PoC-in-GitHub/2017/CVE-2017-5715.json

94 lines
3.4 KiB
JSON
Raw Normal View History

2019-12-08 14:19:20 +01:00
[
2021-06-26 05:11:25 +02:00
{
"id": 116768537,
"name": "exploit-cve-2017-5715",
"full_name": "opsxcq\/exploit-cve-2017-5715",
"owner": {
"login": "opsxcq",
"id": 16995025,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16995025?v=4",
"html_url": "https:\/\/github.com\/opsxcq"
},
"html_url": "https:\/\/github.com\/opsxcq\/exploit-cve-2017-5715",
"description": "Spectre exploit",
"fork": false,
"created_at": "2018-01-09T05:06:12Z",
2021-08-23 11:14:34 +02:00
"updated_at": "2021-08-23T07:18:24Z",
2021-06-26 05:11:25 +02:00
"pushed_at": "2018-01-09T22:27:25Z",
2021-08-23 11:14:34 +02:00
"stargazers_count": 54,
"watchers_count": 54,
2021-06-26 05:11:25 +02:00
"forks_count": 19,
"forks": 19,
2021-08-23 11:14:34 +02:00
"watchers": 54,
2021-06-26 05:11:25 +02:00
"score": 0
},
2021-04-12 05:11:05 +02:00
{
"id": 117425769,
"name": "meltdown-spectre-bios-list",
"full_name": "mathse\/meltdown-spectre-bios-list",
"owner": {
"login": "mathse",
"id": 5393624,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5393624?v=4",
"html_url": "https:\/\/github.com\/mathse"
},
"html_url": "https:\/\/github.com\/mathse\/meltdown-spectre-bios-list",
"description": "a list of BIOS\/Firmware fixes adressing CVE-2017-5715, CVE-2017-5753, CVE-2017-5754",
"fork": false,
"created_at": "2018-01-14T11:52:38Z",
"updated_at": "2020-07-14T16:49:36Z",
"pushed_at": "2018-03-27T19:59:31Z",
"stargazers_count": 15,
"watchers_count": 15,
2021-06-17 23:11:21 +02:00
"forks_count": 5,
"forks": 5,
2021-04-12 05:11:05 +02:00
"watchers": 15,
"score": 0
},
2019-12-08 14:19:20 +01:00
{
"id": 117585225,
"name": "SpeculativeExecutionAssessment",
"full_name": "GregAskew\/SpeculativeExecutionAssessment",
"owner": {
"login": "GregAskew",
"id": 1266780,
2021-01-21 16:10:20 +01:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1266780?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/GregAskew"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/GregAskew\/SpeculativeExecutionAssessment",
"description": "Assesses a system for the \"speculative execution\" vulnerabilities described in CVE-2017-5715, CVE-2017-5753, CVE-2017-5754",
"fork": false,
"created_at": "2018-01-15T19:14:30Z",
"updated_at": "2019-11-24T15:45:44Z",
"pushed_at": "2019-11-24T15:45:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
2019-12-09 16:05:38 +01:00
"score": 0
2021-06-26 05:11:25 +02:00
},
{
"id": 117944815,
"name": "retpoline-audit",
"full_name": "dmo2118\/retpoline-audit",
"owner": {
"login": "dmo2118",
"id": 11342823,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11342823?v=4",
"html_url": "https:\/\/github.com\/dmo2118"
},
"html_url": "https:\/\/github.com\/dmo2118\/retpoline-audit",
"description": "A quick-and-dirty tool to verify that userspace executables are immune to Spectre variant 2 (CVE-2017-5715).",
"fork": false,
"created_at": "2018-01-18T06:55:53Z",
"updated_at": "2018-01-20T08:00:58Z",
"pushed_at": "2018-02-01T07:40:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2019-12-08 14:19:20 +01:00
}
]