{"uuid": "7170eada-07bb-44a4-858c-b67dcccbf122", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-1675", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/3750", "content": "#Blue_Team_Techniques\n1. CVE-2021-1675/CVE-2021-34527 Detection Info\nhttps://github.com/LaresLLC/CVE-2021-1675\n]-&gt; Restricting the ACLs:\nhttps://blog.truesec.com/2021/06/30/fix-for-printnightmare-cve-2021-1675-exploit-to-keep-your-print-servers-running-while-a-patch-is-not-available\n]-&gt; Mitigation:\nhttps://doublepulsar.com/zero-day-for-every-supported-windows-os-version-in-the-wild-printnightmare-b3fdb82f840c\n\n2. Fail2exploit: a security audit of Fail2ban\nhttps://securitylab.github.com/research/Fail2exploit", "creation_timestamp": "2021-07-03T18:33:01.000000Z"}