尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1809 | 10.0.0 ~ 10.0.17763.1999 | cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2019 | 10.0.0 ~ 10.0.17763.1999 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1999:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.0 ~ 10.0.17763.1999 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1999:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1909 | 10.0.0 ~ 10.0.18363.1621 | cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1621:*:*:*:*:*:x86:* | |
| Microsoft | Windows 10 Version 21H1 | 10.0.0 ~ 10.0.19043.1052 | cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1052:*:*:*:*:*:x64:* | |
| Microsoft | Windows 10 Version 2004 | 10.0.0 ~ 10.0.19041.1052 | cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1052:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server version 2004 | 10.0.0 ~ 10.0.19041.1052 | cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1052:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 20H2 | 10.0.0 ~ 10.0.19042.1052 | cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1052:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server version 20H2 | 10.0.0 ~ 10.0.19042.1052 | cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1052:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1507 | 10.0.0 ~ 10.0.10240.18967 | cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18967:*:*:*:*:*:x86:* | |
| Microsoft | Windows 10 Version 1607 | 10.0.0 ~ 10.0.14393.4467 | cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4467:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2016 | 10.0.0 ~ 10.0.14393.4467 | cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4467:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2016 (Server Core installation) | 10.0.0 ~ 10.0.14393.4467 | cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4467:*:*:*:*:*:*:* | |
| Microsoft | Windows 7 | 6.1.0 ~ 6.1.7601.25632 | cpe:2.3:o:microsoft:windows_7:6.1.7601.25632:sp1:*:*:*:*:x86:* | |
| Microsoft | Windows 7 Service Pack 1 | 6.1.0 ~ 6.1.7601.25632 | cpe:2.3:o:microsoft:windows_7:6.1.7601.25632:sp1:*:*:*:*:x64:* | |
| Microsoft | Windows 8.1 | 6.3.0 ~ 6.3.9600.20045 | cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20045:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2008 Service Pack 2 | 6.0.0 ~ 6.0.6003.21137 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21137:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 Service Pack 2 (Server Core installation) | 6.0.0 ~ 6.0.6003.21137 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21137:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 Service Pack 2 | 6.0.0 ~ 6.0.6003.21137 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21137:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 | 6.1.0 ~ 6.1.7601.25632 | cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25632:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 (Server Core installation) | 6.0.0 ~ 6.1.7601.25632 | cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25632:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 | 6.2.0 ~ 6.2.9200.23372 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23372:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 (Server Core installation) | 6.2.0 ~ 6.2.9200.23372 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23372:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 | 6.3.0 ~ 6.3.9600.20045 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20045:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 (Server Core installation) | 6.3.0 ~ 6.3.9600.20045 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20045:*:*:*:*:*:x64:* |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | CVE-2021-1675 exploit | https://github.com/yu2u/CVE-2021-1675 | POC详情 |
| 2 | C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 | https://github.com/cube0x0/CVE-2021-1675 | POC详情 |
| 3 | CVE-2021-1675 Detection Info | https://github.com/LaresLLC/CVE-2021-1675 | POC详情 |
| 4 | None | https://github.com/kondah/patch-cve-2021-1675 | POC详情 |
| 5 | PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527 | https://github.com/evilashz/CVE-2021-1675-LPE-EXP | POC详情 |
| 6 | Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527 | https://github.com/hlldz/CVE-2021-1675-LPE | POC详情 |
| 7 | None | https://github.com/puckiestyle/CVE-2021-1675 | POC详情 |
| 8 | None | https://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMare | POC详情 |
| 9 | Fix without disabling Print Spooler | https://github.com/tanarchytan/CVE-2021-1675 | POC详情 |
| 10 | Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare) | https://github.com/calebstewart/CVE-2021-1675 | POC详情 |
| 11 | Vulnerability Scanner for CVE-2021-1675/PrintNightmare | https://github.com/Leonidus0x10/CVE-2021-1675-SCANNER | POC详情 |
| 12 | None | https://github.com/thomasgeens/CVE-2021-1675 | POC详情 |
| 13 | None | https://github.com/mrezqi/CVE-2021-1675_CarbonBlack_HuntingQuery | POC详情 |
| 14 | None | https://github.com/killtr0/CVE-2021-1675-PrintNightmare | POC详情 |
| 15 | None | https://github.com/corelight/CVE-2021-1675 | POC详情 |
| 16 | A small powershell script to disable print spooler service using desired state configuration | https://github.com/kougyokugentou/CVE-2021-1675 | POC详情 |
| 17 | CVE-2021-1675: ZERO-DAY VULNERABILITY IN WINDOWS PRINTER SERVICE WITH AN EXPLOIT AVAILABLE IN ALL OPERATING SYSTEM VERSIONS | https://github.com/ptter23/CVE-2021-1675 | POC详情 |
| 18 | to catch cve-2021-1675-printnightmare | https://github.com/initconf/cve-2021-1675-printnightmare | POC详情 |
| 19 | Windows Print Spooler Service RCE CVE-2021-1675 (PrintNightmare) | https://github.com/ozergoker/PrintNightmare | POC详情 |
| 20 | Youtube : https://youtu.be/Zr0KjYDSFKQ | https://github.com/exploitblizzard/PrintNightmare-CVE-2021-1675 | POC详情 |
| 21 | None | https://github.com/edsonjt81/CVE-2021-1675 | POC详情 |
| 22 | CVE-2021-1675 (PrintNightmare) | https://github.com/sailay1996/PrintNightmare-LPE | POC详情 |
| 23 | Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527 | https://github.com/JumpsecLabs/PrintNightmare | POC详情 |
| 24 | None | https://github.com/bartimusprimed/CVE-2021-1675-Yara | POC详情 |
| 25 | None | https://github.com/k8gege/cve-2021-1675 | POC详情 |
| 26 | CVE-2021-1675 / CVE-2021-34527 - PrintNightmare Python, C# and PowerShell Exploits Implementations (LPE & RCE) | https://github.com/galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527 | POC详情 |
| 27 | None | https://github.com/thalpius/Microsoft-CVE-2021-1675 | POC详情 |
| 28 | None | https://github.com/zha0/Microsoft-CVE-2021-1675 | POC详情 |
| 29 | None | https://github.com/Winter3un/CVE-2021-1675 | POC详情 |
| 30 | see https://github.com/cube0x0/CVE-2021-1675 | https://github.com/hahaleyile/my-CVE-2021-1675 | POC详情 |
| 31 | PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender/EDR。 | https://github.com/mstxq17/CVE-2021-1675_RDL_LPE | POC详情 |
| 32 | Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527) | https://github.com/ly4k/PrintNightmare | POC详情 |
| 33 | C# PrintNightmare (CVE-2021-1675) | https://github.com/Wra7h/SharpPN | POC详情 |
| 34 | Working PowerShell POC | https://github.com/OppressionBreedsResistance/CVE-2021-1675-PrintNightmare | POC详情 |
| 35 | Temporary mitigation to the CVE-2021-1675. 'Spooler' service-disabled based on time schedule. PowerShell Scripts and Task Scheduler code provided. | https://github.com/5l1v3r1/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler | POC详情 |
| 36 | CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation) | https://github.com/eversinc33/NimNightmare | POC详情 |
| 37 | PrintNightmare Local Privilege Escalation | https://github.com/AndrewTrube/CVE-2021-1675 | POC详情 |
| 38 | None | https://github.com/TheJoyOfHacking/cube0x0-CVE-2021-1675 | POC详情 |
| 39 | None | https://github.com/TheJoyOfHacking/calebstewart-CVE-2021-1675 | POC详情 |
| 40 | None | https://github.com/jj4152/cve-2021-1675 | POC详情 |
| 41 | Learn about the vulnerability known as PrintNightmare (CVE-2021-1675) and (CVE-2021-34527) | https://github.com/r1skkam/PrintNightmare | POC详情 |
| 42 | A one-click script to gain a System privileges command line in Windows 10 20H2 that exploits CVE-2021-1675 | https://github.com/peckre/PNCVE-Win10-20H2-Exploit | POC详情 |
| 43 | None | https://github.com/whoami-chmod777/CVE-2021-1675-CVE-2021-34527 | POC详情 |
| 44 | None | https://github.com/whoami-chmod777/CVE-2021-1675---PrintNightmare-LPE-PowerShell- | POC详情 |
| 45 | None | https://github.com/Sp4ceDogy/NPE-CS-V-CVE-2021-1675 | POC详情 |
| 46 | C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 | https://github.com/CameraShutterBug/PrintNightmare | POC详情 |
| 47 | None | https://github.com/DLL00P/CVE-2021-1675 | POC详情 |
| 48 | C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 | https://github.com/GlacierGossip/PrintNightmare | POC详情 |
| 49 | None | https://github.com/000Tonio/cve-2021-1675 | POC详情 |
| 50 | C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 | https://github.com/ArtAtrium/PrintNightmare | POC详情 |
| 51 | C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 | https://github.com/VoiidByte/Impacket | POC详情 |
| 52 | C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 | https://github.com/ccordeiro/CVE-2021-1675 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论