PoC-in-GitHub/2018/CVE-2018-3639.json

136 lines
4.7 KiB
JSON
Raw Normal View History

2024-11-28 19:31:51 +01:00
[
{
"id": 135628428,
"name": "ssbd-tools",
"full_name": "tyhicks\/ssbd-tools",
"owner": {
"login": "tyhicks",
"id": 1051156,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1051156?v=4",
"html_url": "https:\/\/github.com\/tyhicks",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tyhicks\/ssbd-tools",
"description": "Tools to exercise the Linux kernel mitigation for CVE-2018-3639 (aka Variant 4) using the Speculative Store Bypass Disable (SSBD) feature of x86 processors",
"fork": false,
"created_at": "2018-05-31T19:48:18Z",
"updated_at": "2024-02-14T06:09:50Z",
"pushed_at": "2018-06-01T16:53:36Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2018-3639",
"side-channel",
"speculation",
"ssbd",
"variant4"
],
"visibility": "public",
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 2
},
{
"id": 137829375,
"name": "Intel-CVE-2018-3639-Mitigation_RegistryUpdate",
"full_name": "malindarathnayake\/Intel-CVE-2018-3639-Mitigation_RegistryUpdate",
"owner": {
"login": "malindarathnayake",
"id": 9443796,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9443796?v=4",
"html_url": "https:\/\/github.com\/malindarathnayake",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/malindarathnayake\/Intel-CVE-2018-3639-Mitigation_RegistryUpdate",
"description": null,
"fork": false,
"created_at": "2018-06-19T02:19:26Z",
"updated_at": "2018-06-19T02:57:22Z",
"pushed_at": "2018-06-19T02:57:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 186128549,
"name": "CVE-2018-3639",
"full_name": "mmxsrup\/CVE-2018-3639",
"owner": {
"login": "mmxsrup",
"id": 19609323,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19609323?v=4",
"html_url": "https:\/\/github.com\/mmxsrup",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mmxsrup\/CVE-2018-3639",
"description": "Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux",
"fork": false,
"created_at": "2019-05-11T12:11:05Z",
"updated_at": "2024-02-28T02:21:41Z",
"pushed_at": "2021-10-22T16:05:33Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2018-3639",
"spectre",
"spectreexploit-poc"
],
"visibility": "public",
"forks": 3,
"watchers": 12,
"score": 0,
"subscribers_count": 2
},
{
"id": 193920426,
"name": "CVE-2018-3639-specter-v4-",
"full_name": "Shuiliusheng\/CVE-2018-3639-specter-v4-",
"owner": {
"login": "Shuiliusheng",
"id": 12653519,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12653519?v=4",
"html_url": "https:\/\/github.com\/Shuiliusheng",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Shuiliusheng\/CVE-2018-3639-specter-v4-",
"description": "spectre v4 : Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux",
"fork": false,
"created_at": "2019-06-26T14:26:13Z",
"updated_at": "2022-06-09T13:28:22Z",
"pushed_at": "2019-06-26T14:34:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]