PoC-in-GitHub/2017/CVE-2017-8641.json

25 lines
1 KiB
JSON
Raw Normal View History

2019-12-08 14:19:20 +01:00
[
{
"id": 100988677,
"name": "CVE-2017-8641_chakra_Js_GlobalObject",
"full_name": "homjxi0e\/CVE-2017-8641_chakra_Js_GlobalObject",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/homjxi0e"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-8641_chakra_Js_GlobalObject",
"description": "There is a classic heap overflow when eval a string which large enough in Chakra! This issue can be reproduced steadly in uptodate Edge in Win10 WIP. An exception will occur immediatly when opening POC.html in Edge. ",
"fork": false,
"created_at": "2017-08-21T20:11:11Z",
"updated_at": "2017-08-23T09:18:42Z",
"pushed_at": "2017-08-23T09:09:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
}
]