2019-12-08 22:19:20 +09:00
[
{
"id" : 135628428 ,
"name" : "ssbd-tools" ,
"full_name" : "tyhicks\/ssbd-tools" ,
"owner" : {
"login" : "tyhicks" ,
"id" : 1051156 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/1051156?v=4" ,
2019-12-12 14:14:27 +09:00
"html_url" : "https:\/\/github.com\/tyhicks"
2019-12-08 22:19:20 +09:00
} ,
"html_url" : "https:\/\/github.com\/tyhicks\/ssbd-tools" ,
"description" : "Tools to exercise the Linux kernel mitigation for CVE-2018-3639 (aka Variant 4) using the Speculative Store Bypass Disable (SSBD) feature of x86 processors" ,
"fork" : false ,
"created_at" : "2018-05-31T19:48:18Z" ,
2019-12-17 12:30:02 +09:00
"updated_at" : "2019-12-16T15:32:25Z" ,
2019-12-08 22:19:20 +09:00
"pushed_at" : "2018-06-01T16:53:36Z" ,
2019-12-17 12:30:02 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2019-12-08 22:19:20 +09:00
"forks_count" : 2 ,
"forks" : 2 ,
2019-12-17 12:30:02 +09:00
"watchers" : 2 ,
2019-12-12 14:14:27 +09:00
"score" : 0
} ,
{
"id" : 137829375 ,
"name" : "Intel-CVE-2018-3639-Mitigation_RegistryUpdate" ,
"full_name" : "malindarathnayake\/Intel-CVE-2018-3639-Mitigation_RegistryUpdate" ,
"owner" : {
"login" : "malindarathnayake" ,
"id" : 9443796 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/9443796?v=4" ,
"html_url" : "https:\/\/github.com\/malindarathnayake"
} ,
"html_url" : "https:\/\/github.com\/malindarathnayake\/Intel-CVE-2018-3639-Mitigation_RegistryUpdate" ,
"description" : null ,
"fork" : false ,
"created_at" : "2018-06-19T02:19:26Z" ,
"updated_at" : "2018-06-19T02:57:22Z" ,
"pushed_at" : "2018-06-19T02:57:21Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
2019-12-10 00:05:38 +09:00
"score" : 0
2019-12-08 22:19:20 +09:00
} ,
{
"id" : 186128549 ,
"name" : "CVE-2018-3639" ,
"full_name" : "mmxsrup\/CVE-2018-3639" ,
"owner" : {
"login" : "mmxsrup" ,
"id" : 19609323 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/19609323?v=4" ,
2019-12-12 14:14:27 +09:00
"html_url" : "https:\/\/github.com\/mmxsrup"
2019-12-08 22:19:20 +09:00
} ,
"html_url" : "https:\/\/github.com\/mmxsrup\/CVE-2018-3639" ,
"description" : "Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux" ,
"fork" : false ,
"created_at" : "2019-05-11T12:11:05Z" ,
"updated_at" : "2019-08-02T09:55:31Z" ,
"pushed_at" : "2019-05-13T22:21:05Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 2 ,
"forks" : 2 ,
"watchers" : 2 ,
2019-12-10 00:05:38 +09:00
"score" : 0
2019-12-08 22:19:20 +09:00
} ,
{
"id" : 193920426 ,
"name" : "CVE-2018-3639-specter-v4-" ,
"full_name" : "Shuiliusheng\/CVE-2018-3639-specter-v4-" ,
"owner" : {
"login" : "Shuiliusheng" ,
"id" : 12653519 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/12653519?v=4" ,
2019-12-12 14:14:27 +09:00
"html_url" : "https:\/\/github.com\/Shuiliusheng"
2019-12-08 22:19:20 +09:00
} ,
"html_url" : "https:\/\/github.com\/Shuiliusheng\/CVE-2018-3639-specter-v4-" ,
"description" : "spectre v4 : Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux" ,
"fork" : false ,
"created_at" : "2019-06-26T14:26:13Z" ,
"updated_at" : "2019-06-26T14:34:48Z" ,
"pushed_at" : "2019-06-26T14:34:46Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
2019-12-10 00:05:38 +09:00
"score" : 0
2019-12-08 22:19:20 +09:00
}
]