PoC-in-GitHub/2015/CVE-2015-2291.json
2026-01-25 15:45:30 +09:00

126 lines
No EOL
4.7 KiB
JSON

[
{
"id": 242346098,
"name": "Intel-CVE-2015-2291",
"full_name": "Tare05\/Intel-CVE-2015-2291",
"owner": {
"login": "Tare05",
"id": 12643062,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12643062?v=4",
"html_url": "https:\/\/github.com\/Tare05",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Tare05\/Intel-CVE-2015-2291",
"description": "PoC exploit for CVE-2015-2291",
"fork": false,
"created_at": "2020-02-22T13:27:16Z",
"updated_at": "2025-05-01T19:17:56Z",
"pushed_at": "2020-07-23T20:21:45Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},
{
"id": 508399948,
"name": "CVE-2015-2291",
"full_name": "gmh5225\/CVE-2015-2291",
"owner": {
"login": "gmh5225",
"id": 13917777,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13917777?v=4",
"html_url": "https:\/\/github.com\/gmh5225",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/gmh5225\/CVE-2015-2291",
"description": "(1) IQVW32.sys before 1.3.1.0 and (2) IQVW64.sys before 1.3.1.0 in the Intel Ethernet diagnostics driver for Windows allows local users to cause a denial of service or possibly execute arbitrary code with kernel privileges via a crafted (a) 0x80862013, (b) 0x8086200B, (c) 0x8086200F, or (d) 0x80862007 IOCTL call.",
"fork": false,
"created_at": "2022-06-28T17:46:19Z",
"updated_at": "2026-01-25T01:50:58Z",
"pushed_at": "2022-06-28T03:51:52Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 4,
"score": 0,
"subscribers_count": 0
},
{
"id": 1136642237,
"name": "CVE-2015-2291-Spoofer-Analysis",
"full_name": "paysonism\/CVE-2015-2291-Spoofer-Analysis",
"owner": {
"login": "paysonism",
"id": 79509967,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79509967?v=4",
"html_url": "https:\/\/github.com\/paysonism",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/paysonism\/CVE-2015-2291-Spoofer-Analysis",
"description": "Overview of a application that I reversed using the CVE-2015-2291 exploit from the Intel Ethernet Diagnostics Driver (iQVW32.sys) for memory manipulation used in hwid spoofing.",
"fork": false,
"created_at": "2026-01-18T04:05:36Z",
"updated_at": "2026-01-23T13:00:02Z",
"pushed_at": "2026-01-18T04:31:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1141548850,
"name": "iqvw64e-privilege-escalation",
"full_name": "ethanedits\/iqvw64e-privilege-escalation",
"owner": {
"login": "ethanedits",
"id": 58463523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58463523?v=4",
"html_url": "https:\/\/github.com\/ethanedits",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ethanedits\/iqvw64e-privilege-escalation",
"description": "CVE-2015-2291 Local Privilege Escalation PoC",
"fork": false,
"created_at": "2026-01-25T02:03:04Z",
"updated_at": "2026-01-25T05:16:45Z",
"pushed_at": "2026-01-25T05:16:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]