{"uuid": "9afa3ec4-a059-40a4-96eb-e511cca7ab9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-34527", "type": "published-proof-of-concept", "source": "https://t.me/alexmakus/4152", "content": "\u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0441\u0441\u044b\u043b\u043e\u043a, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043d\u0430\u043a\u043e\u043f\u0438\u043b\u0438\u0441\u044c \u0437\u0430 \u043d\u0435\u0434\u0435\u043b\u044e, \u043d\u043e \u043d\u0435 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0438 \u0432\u043e\u0432\u0440\u0435\u043c\u044f \u0441\u0432\u043e\u0435\u0433\u043e \u043f\u043e\u0441\u0442\u0430. \n\n1. \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f PrintNightmare \u0432 Windows Print Spooler \n\nhttps://blog.malwarebytes.com/exploits-and-vulnerabilities/2021/07/printnightmare-0-day-can-be-used-to-take-over-windows-domain-controllers/\n\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527\n\n\u0438 \u043d\u0430 \u0440\u0443\u0441\u0441\u043a\u043e\u043c \u043e\u0431 \u044d\u0442\u043e\u043c \u0436\u0435 \nhttps://xakep.ru/2021/06/30/printnightmare/", "creation_timestamp": "2021-07-02T15:04:06.000000Z"}