支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2021-1675 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Windows Print Spooler Remote Code Execution Vulnerability
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
Windows Print Spooler Remote Code Execution Vulnerability
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Microsoft Windows Print Spooler Components 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Microsoft Windows Print Spooler Components是美国微软(Microsoft)公司的一个打印后台处理程序组件。 Microsoft Windows Print Spooler Components存在安全漏洞。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for AR
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
MicrosoftWindows 10 Version 1809 10.0.0 ~ 10.0.17763.1999 cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:x86:*
MicrosoftWindows Server 2019 10.0.0 ~ 10.0.17763.1999 cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1999:*:*:*:*:*:*:*
MicrosoftWindows Server 2019 (Server Core installation) 10.0.0 ~ 10.0.17763.1999 cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1999:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1909 10.0.0 ~ 10.0.18363.1621 cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1621:*:*:*:*:*:x86:*
MicrosoftWindows 10 Version 21H1 10.0.0 ~ 10.0.19043.1052 cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1052:*:*:*:*:*:x64:*
MicrosoftWindows 10 Version 2004 10.0.0 ~ 10.0.19041.1052 cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1052:*:*:*:*:*:x64:*
MicrosoftWindows Server version 2004 10.0.0 ~ 10.0.19041.1052 cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1052:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 20H2 10.0.0 ~ 10.0.19042.1052 cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1052:*:*:*:*:*:x86:*
MicrosoftWindows Server version 20H2 10.0.0 ~ 10.0.19042.1052 cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1052:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1507 10.0.0 ~ 10.0.10240.18967 cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18967:*:*:*:*:*:x86:*
MicrosoftWindows 10 Version 1607 10.0.0 ~ 10.0.14393.4467 cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4467:*:*:*:*:*:x86:*
MicrosoftWindows Server 2016 10.0.0 ~ 10.0.14393.4467 cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4467:*:*:*:*:*:*:*
MicrosoftWindows Server 2016 (Server Core installation) 10.0.0 ~ 10.0.14393.4467 cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4467:*:*:*:*:*:*:*
MicrosoftWindows 7 6.1.0 ~ 6.1.7601.25632 cpe:2.3:o:microsoft:windows_7:6.1.7601.25632:sp1:*:*:*:*:x86:*
MicrosoftWindows 7 Service Pack 1 6.1.0 ~ 6.1.7601.25632 cpe:2.3:o:microsoft:windows_7:6.1.7601.25632:sp1:*:*:*:*:x64:*
MicrosoftWindows 8.1 6.3.0 ~ 6.3.9600.20045 cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20045:*:*:*:*:*:x86:*
MicrosoftWindows Server 2008 Service Pack 2 6.0.0 ~ 6.0.6003.21137 cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21137:*:*:*:*:*:x64:*
MicrosoftWindows Server 2008 Service Pack 2 (Server Core installation) 6.0.0 ~ 6.0.6003.21137 cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21137:*:*:*:*:*:x64:*
MicrosoftWindows Server 2008 Service Pack 2 6.0.0 ~ 6.0.6003.21137 cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21137:*:*:*:*:*:x86:*
MicrosoftWindows Server 2008 R2 Service Pack 1 6.1.0 ~ 6.1.7601.25632 cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25632:*:*:*:*:*:x64:*
MicrosoftWindows Server 2008 R2 Service Pack 1 (Server Core installation) 6.0.0 ~ 6.1.7601.25632 cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25632:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 6.2.0 ~ 6.2.9200.23372 cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23372:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 (Server Core installation) 6.2.0 ~ 6.2.9200.23372 cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23372:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 R2 6.3.0 ~ 6.3.9600.20045 cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20045:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 R2 (Server Core installation) 6.3.0 ~ 6.3.9600.20045 cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20045:*:*:*:*:*:x64:*
二、漏洞 CVE-2021-1675 的公开POC
#POC 描述源链接神龙链接
1CVE-2021-1675 exploithttps://github.com/yu2u/CVE-2021-1675POC详情
2C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527https://github.com/cube0x0/CVE-2021-1675POC详情
3CVE-2021-1675 Detection Infohttps://github.com/LaresLLC/CVE-2021-1675POC详情
4Nonehttps://github.com/kondah/patch-cve-2021-1675POC详情
5PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527https://github.com/evilashz/CVE-2021-1675-LPE-EXPPOC详情
6Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527https://github.com/hlldz/CVE-2021-1675-LPEPOC详情
7Nonehttps://github.com/puckiestyle/CVE-2021-1675POC详情
8Nonehttps://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMarePOC详情
9Fix without disabling Print Spoolerhttps://github.com/tanarchytan/CVE-2021-1675POC详情
10Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)https://github.com/calebstewart/CVE-2021-1675POC详情
11Vulnerability Scanner for CVE-2021-1675/PrintNightmarehttps://github.com/Leonidus0x10/CVE-2021-1675-SCANNERPOC详情
12Nonehttps://github.com/thomasgeens/CVE-2021-1675POC详情
13Nonehttps://github.com/mrezqi/CVE-2021-1675_CarbonBlack_HuntingQueryPOC详情
14Nonehttps://github.com/killtr0/CVE-2021-1675-PrintNightmarePOC详情
15Nonehttps://github.com/corelight/CVE-2021-1675POC详情
16A small powershell script to disable print spooler service using desired state configurationhttps://github.com/kougyokugentou/CVE-2021-1675POC详情
17CVE-2021-1675: ZERO-DAY VULNERABILITY IN WINDOWS PRINTER SERVICE WITH AN EXPLOIT AVAILABLE IN ALL OPERATING SYSTEM VERSIONShttps://github.com/ptter23/CVE-2021-1675POC详情
18to catch cve-2021-1675-printnightmarehttps://github.com/initconf/cve-2021-1675-printnightmarePOC详情
19Windows Print Spooler Service RCE CVE-2021-1675 (PrintNightmare)https://github.com/ozergoker/PrintNightmarePOC详情
20Youtube : https://youtu.be/Zr0KjYDSFKQhttps://github.com/exploitblizzard/PrintNightmare-CVE-2021-1675POC详情
21Nonehttps://github.com/edsonjt81/CVE-2021-1675POC详情
22CVE-2021-1675 (PrintNightmare)https://github.com/sailay1996/PrintNightmare-LPEPOC详情
23Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527https://github.com/JumpsecLabs/PrintNightmarePOC详情
24Nonehttps://github.com/bartimusprimed/CVE-2021-1675-YaraPOC详情
25Nonehttps://github.com/k8gege/cve-2021-1675POC详情
26CVE-2021-1675 / CVE-2021-34527 - PrintNightmare Python, C# and PowerShell Exploits Implementations (LPE & RCE)https://github.com/galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527POC详情
27Nonehttps://github.com/thalpius/Microsoft-CVE-2021-1675POC详情
28Nonehttps://github.com/zha0/Microsoft-CVE-2021-1675POC详情
29Nonehttps://github.com/Winter3un/CVE-2021-1675POC详情
30see https://github.com/cube0x0/CVE-2021-1675https://github.com/hahaleyile/my-CVE-2021-1675POC详情
31PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender/EDR。https://github.com/mstxq17/CVE-2021-1675_RDL_LPEPOC详情
32Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527)https://github.com/ly4k/PrintNightmarePOC详情
33C# PrintNightmare (CVE-2021-1675)https://github.com/Wra7h/SharpPNPOC详情
34Working PowerShell POChttps://github.com/OppressionBreedsResistance/CVE-2021-1675-PrintNightmarePOC详情
35Temporary mitigation to the CVE-2021-1675. 'Spooler' service-disabled based on time schedule. PowerShell Scripts and Task Scheduler code provided. https://github.com/5l1v3r1/CVE-2021-1675-Mitigation-For-Systems-That-Need-SpoolerPOC详情
36CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)https://github.com/eversinc33/NimNightmarePOC详情
37PrintNightmare Local Privilege Escalation https://github.com/AndrewTrube/CVE-2021-1675POC详情
38Nonehttps://github.com/TheJoyOfHacking/cube0x0-CVE-2021-1675POC详情
39Nonehttps://github.com/TheJoyOfHacking/calebstewart-CVE-2021-1675POC详情
40Nonehttps://github.com/jj4152/cve-2021-1675POC详情
41Learn about the vulnerability known as PrintNightmare (CVE-2021-1675) and (CVE-2021-34527)https://github.com/r1skkam/PrintNightmarePOC详情
42A one-click script to gain a System privileges command line in Windows 10 20H2 that exploits CVE-2021-1675https://github.com/peckre/PNCVE-Win10-20H2-ExploitPOC详情
43Nonehttps://github.com/whoami-chmod777/CVE-2021-1675-CVE-2021-34527POC详情
44Nonehttps://github.com/whoami-chmod777/CVE-2021-1675---PrintNightmare-LPE-PowerShell-POC详情
45Nonehttps://github.com/Sp4ceDogy/NPE-CS-V-CVE-2021-1675POC详情
46C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527https://github.com/CameraShutterBug/PrintNightmarePOC详情
47Nonehttps://github.com/DLL00P/CVE-2021-1675POC详情
48C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527https://github.com/GlacierGossip/PrintNightmarePOC详情
49Nonehttps://github.com/000Tonio/cve-2021-1675POC详情
50C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527https://github.com/ArtAtrium/PrintNightmarePOC详情
51C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527https://github.com/VoiidByte/ImpacketPOC详情
52C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527https://github.com/ccordeiro/CVE-2021-1675POC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2021-1675 的情报信息
Please 登录 to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-1675

暂无评论


发表评论