PoC-in-GitHub/2018/CVE-2018-3639.json
2022-06-29 03:20:29 +09:00

124 lines
No EOL
4.3 KiB
JSON

[
{
"id": 135628428,
"name": "ssbd-tools",
"full_name": "tyhicks\/ssbd-tools",
"owner": {
"login": "tyhicks",
"id": 1051156,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1051156?v=4",
"html_url": "https:\/\/github.com\/tyhicks"
},
"html_url": "https:\/\/github.com\/tyhicks\/ssbd-tools",
"description": "Tools to exercise the Linux kernel mitigation for CVE-2018-3639 (aka Variant 4) using the Speculative Store Bypass Disable (SSBD) feature of x86 processors",
"fork": false,
"created_at": "2018-05-31T19:48:18Z",
"updated_at": "2021-08-09T13:07:59Z",
"pushed_at": "2018-06-01T16:53:36Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2018-3639",
"side-channel",
"speculation",
"ssbd",
"variant4"
],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 137829375,
"name": "Intel-CVE-2018-3639-Mitigation_RegistryUpdate",
"full_name": "malindarathnayake\/Intel-CVE-2018-3639-Mitigation_RegistryUpdate",
"owner": {
"login": "malindarathnayake",
"id": 9443796,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9443796?v=4",
"html_url": "https:\/\/github.com\/malindarathnayake"
},
"html_url": "https:\/\/github.com\/malindarathnayake\/Intel-CVE-2018-3639-Mitigation_RegistryUpdate",
"description": null,
"fork": false,
"created_at": "2018-06-19T02:19:26Z",
"updated_at": "2018-06-19T02:57:22Z",
"pushed_at": "2018-06-19T02:57:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 186128549,
"name": "CVE-2018-3639",
"full_name": "mmxsrup\/CVE-2018-3639",
"owner": {
"login": "mmxsrup",
"id": 19609323,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19609323?v=4",
"html_url": "https:\/\/github.com\/mmxsrup"
},
"html_url": "https:\/\/github.com\/mmxsrup\/CVE-2018-3639",
"description": "Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux",
"fork": false,
"created_at": "2019-05-11T12:11:05Z",
"updated_at": "2022-02-17T22:47:47Z",
"pushed_at": "2021-10-22T16:05:33Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2018-3639",
"spectre",
"spectreexploit-poc"
],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 193920426,
"name": "CVE-2018-3639-specter-v4-",
"full_name": "Shuiliusheng\/CVE-2018-3639-specter-v4-",
"owner": {
"login": "Shuiliusheng",
"id": 12653519,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12653519?v=4",
"html_url": "https:\/\/github.com\/Shuiliusheng"
},
"html_url": "https:\/\/github.com\/Shuiliusheng\/CVE-2018-3639-specter-v4-",
"description": "spectre v4 : Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux",
"fork": false,
"created_at": "2019-06-26T14:26:13Z",
"updated_at": "2022-06-09T13:28:22Z",
"pushed_at": "2019-06-26T14:34:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
}
]