PoC-in-GitHub/2021/CVE-2021-34527.json
2023-03-27 21:31:38 +09:00

226 lines
No EOL
7.6 KiB
JSON

[
{
"id": 382645654,
"name": "PrintNightmare-CVE-2021-34527",
"full_name": "nemo-wq\/PrintNightmare-CVE-2021-34527",
"owner": {
"login": "nemo-wq",
"id": 28733668,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28733668?v=4",
"html_url": "https:\/\/github.com\/nemo-wq"
},
"html_url": "https:\/\/github.com\/nemo-wq\/PrintNightmare-CVE-2021-34527",
"description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits",
"fork": false,
"created_at": "2021-07-03T15:15:12Z",
"updated_at": "2023-03-27T07:43:21Z",
"pushed_at": "2021-09-13T12:12:17Z",
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-1675",
"cve-2021-34527",
"howto-tutorial",
"printnightmare",
"rce",
"windowsexploits"
],
"visibility": "public",
"forks": 32,
"watchers": 82,
"score": 0
},
{
"id": 383254488,
"name": "ItWasAllADream",
"full_name": "byt3bl33d3r\/ItWasAllADream",
"owner": {
"login": "byt3bl33d3r",
"id": 5151193,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5151193?v=4",
"html_url": "https:\/\/github.com\/byt3bl33d3r"
},
"html_url": "https:\/\/github.com\/byt3bl33d3r\/ItWasAllADream",
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
"fork": false,
"created_at": "2021-07-05T20:13:49Z",
"updated_at": "2023-03-22T06:52:51Z",
"pushed_at": "2023-01-18T13:58:42Z",
"stargazers_count": 715,
"watchers_count": 715,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 715,
"score": 0
},
{
"id": 390263988,
"name": "PrintNightmare",
"full_name": "Tomparte\/PrintNightmare",
"owner": {
"login": "Tomparte",
"id": 88080067,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88080067?v=4",
"html_url": "https:\/\/github.com\/Tomparte"
},
"html_url": "https:\/\/github.com\/Tomparte\/PrintNightmare",
"description": "To fight against Windows security breach PrintNightmare! (CVE-2021-34527, CVE-2021-1675)",
"fork": false,
"created_at": "2021-07-28T07:55:42Z",
"updated_at": "2021-09-15T06:40:48Z",
"pushed_at": "2021-08-20T11:41:18Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"batch-script",
"cve-2021-1675",
"cve-2021-34527",
"cve-2021-36958",
"cve-2021-40447",
"cybersecurity",
"powershell-script",
"print",
"printnightmare",
"security",
"spooler",
"to-do",
"windows"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 437822133,
"name": "CVE-2021-34527",
"full_name": "Amaranese\/CVE-2021-34527",
"owner": {
"login": "Amaranese",
"id": 32201849,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32201849?v=4",
"html_url": "https:\/\/github.com\/Amaranese"
},
"html_url": "https:\/\/github.com\/Amaranese\/CVE-2021-34527",
"description": null,
"fork": false,
"created_at": "2021-12-13T10:04:49Z",
"updated_at": "2021-12-13T10:21:38Z",
"pushed_at": "2021-12-13T10:21:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 507019653,
"name": "CVE-2021-34527",
"full_name": "cyb3rpeace\/CVE-2021-34527",
"owner": {
"login": "cyb3rpeace",
"id": 108078112,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108078112?v=4",
"html_url": "https:\/\/github.com\/cyb3rpeace"
},
"html_url": "https:\/\/github.com\/cyb3rpeace\/CVE-2021-34527",
"description": null,
"fork": false,
"created_at": "2022-06-24T13:25:25Z",
"updated_at": "2022-06-24T13:25:39Z",
"pushed_at": "2022-06-24T13:25:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 528150029,
"name": "CVE-2021-34527",
"full_name": "m8sec\/CVE-2021-34527",
"owner": {
"login": "m8sec",
"id": 13889819,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13889819?v=4",
"html_url": "https:\/\/github.com\/m8sec"
},
"html_url": "https:\/\/github.com\/m8sec\/CVE-2021-34527",
"description": "PrintNightmare (CVE-2021-34527) PoC Exploit",
"fork": false,
"created_at": "2022-08-23T20:20:45Z",
"updated_at": "2023-03-14T17:04:29Z",
"pushed_at": "2022-12-17T16:10:46Z",
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 69,
"score": 0
},
{
"id": 533095208,
"name": "cve-2021-34527",
"full_name": "hackerhouse-opensource\/cve-2021-34527",
"owner": {
"login": "hackerhouse-opensource",
"id": 43967630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43967630?v=4",
"html_url": "https:\/\/github.com\/hackerhouse-opensource"
},
"html_url": "https:\/\/github.com\/hackerhouse-opensource\/cve-2021-34527",
"description": "CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation",
"fork": false,
"created_at": "2022-09-05T23:48:44Z",
"updated_at": "2023-02-16T10:05:52Z",
"pushed_at": "2022-09-06T14:07:31Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 11,
"score": 0
}
]