PoC-in-GitHub/2021/CVE-2021-34527.json
2021-07-30 18:11:55 +09:00

439 lines
No EOL
16 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 382021281,
"name": "CVE-2021-34527",
"full_name": "DenizSe\/CVE-2021-34527",
"owner": {
"login": "DenizSe",
"id": 43039427,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43039427?v=4",
"html_url": "https:\/\/github.com\/DenizSe"
},
"html_url": "https:\/\/github.com\/DenizSe\/CVE-2021-34527",
"description": "Small Powershell Script to detect Running Printer Spoolers on Domain Controller",
"fork": false,
"created_at": "2021-07-01T12:12:16Z",
"updated_at": "2021-07-02T07:49:06Z",
"pushed_at": "2021-07-02T07:45:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 382267064,
"name": "PrintNightmare",
"full_name": "glshnu\/PrintNightmare",
"owner": {
"login": "glshnu",
"id": 7205231,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7205231?v=4",
"html_url": "https:\/\/github.com\/glshnu"
},
"html_url": "https:\/\/github.com\/glshnu\/PrintNightmare",
"description": "Kritische Sicherheitslücke PrintNightmare CVE-2021-34527",
"fork": false,
"created_at": "2021-07-02T07:30:52Z",
"updated_at": "2021-07-18T11:10:59Z",
"pushed_at": "2021-07-12T15:07:05Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,
"forks": 4,
"watchers": 3,
"score": 0
},
{
"id": 382335385,
"name": "CVE-2021-34527",
"full_name": "JohnHammond\/CVE-2021-34527",
"owner": {
"login": "JohnHammond",
"id": 6288722,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6288722?v=4",
"html_url": "https:\/\/github.com\/JohnHammond"
},
"html_url": "https:\/\/github.com\/JohnHammond\/CVE-2021-34527",
"description": null,
"fork": false,
"created_at": "2021-07-02T12:10:49Z",
"updated_at": "2021-07-30T05:14:15Z",
"pushed_at": "2021-07-02T12:17:50Z",
"stargazers_count": 115,
"watchers_count": 115,
"forks_count": 25,
"forks": 25,
"watchers": 115,
"score": 0
},
{
"id": 382370746,
"name": "Fix-CVE-2021-34527",
"full_name": "fardinbarashi\/Fix-CVE-2021-34527",
"owner": {
"login": "fardinbarashi",
"id": 15907769,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15907769?v=4",
"html_url": "https:\/\/github.com\/fardinbarashi"
},
"html_url": "https:\/\/github.com\/fardinbarashi\/Fix-CVE-2021-34527",
"description": "Fix for the security",
"fork": false,
"created_at": "2021-07-02T14:25:44Z",
"updated_at": "2021-07-03T09:03:00Z",
"pushed_at": "2021-07-03T09:02:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 382645654,
"name": "PrintNightmare-CVE-2021-34527",
"full_name": "nemo-wq\/PrintNightmare-CVE-2021-34527",
"owner": {
"login": "nemo-wq",
"id": 28733668,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28733668?v=4",
"html_url": "https:\/\/github.com\/nemo-wq"
},
"html_url": "https:\/\/github.com\/nemo-wq\/PrintNightmare-CVE-2021-34527",
"description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits",
"fork": false,
"created_at": "2021-07-03T15:15:12Z",
"updated_at": "2021-07-27T07:31:37Z",
"pushed_at": "2021-07-19T01:22:40Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 10,
"forks": 10,
"watchers": 15,
"score": 0
},
{
"id": 382894525,
"name": "CVE-2021-34527-1675",
"full_name": "CnOxx1\/CVE-2021-34527-1675",
"owner": {
"login": "CnOxx1",
"id": 86923954,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86923954?v=4",
"html_url": "https:\/\/github.com\/CnOxx1"
},
"html_url": "https:\/\/github.com\/CnOxx1\/CVE-2021-34527-1675",
"description": "Cve-2021-1675 or cve-2021-34527? Detailed analysis and exploitation of windows print spooler 0day vulnerability",
"fork": false,
"created_at": "2021-07-04T16:09:18Z",
"updated_at": "2021-07-23T15:06:59Z",
"pushed_at": "2021-07-04T16:31:21Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 383207766,
"name": "disable-RegisterSpoolerRemoteRpcEndPoint",
"full_name": "rdboboia\/disable-RegisterSpoolerRemoteRpcEndPoint",
"owner": {
"login": "rdboboia",
"id": 37208426,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37208426?v=4",
"html_url": "https:\/\/github.com\/rdboboia"
},
"html_url": "https:\/\/github.com\/rdboboia\/disable-RegisterSpoolerRemoteRpcEndPoint",
"description": "Workaround for Windows Print Spooler Remote Code Execution Vulnerability(CVE-2021-34527). See: https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34527",
"fork": false,
"created_at": "2021-07-05T16:49:32Z",
"updated_at": "2021-07-08T21:11:43Z",
"pushed_at": "2021-07-08T21:11:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 383223006,
"name": "CVE-2021-34527-PrintNightmare-Workaround",
"full_name": "geekbrett\/CVE-2021-34527-PrintNightmare-Workaround",
"owner": {
"login": "geekbrett",
"id": 22183376,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22183376?v=4",
"html_url": "https:\/\/github.com\/geekbrett"
},
"html_url": "https:\/\/github.com\/geekbrett\/CVE-2021-34527-PrintNightmare-Workaround",
"description": "This simple PowerShell script is in response to the \"PrintNightmare\" vulnerability. This was designed to give a end user the ability to stop and disable the \"Print Spooler\" service on their computer while awaiting a fix from Microsoft.",
"fork": false,
"created_at": "2021-07-05T17:50:56Z",
"updated_at": "2021-07-07T17:18:09Z",
"pushed_at": "2021-07-07T17:18:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 383252170,
"name": "CVE-2021-34527-workaround",
"full_name": "officedrone\/CVE-2021-34527-workaround",
"owner": {
"login": "officedrone",
"id": 67024372,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67024372?v=4",
"html_url": "https:\/\/github.com\/officedrone"
},
"html_url": "https:\/\/github.com\/officedrone\/CVE-2021-34527-workaround",
"description": "Disable remote sessions to print spooler withtout disabling the print spooler service ",
"fork": false,
"created_at": "2021-07-05T20:02:50Z",
"updated_at": "2021-07-07T13:34:12Z",
"pushed_at": "2021-07-07T13:34:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 383254488,
"name": "ItWasAllADream",
"full_name": "byt3bl33d3r\/ItWasAllADream",
"owner": {
"login": "byt3bl33d3r",
"id": 5151193,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5151193?v=4",
"html_url": "https:\/\/github.com\/byt3bl33d3r"
},
"html_url": "https:\/\/github.com\/byt3bl33d3r\/ItWasAllADream",
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
"fork": false,
"created_at": "2021-07-05T20:13:49Z",
"updated_at": "2021-07-29T07:01:06Z",
"pushed_at": "2021-07-09T15:49:23Z",
"stargazers_count": 592,
"watchers_count": 592,
"forks_count": 74,
"forks": 74,
"watchers": 592,
"score": 0
},
{
"id": 383699836,
"name": "Disable-Spooler-Service-PrintNightmare-CVE-2021-34527",
"full_name": "vinaysudheer\/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527",
"owner": {
"login": "vinaysudheer",
"id": 29897973,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29897973?v=4",
"html_url": "https:\/\/github.com\/vinaysudheer"
},
"html_url": "https:\/\/github.com\/vinaysudheer\/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527",
"description": "Simple batch script to disable the Microsoft Print Spooler service from system",
"fork": false,
"created_at": "2021-07-07T06:41:15Z",
"updated_at": "2021-07-07T06:47:16Z",
"pushed_at": "2021-07-07T06:47:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 383719689,
"name": "PrintNightmare-CVE-2021-34527",
"full_name": "powershellpr0mpt\/PrintNightmare-CVE-2021-34527",
"owner": {
"login": "powershellpr0mpt",
"id": 9294993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9294993?v=4",
"html_url": "https:\/\/github.com\/powershellpr0mpt"
},
"html_url": "https:\/\/github.com\/powershellpr0mpt\/PrintNightmare-CVE-2021-34527",
"description": "How to fix the PrintNightmare vulnerability",
"fork": false,
"created_at": "2021-07-07T07:58:53Z",
"updated_at": "2021-07-07T10:00:34Z",
"pushed_at": "2021-07-07T10:00:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 383968301,
"name": "CVE-2021-34527_ACL_mitigation",
"full_name": "WidespreadPandemic\/CVE-2021-34527_ACL_mitigation",
"owner": {
"login": "WidespreadPandemic",
