Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Intel Corporation | Microprocessors with Speculative Execution | All | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Spectre exploit | https://github.com/opsxcq/exploit-cve-2017-5715 | POC Details |
| 2 | a list of BIOS/Firmware fixes adressing CVE-2017-5715, CVE-2017-5753, CVE-2017-5754 | https://github.com/mathse/meltdown-spectre-bios-list | POC Details |
| 3 | Assesses a system for the "speculative execution" vulnerabilities described in CVE-2017-5715, CVE-2017-5753, CVE-2017-5754 | https://github.com/GregAskew/SpeculativeExecutionAssessment | POC Details |
| 4 | A quick-and-dirty tool to verify that userspace executables are immune to Spectre variant 2 (CVE-2017-5715). | https://github.com/dmo2118/retpoline-audit | POC Details |
| 5 | None | https://github.com/GalloLuigi/Analisi-CVE-2017-5715 | POC Details |
No public POC found.
Login to generate AI POC

| CVE-2017-5753 | Intel和ARM CPU芯片信息泄露漏洞 | |
| CVE-2017-5754 | Intel和ARM CPU芯片信息泄露漏洞 |
No comments yet