mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 21:02:22 +01:00
94 lines
No EOL
3.4 KiB
JSON
94 lines
No EOL
3.4 KiB
JSON
[
|
|
{
|
|
"id": 135628428,
|
|
"name": "ssbd-tools",
|
|
"full_name": "tyhicks\/ssbd-tools",
|
|
"owner": {
|
|
"login": "tyhicks",
|
|
"id": 1051156,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1051156?v=4",
|
|
"html_url": "https:\/\/github.com\/tyhicks"
|
|
},
|
|
"html_url": "https:\/\/github.com\/tyhicks\/ssbd-tools",
|
|
"description": "Tools to exercise the Linux kernel mitigation for CVE-2018-3639 (aka Variant 4) using the Speculative Store Bypass Disable (SSBD) feature of x86 processors",
|
|
"fork": false,
|
|
"created_at": "2018-05-31T19:48:18Z",
|
|
"updated_at": "2019-12-16T15:32:25Z",
|
|
"pushed_at": "2018-06-01T16:53:36Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 137829375,
|
|
"name": "Intel-CVE-2018-3639-Mitigation_RegistryUpdate",
|
|
"full_name": "malindarathnayake\/Intel-CVE-2018-3639-Mitigation_RegistryUpdate",
|
|
"owner": {
|
|
"login": "malindarathnayake",
|
|
"id": 9443796,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/9443796?v=4",
|
|
"html_url": "https:\/\/github.com\/malindarathnayake"
|
|
},
|
|
"html_url": "https:\/\/github.com\/malindarathnayake\/Intel-CVE-2018-3639-Mitigation_RegistryUpdate",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2018-06-19T02:19:26Z",
|
|
"updated_at": "2018-06-19T02:57:22Z",
|
|
"pushed_at": "2018-06-19T02:57:21Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 186128549,
|
|
"name": "CVE-2018-3639",
|
|
"full_name": "mmxsrup\/CVE-2018-3639",
|
|
"owner": {
|
|
"login": "mmxsrup",
|
|
"id": 19609323,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/19609323?v=4",
|
|
"html_url": "https:\/\/github.com\/mmxsrup"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mmxsrup\/CVE-2018-3639",
|
|
"description": "Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux",
|
|
"fork": false,
|
|
"created_at": "2019-05-11T12:11:05Z",
|
|
"updated_at": "2019-08-02T09:55:31Z",
|
|
"pushed_at": "2019-05-13T22:21:05Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 193920426,
|
|
"name": "CVE-2018-3639-specter-v4-",
|
|
"full_name": "Shuiliusheng\/CVE-2018-3639-specter-v4-",
|
|
"owner": {
|
|
"login": "Shuiliusheng",
|
|
"id": 12653519,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/12653519?v=4",
|
|
"html_url": "https:\/\/github.com\/Shuiliusheng"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Shuiliusheng\/CVE-2018-3639-specter-v4-",
|
|
"description": "spectre v4 : Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux",
|
|
"fork": false,
|
|
"created_at": "2019-06-26T14:26:13Z",
|
|
"updated_at": "2019-06-26T14:34:48Z",
|
|
"pushed_at": "2019-06-26T14:34:46Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |