# Windows Print Spooler 远程代码执行漏洞
N/A
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Small Powershell Script to detect Running Printer Spoolers on Domain Controller | https://github.com/DenizSe/CVE-2021-34527 | POC详情 |
2 | Kritische Sicherheitslücke PrintNightmare CVE-2021-34527 | https://github.com/glshnu/PrintNightmare | POC详情 |
3 | None | https://github.com/JohnHammond/CVE-2021-34527 | POC详情 |
4 | PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits | https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527 | POC详情 |
5 | Cve-2021-1675 or cve-2021-34527? Detailed analysis and exploitation of windows print spooler 0day vulnerability!!! | https://github.com/CnOxx1/CVE-2021-34527-1675 | POC详情 |
6 | Workaround for Windows Print Spooler Remote Code Execution Vulnerability(CVE-2021-34527). See: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527 | https://github.com/rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint | POC详情 |
7 | This simple PowerShell script is in response to the "PrintNightmare" vulnerability. This was designed to give a end user the ability to stop and disable the "Print Spooler" service on their computer while awaiting a fix from Microsoft. | https://github.com/geekbrett/CVE-2021-34527-PrintNightmare-Workaround | POC详情 |
8 | A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE | https://github.com/byt3bl33d3r/ItWasAllADream | POC详情 |
9 | Simple batch script to disable the Microsoft Print Spooler service from system | https://github.com/vinaysudheer/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527 | POC详情 |
10 | How to fix the PrintNightmare vulnerability | https://github.com/powershellpr0mpt/PrintNightmare-CVE-2021-34527 | POC详情 |
11 | Mitigation for CVE-2021-34527 RCE by setting WRITE ACLs | https://github.com/WidespreadPandemic/CVE-2021-34527_ACL_mitigation | POC详情 |
12 | CVE-2021-34527 implementation | https://github.com/glorisonlai/printnightmare | POC详情 |
13 | None | https://github.com/dywhoami/CVE-2021-34527-Scanner-Based-On-cube0x0-POC | POC详情 |
14 | Fix for PrintNightmare CVE-2021-34527 | https://github.com/Eutectico/Printnightmare | POC详情 |
15 | A collection of scripts to help set the appropriate registry keys for CVE-2021-34527 | https://github.com/syntaxbearror/PowerShell-PrintNightmare | POC详情 |
16 | A patch for PrintNightmare vulnerability that occurs to print spooler service for Windows machines [CVE-2021-34527] | https://github.com/0xirison/PrintNightmare-Patcher | POC详情 |
17 | To fight against Windows security breach PrintNightmare! (CVE-2021-34527, CVE-2021-1675) | https://github.com/Tomparte/PrintNightmare | POC详情 |
18 | None | https://github.com/Amaranese/CVE-2021-34527 | POC详情 |
19 | None | https://github.com/cyb3rpeace/CVE-2021-34527 | POC详情 |
20 | PrintNightmare (CVE-2021-34527) PoC Exploit | https://github.com/m8sec/CVE-2021-34527 | POC详情 |
21 | CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation | https://github.com/hackerhouse-opensource/cve-2021-34527 | POC详情 |
22 | # Fix-CVE-2021-34527 Fix for the security Script Changes ACL in the directory Stop Service PrintSpooler Spooler Changes StartupType to Disabled Add every server in the serverlist.csv and run script. | https://github.com/fardinbarashi/PsFix-CVE-2021-34527 | POC详情 |
23 | CVE-2021-34527 PrintNightmare PoC | https://github.com/d0rb/CVE-2021-34527 | POC详情 |
24 | detect bruteforce using for cve-2021-34527 | https://github.com/TieuLong21Prosper/detect_bruteforce | POC详情 |
25 | Kritische Sicherheitslücke PrintNightmare CVE-2021-34527 | https://github.com/thomas-lauer/PrintNightmare | POC详情 |
26 | None | https://github.com/Hirusha-N/CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784 | POC详情 |
27 | CVE-2021-34527 is a critical remote code execution and local privilege escalation vulnerability dubbed "PrintNightmare." | https://github.com/AUSK1LL9/CVE-2021-34527 | POC详情 |
暂无评论