github_poc_collector/exploits/2018/CVE-2018-8897.json

29 lines
No EOL
1.1 KiB
JSON

[
{
"name": "CVE-2018-8897",
"full_name": "can1357/CVE-2018-8897",
"html_url": "https://github.com/can1357/CVE-2018-8897",
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
"stargazers_count": 410,
"forks_count": 100,
"created_at": "2018-05-13T19:34:17Z"
},
{
"name": "syscall_exploit_CVE-2018-8897",
"full_name": "nmulasmajic/syscall_exploit_CVE-2018-8897",
"html_url": "https://github.com/nmulasmajic/syscall_exploit_CVE-2018-8897",
"description": "Implements the POP/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).",
"stargazers_count": 116,
"forks_count": 22,
"created_at": "2018-08-08T20:04:56Z"
},
{
"name": "CVE-2018-8897",
"full_name": "nmulasmajic/CVE-2018-8897",
"html_url": "https://github.com/nmulasmajic/CVE-2018-8897",
"description": "Implements the POP/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS). ",
"stargazers_count": 74,
"forks_count": 26,
"created_at": "2018-05-10T20:46:30Z"
}
]