29 lines
No EOL
1.1 KiB
JSON
29 lines
No EOL
1.1 KiB
JSON
[
|
|
{
|
|
"name": "CVE-2018-8897",
|
|
"full_name": "can1357/CVE-2018-8897",
|
|
"html_url": "https://github.com/can1357/CVE-2018-8897",
|
|
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
|
|
"stargazers_count": 410,
|
|
"forks_count": 100,
|
|
"created_at": "2018-05-13T19:34:17Z"
|
|
},
|
|
{
|
|
"name": "syscall_exploit_CVE-2018-8897",
|
|
"full_name": "nmulasmajic/syscall_exploit_CVE-2018-8897",
|
|
"html_url": "https://github.com/nmulasmajic/syscall_exploit_CVE-2018-8897",
|
|
"description": "Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).",
|
|
"stargazers_count": 116,
|
|
"forks_count": 22,
|
|
"created_at": "2018-08-08T20:04:56Z"
|
|
},
|
|
{
|
|
"name": "CVE-2018-8897",
|
|
"full_name": "nmulasmajic/CVE-2018-8897",
|
|
"html_url": "https://github.com/nmulasmajic/CVE-2018-8897",
|
|
"description": "Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS). ",
|
|
"stargazers_count": 74,
|
|
"forks_count": 26,
|
|
"created_at": "2018-05-10T20:46:30Z"
|
|
}
|
|
] |