[ { "id": 100988677, "name": "CVE-2017-8641_chakra_Js_GlobalObject", "full_name": "homjxi0e\/CVE-2017-8641_chakra_Js_GlobalObject", "owner": { "login": "homjxi0e", "id": 25440152, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4", "html_url": "https:\/\/github.com\/homjxi0e", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-8641_chakra_Js_GlobalObject", "description": "There is a classic heap overflow when eval a string which large enough in Chakra! This issue can be reproduced steadly in uptodate Edge in Win10 WIP. An exception will occur immediatly when opening POC.html in Edge. ", "fork": false, "created_at": "2017-08-21T20:11:11Z", "updated_at": "2022-04-28T13:45:25Z", "pushed_at": "2017-08-23T09:09:08Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "chakra-js-global-object", "cve-2017-8641" ], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 0 } ]