[ { "id": 242346098, "name": "Intel-CVE-2015-2291", "full_name": "Tare05\/Intel-CVE-2015-2291", "owner": { "login": "Tare05", "id": 12643062, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12643062?v=4", "html_url": "https:\/\/github.com\/Tare05" }, "html_url": "https:\/\/github.com\/Tare05\/Intel-CVE-2015-2291", "description": "PoC exploit for CVE-2015-2291", "fork": false, "created_at": "2020-02-22T13:27:16Z", "updated_at": "2020-07-23T20:21:47Z", "pushed_at": "2020-07-23T20:21:45Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 506108089, "name": "CVE-2015-2291", "full_name": "Exploitables\/CVE-2015-2291", "owner": { "login": "Exploitables", "id": 101071411, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101071411?v=4", "html_url": "https:\/\/github.com\/Exploitables" }, "html_url": "https:\/\/github.com\/Exploitables\/CVE-2015-2291", "description": "(1) IQVW32.sys before 1.3.1.0 and (2) IQVW64.sys before 1.3.1.0 in the Intel Ethernet diagnostics driver for Windows allows local users to cause a denial of service or possibly execute arbitrary code with kernel privileges via a crafted (a) 0x80862013, (b) 0x8086200B, (c) 0x8086200F, or (d) 0x80862007 IOCTL call.", "fork": false, "created_at": "2022-06-22T05:22:57Z", "updated_at": "2022-06-25T23:23:49Z", "pushed_at": "2022-06-28T03:51:52Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 } ]