mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
94 lines
No EOL
3.4 KiB
JSON
94 lines
No EOL
3.4 KiB
JSON
[
|
|
{
|
|
"id": 132952646,
|
|
"name": "CVE-2018-8897",
|
|
"full_name": "nmulasmajic\/CVE-2018-8897",
|
|
"owner": {
|
|
"login": "nmulasmajic",
|
|
"id": 30013958,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30013958?v=4",
|
|
"html_url": "https:\/\/github.com\/nmulasmajic"
|
|
},
|
|
"html_url": "https:\/\/github.com\/nmulasmajic\/CVE-2018-8897",
|
|
"description": "Implements the POP\/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS). ",
|
|
"fork": false,
|
|
"created_at": "2018-05-10T20:46:30Z",
|
|
"updated_at": "2021-02-23T02:30:59Z",
|
|
"pushed_at": "2018-05-10T20:47:59Z",
|
|
"stargazers_count": 72,
|
|
"watchers_count": 72,
|
|
"forks_count": 28,
|
|
"forks": 28,
|
|
"watchers": 72,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 133221173,
|
|
"name": "pop-mov-ss-exploit",
|
|
"full_name": "jiazhang0\/pop-mov-ss-exploit",
|
|
"owner": {
|
|
"login": "jiazhang0",
|
|
"id": 10241344,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10241344?v=4",
|
|
"html_url": "https:\/\/github.com\/jiazhang0"
|
|
},
|
|
"html_url": "https:\/\/github.com\/jiazhang0\/pop-mov-ss-exploit",
|
|
"description": "The exploitation for CVE-2018-8897",
|
|
"fork": false,
|
|
"created_at": "2018-05-13T09:05:07Z",
|
|
"updated_at": "2021-02-23T17:18:57Z",
|
|
"pushed_at": "2018-05-16T14:15:19Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"forks_count": 4,
|
|
"forks": 4,
|
|
"watchers": 4,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 133268202,
|
|
"name": "CVE-2018-8897",
|
|
"full_name": "can1357\/CVE-2018-8897",
|
|
"owner": {
|
|
"login": "can1357",
|
|
"id": 11807264,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11807264?v=4",
|
|
"html_url": "https:\/\/github.com\/can1357"
|
|
},
|
|
"html_url": "https:\/\/github.com\/can1357\/CVE-2018-8897",
|
|
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
|
|
"fork": false,
|
|
"created_at": "2018-05-13T19:34:17Z",
|
|
"updated_at": "2021-03-01T15:05:24Z",
|
|
"pushed_at": "2018-05-18T12:26:53Z",
|
|
"stargazers_count": 385,
|
|
"watchers_count": 385,
|
|
"forks_count": 108,
|
|
"forks": 108,
|
|
"watchers": 385,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 144062105,
|
|
"name": "syscall_exploit_CVE-2018-8897",
|
|
"full_name": "nmulasmajic\/syscall_exploit_CVE-2018-8897",
|
|
"owner": {
|
|
"login": "nmulasmajic",
|
|
"id": 30013958,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30013958?v=4",
|
|
"html_url": "https:\/\/github.com\/nmulasmajic"
|
|
},
|
|
"html_url": "https:\/\/github.com\/nmulasmajic\/syscall_exploit_CVE-2018-8897",
|
|
"description": "Implements the POP\/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).",
|
|
"fork": false,
|
|
"created_at": "2018-08-08T20:04:56Z",
|
|
"updated_at": "2021-02-23T02:31:35Z",
|
|
"pushed_at": "2018-08-08T20:12:20Z",
|
|
"stargazers_count": 106,
|
|
"watchers_count": 106,
|
|
"forks_count": 24,
|
|
"forks": 24,
|
|
"watchers": 106,
|
|
"score": 0
|
|
}
|
|
] |