PoC-in-GitHub/2021/CVE-2021-34527.json
2023-01-02 21:13:52 +09:00

139 lines
No EOL
4.6 KiB
JSON

[
{
"id": 382645654,
"name": "PrintNightmare-CVE-2021-34527",
"full_name": "nemo-wq\/PrintNightmare-CVE-2021-34527",
"owner": {
"login": "nemo-wq",
"id": 28733668,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28733668?v=4",
"html_url": "https:\/\/github.com\/nemo-wq"
},
"html_url": "https:\/\/github.com\/nemo-wq\/PrintNightmare-CVE-2021-34527",
"description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits",
"fork": false,
"created_at": "2021-07-03T15:15:12Z",
"updated_at": "2022-11-18T16:29:04Z",
"pushed_at": "2021-09-13T12:12:17Z",
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-1675",
"cve-2021-34527",
"howto-tutorial",
"printnightmare",
"rce",
"windowsexploits"
],
"visibility": "public",
"forks": 31,
"watchers": 72,
"score": 0
},
{
"id": 383254488,
"name": "ItWasAllADream",
"full_name": "byt3bl33d3r\/ItWasAllADream",
"owner": {
"login": "byt3bl33d3r",
"id": 5151193,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5151193?v=4",
"html_url": "https:\/\/github.com\/byt3bl33d3r"
},
"html_url": "https:\/\/github.com\/byt3bl33d3r\/ItWasAllADream",
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
"fork": false,
"created_at": "2021-07-05T20:13:49Z",
"updated_at": "2022-12-22T12:01:43Z",
"pushed_at": "2022-12-07T12:52:32Z",
"stargazers_count": 705,
"watchers_count": 705,
"has_discussions": false,
"forks_count": 114,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 114,
"watchers": 705,
"score": 0
},
{
"id": 390263988,
"name": "PrintNightmare",
"full_name": "Tomparte\/PrintNightmare",
"owner": {
"login": "Tomparte",
"id": 88080067,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88080067?v=4",
"html_url": "https:\/\/github.com\/Tomparte"
},
"html_url": "https:\/\/github.com\/Tomparte\/PrintNightmare",
"description": "To fight against Windows security breach PrintNightmare! (CVE-2021-34527, CVE-2021-1675)",
"fork": false,
"created_at": "2021-07-28T07:55:42Z",
"updated_at": "2021-09-15T06:40:48Z",
"pushed_at": "2021-08-20T11:41:18Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"batch-script",
"cve-2021-1675",
"cve-2021-34527",
"cve-2021-36958",
"cve-2021-40447",
"cybersecurity",
"powershell-script",
"print",
"printnightmare",
"security",
"spooler",
"to-do",
"windows"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 437822133,
"name": "CVE-2021-34527",
"full_name": "Amaranese\/CVE-2021-34527",
"owner": {
"login": "Amaranese",
"id": 32201849,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32201849?v=4",
"html_url": "https:\/\/github.com\/Amaranese"
},
"html_url": "https:\/\/github.com\/Amaranese\/CVE-2021-34527",
"description": null,
"fork": false,
"created_at": "2021-12-13T10:04:49Z",
"updated_at": "2021-12-13T10:21:38Z",
"pushed_at": "2021-12-13T10:21:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]