Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1809 | 10.0.0 ~ 10.0.17763.1999 | cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2019 | 10.0.0 ~ 10.0.17763.1999 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1999:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.0 ~ 10.0.17763.1999 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1999:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1909 | 10.0.0 ~ 10.0.18363.1621 | cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1621:*:*:*:*:*:x86:* | |
| Microsoft | Windows 10 Version 21H1 | 10.0.0 ~ 10.0.19043.1052 | cpe:2.3:o:microsoft:windows_10_21H1:10.0.19043.1052:*:*:*:*:*:x64:* | |
| Microsoft | Windows 10 Version 2004 | 10.0.0 ~ 10.0.19041.1052 | cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1052:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server version 2004 | 10.0.0 ~ 10.0.19041.1052 | cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1052:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 20H2 | 10.0.0 ~ 10.0.19042.1052 | cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1052:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server version 20H2 | 10.0.0 ~ 10.0.19042.1052 | cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1052:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 1507 | 10.0.0 ~ 10.0.10240.18967 | cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18967:*:*:*:*:*:x86:* | |
| Microsoft | Windows 10 Version 1607 | 10.0.0 ~ 10.0.14393.4467 | cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4467:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2016 | 10.0.0 ~ 10.0.14393.4467 | cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4467:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2016 (Server Core installation) | 10.0.0 ~ 10.0.14393.4467 | cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4467:*:*:*:*:*:*:* | |
| Microsoft | Windows 7 | 6.1.0 ~ 6.1.7601.25632 | cpe:2.3:o:microsoft:windows_7:6.1.7601.25632:sp1:*:*:*:*:x86:* | |
| Microsoft | Windows 7 Service Pack 1 | 6.1.0 ~ 6.1.7601.25632 | cpe:2.3:o:microsoft:windows_7:6.1.7601.25632:sp1:*:*:*:*:x64:* | |
| Microsoft | Windows 8.1 | 6.3.0 ~ 6.3.9600.20045 | cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20045:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2008 Service Pack 2 | 6.0.0 ~ 6.0.6003.21137 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21137:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 Service Pack 2 (Server Core installation) | 6.0.0 ~ 6.0.6003.21137 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21137:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 Service Pack 2 | 6.0.0 ~ 6.0.6003.21137 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21137:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 | 6.1.0 ~ 6.1.7601.25632 | cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25632:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 (Server Core installation) | 6.0.0 ~ 6.1.7601.25632 | cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25632:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 | 6.2.0 ~ 6.2.9200.23372 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23372:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 (Server Core installation) | 6.2.0 ~ 6.2.9200.23372 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23372:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 | 6.3.0 ~ 6.3.9600.20045 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20045:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 (Server Core installation) | 6.3.0 ~ 6.3.9600.20045 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20045:*:*:*:*:*:x64:* |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2021-1675 exploit | https://github.com/yu2u/CVE-2021-1675 | POC Details |
| 2 | C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 | https://github.com/cube0x0/CVE-2021-1675 | POC Details |
| 3 | CVE-2021-1675 Detection Info | https://github.com/LaresLLC/CVE-2021-1675 | POC Details |
| 4 | None | https://github.com/kondah/patch-cve-2021-1675 | POC Details |
| 5 | PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527 | https://github.com/evilashz/CVE-2021-1675-LPE-EXP | POC Details |
| 6 | Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527 | https://github.com/hlldz/CVE-2021-1675-LPE | POC Details |
| 7 | None | https://github.com/puckiestyle/CVE-2021-1675 | POC Details |
| 8 | None | https://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMare | POC Details |
| 9 | Fix without disabling Print Spooler | https://github.com/tanarchytan/CVE-2021-1675 | POC Details |
| 10 | Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare) | https://github.com/calebstewart/CVE-2021-1675 | POC Details |
| 11 | Vulnerability Scanner for CVE-2021-1675/PrintNightmare | https://github.com/Leonidus0x10/CVE-2021-1675-SCANNER | POC Details |
