 0 ,
2021-07-11 18:12:17 +09:00
"score" : 0
2021-07-17 06:15:28 +09:00
} ,
{
"id" : 386724774 ,
"name" : "Microsoft-CVE-2021-1675" ,
"full_name" : "thalpius\/Microsoft-CVE-2021-1675" ,
"owner" : {
"login" : "thalpius" ,
"id" : 49958238 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/49958238?v=4" ,
"html_url" : "https:\/\/github.com\/thalpius"
} ,
"html_url" : "https:\/\/github.com\/thalpius\/Microsoft-CVE-2021-1675" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-16T18:06:05Z" ,
2021-07-19 00:11:38 +09:00
"updated_at" : "2021-07-18T14:03:08Z" ,
"pushed_at" : "2021-07-18T14:03:05Z" ,
2021-07-18 18:11:35 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2021-07-28 18:12:12 +09:00
"forks_count" : 2 ,
"forks" : 2 ,
2021-07-18 18:11:35 +09:00
"watchers" : 2 ,
2021-07-17 06:15:28 +09:00
"score" : 0
2021-07-20 18:12:01 +09:00
} ,
{
"id" : 387694592 ,
"name" : "CVE-2021-1675" ,
"full_name" : "Winter3un\/CVE-2021-1675" ,
"owner" : {
"login" : "Winter3un" ,
"id" : 12570968 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12570968?v=4" ,
"html_url" : "https:\/\/github.com\/Winter3un"
} ,
"html_url" : "https:\/\/github.com\/Winter3un\/CVE-2021-1675" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-07-20T06:26:45Z" ,
"updated_at" : "2021-07-20T06:54:56Z" ,
"pushed_at" : "2021-07-20T06:46:12Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
2021-07-23 00:11:59 +09:00
} ,
{
"id" : 388427598 ,
"name" : "my-CVE-2021-1675" ,
"full_name" : "hahaleyile\/my-CVE-2021-1675" ,
"owner" : {
"login" : "hahaleyile" ,
"id" : 38727644 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/38727644?v=4" ,
"html_url" : "https:\/\/github.com\/hahaleyile"
} ,
"html_url" : "https:\/\/github.com\/hahaleyile\/my-CVE-2021-1675" ,
"description" : "see https:\/\/github.com\/cube0x0\/CVE-2021-1675" ,
"fork" : false ,
"created_at" : "2021-07-22T10:49:30Z" ,
2021-08-31 00:13:52 +09:00
"updated_at" : "2021-08-30T13:06:01Z" ,
2021-08-14 00:12:01 +09:00
"pushed_at" : "2021-08-13T15:15:05Z" ,
2021-08-31 00:13:52 +09:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2021-07-23 00:11:59 +09:00
"forks_count" : 0 ,
"forks" : 0 ,
2021-08-31 00:13:52 +09:00
"watchers" : 1 ,
2021-07-23 00:11:59 +09:00
"score" : 0
2021-09-02 00:13:14 +09:00
} ,
{
"id" : 402035048 ,
"name" : "CVE-2021-1675_RDL_LPE" ,
"full_name" : "mstxq17\/CVE-2021-1675_RDL_LPE" ,
"owner" : {
"login" : "mstxq17" ,
"id" : 29624427 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29624427?v=4" ,
"html_url" : "https:\/\/github.com\/mstxq17"
} ,
"html_url" : "https:\/\/github.com\/mstxq17\/CVE-2021-1675_RDL_LPE" ,
"description" : "PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender\/EDR。" ,
"fork" : false ,
"created_at" : "2021-09-01T11:25:04Z" ,
2021-09-10 12:12:30 +09:00
"updated_at" : "2021-09-10T01:54:43Z" ,
2021-09-02 00:13:14 +09:00
"pushed_at" : "2021-09-01T11:25:22Z" ,
2021-09-10 12:12:30 +09:00
"stargazers_count" : 87 ,
"watchers_count" : 87 ,
2021-09-09 18:12:44 +09:00
"forks_count" : 11 ,
"forks" : 11 ,
2021-09-10 12:12:30 +09:00
"watchers" : 87 ,
2021-09-02 00:13:14 +09:00
"score" : 0
2021-06-30 00:12:46 +09:00
}
]