"id": 75406207,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75406207?v=4",
"html_url": "https:\/\/github.com\/WidespreadPandemic"
},
"html_url": "https:\/\/github.com\/WidespreadPandemic\/CVE-2021-34527_ACL_mitigation",
"description": "Mitigation for CVE-2021-34527 RCE by setting WRITE ACLs",
"fork": false,
"created_at": "2021-07-08T01:32:18Z",
"updated_at": "2021-07-09T03:54:14Z",
"pushed_at": "2021-07-09T03:54:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 384221697,
"name": "printnightmare",
"full_name": "glorisonlai\/printnightmare",
"owner": {
"login": "glorisonlai",
"id": 26339805,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26339805?v=4",
"html_url": "https:\/\/github.com\/glorisonlai"
},
"html_url": "https:\/\/github.com\/glorisonlai\/printnightmare",
"description": "CVE-2021-34527 implementation",
"fork": false,
"created_at": "2021-07-08T18:56:04Z",
"updated_at": "2021-07-08T18:56:07Z",
"pushed_at": "2021-07-08T18:56:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 384372251,
"name": "CVE-2021-34527-Scanner-Based-On-cube0x0-POC",
"full_name": "dywhoami\/CVE-2021-34527-Scanner-Based-On-cube0x0-POC",
"owner": {
"login": "dywhoami",
"id": 87174410,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87174410?v=4",
"html_url": "https:\/\/github.com\/dywhoami"
},
"html_url": "https:\/\/github.com\/dywhoami\/CVE-2021-34527-Scanner-Based-On-cube0x0-POC",
"description": null,
"fork": false,
"created_at": "2021-07-09T08:27:36Z",
"updated_at": "2021-07-21T17:41:04Z",
"pushed_at": "2021-07-11T00:23:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 384385967,
"name": "Printnightmare",
"full_name": "Eutectico\/Printnightmare",
"owner": {
"login": "Eutectico",
"id": 30925137,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30925137?v=4",
"html_url": "https:\/\/github.com\/Eutectico"
},
"html_url": "https:\/\/github.com\/Eutectico\/Printnightmare",
"description": "Fix for PrintNightmare CVE-2021-34527",
"fork": false,
"created_at": "2021-07-09T09:22:03Z",
"updated_at": "2021-07-09T11:02:54Z",
"pushed_at": "2021-07-09T11:02:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 384554464,
"name": "PowerShell-PrintNightmare",
"full_name": "syntaxbearror\/PowerShell-PrintNightmare",
"owner": {
"login": "syntaxbearror",
"id": 53105897,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53105897?v=4",
"html_url": "https:\/\/github.com\/syntaxbearror"
},
"html_url": "https:\/\/github.com\/syntaxbearror\/PowerShell-PrintNightmare",
"description": "A collection of scripts to help set the appropriate registry keys for CVE-2021-34527",
"fork": false,
"created_at": "2021-07-09T21:28:16Z",
"updated_at": "2021-07-11T16:21:00Z",
"pushed_at": "2021-07-09T21:46:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 385271497,
"name": "PrintNightmare-Patcher",
"full_name": "0xirison\/PrintNightmare-Patcher",
"owner": {
"login": "0xirison",
"id": 87223944,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87223944?v=4",
"html_url": "https:\/\/github.com\/0xirison"
},
"html_url": "https:\/\/github.com\/0xirison\/PrintNightmare-Patcher",
"description": "A patch for PrintNightmare vulnerability that occurs to print spooler service for Windows machines [CVE-2021-34527]",
"fork": false,
"created_at": "2021-07-12T14:14:29Z",
"updated_at": "2021-07-24T05:38:01Z",
"pushed_at": "2021-07-23T05:03:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 390263988,
"name": "PrintNightmare",
"full_name": "Tomparte\/PrintNightmare",
"owner": {
"login": "Tomparte",
"id": 88080067,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88080067?v=4",
"html_url": "https:\/\/github.com\/Tomparte"
},
"html_url": "https:\/\/github.com\/Tomparte\/PrintNightmare",
"description": "To fight against Windows security breach PrintNightmare! (CVE-2021-34527, CVE-2021-1675)",
"fork": false,
"created_at": "2021-07-28T07:55:42Z",
"updated_at": "2021-07-28T08:31:02Z",
"pushed_at": "2021-07-28T08:19:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]