PoC-in-GitHub/2025/CVE-2025-29943.json
2026-01-21 03:47:24 +09:00

33 lines
No EOL
1.4 KiB
JSON

[
{
"id": 1138443239,
"name": "POC_CVE-2025-29943_Write-what-where-Condition",
"full_name": "fevar54\/POC_CVE-2025-29943_Write-what-where-Condition",
"owner": {
"login": "fevar54",
"id": 80516843,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80516843?v=4",
"html_url": "https:\/\/github.com\/fevar54",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/fevar54\/POC_CVE-2025-29943_Write-what-where-Condition",
"description": "StackWarp POC (CVE-2025-29943): Explotación de hardware en CPUs AMD Zen que manipula un bit no documentado del motor de pila para corruptir el puntero de stack en VMs SEV-SNP protegidas, demostrando una falla en el aislamiento de memoria garantizado por SEV. Incluye módulo de kernel, scripts de automatización y entorno de pruebas.",
"fork": false,
"created_at": "2026-01-20T17:19:31Z",
"updated_at": "2026-01-20T17:50:51Z",
"pushed_at": "2026-01-20T17:50:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]