尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1809 | 10.0.0 ~ 10.0.17763.2029 | cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2029:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2019 | 10.0.0 ~ 10.0.17763.2029 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2029:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.0 ~ 10.0.17763.2029 | cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2029:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2022 | 10.0.0 ~ 10.0.20348.230 | cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.230:*:*:*:*:*:*:* | |
| Microsoft | Windows 10 Version 20H2 | 10.0.0 ~ 10.0.19042.1083 | cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.1083:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server version 20H2 | 10.0.0 ~ 10.0.19042.1083 | cpe:2.3:o:microsoft:windows_server_20H2:10.0.19042.1083:*:*:*:*:*:*:* | |
| Microsoft | Windows 11 version 21H2 | 10.0.0 ~ 10.0.22000.318 | cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.318:*:*:*:*:*:x64:* | |
| Microsoft | Windows 10 Version 21H2 | 10.0.0 ~ 10.0.19044.1415 | cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.1415:*:*:*:*:*:x86:* | |
| Microsoft | Windows 11 version 22H2 | 10.0.0 ~ 10.0.22621.674 | cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.674:*:*:*:*:*:arm64:* | |
| Microsoft | Windows 10 Version 22H2 | 10.0.0 ~ 10.0.19045.2251 | cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.2251:*:*:*:*:*:x64:* | |
| Microsoft | Windows 10 Version 1507 | 10.0.0 ~ 10.0.10240.18969 | cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18969:*:*:*:*:*:x86:* | |
| Microsoft | Windows 10 Version 1607 | 10.0.0 ~ 10.0.14393.4470 | cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4470:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2016 | 10.0.0 ~ 10.0.14393.4470 | cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4470:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2016 (Server Core installation) | 10.0.0 ~ 10.0.14393.4470 | cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4470:*:*:*:*:*:*:* | |
| Microsoft | Windows 8.1 | 6.3.0 ~ 6.3.9600.20046 | cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20046:*:*:*:*:*:*:* | |
| Microsoft | Windows Server 2008 Service Pack 2 | 6.0.0 ~ 6.0.6003.21138 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21138:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 Service Pack 2 (Server Core installation) | 6.0.0 ~ 6.0.6003.21138 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21138:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 Service Pack 2 | 6.0.0 ~ 6.0.6003.21138 | cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21138:*:*:*:*:*:x86:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 | 6.1.0 ~ 6.1.7601.25633 | cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25633:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2008 R2 Service Pack 1 (Server Core installation) | 6.0.0 ~ 6.1.7601.25633 | cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.25633:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 | 6.2.0 ~ 6.2.9200.23383 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23383:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 (Server Core installation) | 6.2.0 ~ 6.2.9200.23383 | cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23383:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 | 6.3.0 ~ 6.3.9600.20046 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20046:*:*:*:*:*:x64:* | |
| Microsoft | Windows Server 2012 R2 (Server Core installation) | 6.3.0 ~ 6.3.9600.20046 | cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20046:*:*:*:*:*:x64:* |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Small Powershell Script to detect Running Printer Spoolers on Domain Controller | https://github.com/DenizSe/CVE-2021-34527 | POC详情 |
| 2 | Kritische Sicherheitslücke PrintNightmare CVE-2021-34527 | https://github.com/glshnu/PrintNightmare | POC详情 |
| 3 | None | https://github.com/JohnHammond/CVE-2021-34527 | POC详情 |
| 4 | PrintNightmare - Windows Print Spooler RCE/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits | https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527 | POC详情 |
| 5 | Cve-2021-1675 or cve-2021-34527? Detailed analysis and exploitation of windows print spooler 0day vulnerability!!! | https://github.com/CnOxx1/CVE-2021-34527-1675 | POC详情 |
| 6 | Workaround for Windows Print Spooler Remote Code Execution Vulnerability(CVE-2021-34527). See: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527 | https://github.com/rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint | POC详情 |
| 7 | This simple PowerShell script is in response to the "PrintNightmare" vulnerability. This was designed to give a end user the ability to stop and disable the "Print Spooler" service on their computer while awaiting a fix from Microsoft. | https://github.com/geekbrett/CVE-2021-34527-PrintNightmare-Workaround | POC详情 |
| 8 | A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE | https://github.com/byt3bl33d3r/ItWasAllADream | POC详情 |
| 9 | Simple batch script to disable the Microsoft Print Spooler service from system | https://github.com/vinaysudheer/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527 | POC详情 |
| 10 | How to fix the PrintNightmare vulnerability | https://github.com/powershellpr0mpt/PrintNightmare-CVE-2021-34527 | POC详情 |
| 11 | Mitigation for CVE-2021-34527 RCE by setting WRITE ACLs | https://github.com/WidespreadPandemic/CVE-2021-34527_ACL_mitigation | POC详情 |
| 12 | CVE-2021-34527 implementation | https://github.com/glorisonlai/printnightmare | POC详情 |
| 13 | None | https://github.com/dywhoami/CVE-2021-34527-Scanner-Based-On-cube0x0-POC | POC详情 |
| 14 | Fix for PrintNightmare CVE-2021-34527 | https://github.com/Eutectico/Printnightmare | POC详情 |
| 15 | A collection of scripts to help set the appropriate registry keys for CVE-2021-34527 | https://github.com/syntaxbearror/PowerShell-PrintNightmare | POC详情 |
| 16 | A patch for PrintNightmare vulnerability that occurs to print spooler service for Windows machines [CVE-2021-34527] | https://github.com/0xirison/PrintNightmare-Patcher | POC详情 |
| 17 | To fight against Windows security breach PrintNightmare! (CVE-2021-34527, CVE-2021-1675) | https://github.com/Tomparte/PrintNightmare | POC详情 |
| 18 | None | https://github.com/Amaranese/CVE-2021-34527 | POC详情 |
| 19 | None | https://github.com/cyb3rpeace/CVE-2021-34527 | POC详情 |
| 20 | PrintNightmare (CVE-2021-34527) PoC Exploit | https://github.com/m8sec/CVE-2021-34527 | POC详情 |
| 21 | CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation | https://github.com/hackerhouse-opensource/cve-2021-34527 | POC详情 |
| 22 | # Fix-CVE-2021-34527 Fix for the security Script Changes ACL in the directory Stop Service PrintSpooler Spooler Changes StartupType to Disabled Add every server in the serverlist.csv and run script. | https://github.com/fardinbarashi/PsFix-CVE-2021-34527 | POC详情 |
| 23 | CVE-2021-34527 PrintNightmare PoC | https://github.com/d0rb/CVE-2021-34527 | POC详情 |
| 24 | detect bruteforce using for cve-2021-34527 | https://github.com/TieuLong21Prosper/detect_bruteforce | POC详情 |
| 25 | Kritische Sicherheitslücke PrintNightmare CVE-2021-34527 | https://github.com/thomas-lauer/PrintNightmare | POC详情 |
| 26 | None | https://github.com/Hirusha-N/CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784 | POC详情 |
| 27 | CVE-2021-34527 is a critical remote code execution and local privilege escalation vulnerability dubbed "PrintNightmare." | https://github.com/AUSK1LL9/CVE-2021-34527 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论