| 12 | None | https://github.com/thomasgeens/CVE-2021-1675 | POC Details |
| 13 | None | https://github.com/mrezqi/CVE-2021-1675_CarbonBlack_HuntingQuery | POC Details |
| 14 | None | https://github.com/killtr0/CVE-2021-1675-PrintNightmare | POC Details |
| 15 | None | https://github.com/corelight/CVE-2021-1675 | POC Details |
| 16 | A small powershell script to disable print spooler service using desired state configuration | https://github.com/kougyokugentou/CVE-2021-1675 | POC Details |
| 17 | CVE-2021-1675: ZERO-DAY VULNERABILITY IN WINDOWS PRINTER SERVICE WITH AN EXPLOIT AVAILABLE IN ALL OPERATING SYSTEM VERSIONS | https://github.com/ptter23/CVE-2021-1675 | POC Details |
| 18 | to catch cve-2021-1675-printnightmare | https://github.com/initconf/cve-2021-1675-printnightmare | POC Details |
| 19 | Windows Print Spooler Service RCE CVE-2021-1675 (PrintNightmare) | https://github.com/ozergoker/PrintNightmare | POC Details |
| 20 | Youtube : https://youtu.be/Zr0KjYDSFKQ | https://github.com/exploitblizzard/PrintNightmare-CVE-2021-1675 | POC Details |
| 21 | None | https://github.com/edsonjt81/CVE-2021-1675 | POC Details |
| 22 | CVE-2021-1675 (PrintNightmare) | https://github.com/sailay1996/PrintNightmare-LPE | POC Details |
| 23 | Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527 | https://github.com/JumpsecLabs/PrintNightmare | POC Details |
| 24 | None | https://github.com/bartimusprimed/CVE-2021-1675-Yara | POC Details |
| 25 | None | https://github.com/k8gege/cve-2021-1675 | POC Details |
| 26 | CVE-2021-1675 / CVE-2021-34527 - PrintNightmare Python, C# and PowerShell Exploits Implementations (LPE & RCE) | https://github.com/galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527 | POC Details |
| 27 | None | https://github.com/thalpius/Microsoft-CVE-2021-1675 | POC Details |
| 28 | None | https://github.com/zha0/Microsoft-CVE-2021-1675 | POC Details |
| 29 | None | https://github.com/Winter3un/CVE-2021-1675 | POC Details |
| 30 | see https://github.com/cube0x0/CVE-2021-1675 | https://github.com/hahaleyile/my-CVE-2021-1675 | POC Details |
| 31 | PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender/EDR。 | https://github.com/mstxq17/CVE-2021-1675_RDL_LPE | POC Details |
| 32 | Python implementation for PrintNightmare (CVE-2021-1675 / CVE-2021-34527) | https://github.com/ly4k/PrintNightmare | POC Details |
| 33 | C# PrintNightmare (CVE-2021-1675) | https://github.com/Wra7h/SharpPN | POC Details |
| 34 | Working PowerShell POC | https://github.com/OppressionBreedsResistance/CVE-2021-1675-PrintNightmare | POC Details |
| 35 | Temporary mitigation to the CVE-2021-1675. 'Spooler' service-disabled based on time schedule. PowerShell Scripts and Task Scheduler code provided. | https://github.com/5l1v3r1/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler | POC Details |
| 36 | CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation) | https://github.com/eversinc33/NimNightmare | POC Details |
| 37 | PrintNightmare Local Privilege Escalation | https://github.com/AndrewTrube/CVE-2021-1675 | POC Details |
| 38 | None | https://github.com/TheJoyOfHacking/cube0x0-CVE-2021-1675 | POC Details |
| 39 | None | https://github.com/TheJoyOfHacking/calebstewart-CVE-2021-1675 | POC Details |
| 40 | None | https://github.com/jj4152/cve-2021-1675 | POC Details |
| 41 | Learn about the vulnerability known as PrintNightmare (CVE-2021-1675) and (CVE-2021-34527) | https://github.com/r1skkam/PrintNightmare | POC Details |
| 42 | A one-click script to gain a System privileges command line in Windows 10 20H2 that exploits CVE-2021-1675 | https://github.com/peckre/PNCVE-Win10-20H2-Exploit | POC Details |
| 43 | None | https://github.com/whoami-chmod777/CVE-2021-1675-CVE-2021-34527 | POC Details |
| 44 | None | https://github.com/whoami-chmod777/CVE-2021-1675---PrintNightmare-LPE-PowerShell- | POC Details |
| 45 | None | https://github.com/Sp4ceDogy/NPE-CS-V-CVE-2021-1675 | POC Details |
| 46 | C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 | https://github.com/CameraShutterBug/PrintNightmare | POC Details |
| 47 | None | https://github.com/DLL00P/CVE-2021-1675 | POC Details |
| 48 | C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 | https://github.com/GlacierGossip/PrintNightmare | POC Details |
| 49 | None | https://github.com/000Tonio/cve-2021-1675 | POC Details |
| 50 | C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 | https://github.com/ArtAtrium/PrintNightmare | POC Details |
| 51 | C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 | https://github.com/VoiidByte/Impacket | POC Details |
| 52 | C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 | https://github.com/ccordeiro/CVE-2021-1675 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet