Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Intel Corporation | Most Modern Operating Systems | All | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715) | https://github.com/Eugnis/spectre-attack | POC Details |
| 2 | Spectre (CVE-2017-5753) (CVE-2017-5715). Not By Me. Collected from Book. | https://github.com/EdwardOwusuAdjei/Spectre-PoC | POC Details |
| 3 | 2018年1月2日 (CVE-2017-5753 和 CVE-2017-5715) "幽灵" Spectre 漏洞利用 | https://github.com/poilynx/spectre-attack-example | POC Details |
| 4 | Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715) | https://github.com/pedrolucasoliva/spectre-attack-demo | POC Details |
| 5 | The demo of the speculative execution attack Spectre (CVE-2017-5753, CVE-2017-5715). | https://github.com/ixtal23/spectreScope | POC Details |
| 6 | OSX 10.13.2, CVE-2017-5753, Spectre, PoC, C, ASM for OSX, MAC, Intel Arch, Proof of Concept, Hopper.App Output | https://github.com/albertleecn/cve-2017-5753 | POC Details |
| 7 | None | https://github.com/sachinthaBS/Spectre-Vulnerability-CVE-2017-5753- | POC Details |
| 8 | 2018年1月2日 (CVE-2017-5753 和 CVE-2017-5715) "幽灵" Spectre 漏洞利用 | https://github.com/00052/spectre-attack-example | POC Details |
No public POC found.
Login to generate AI POC| CVE-2017-5715 | Intel和ARM CPU芯片信息泄露漏洞 | |
| CVE-2017-5754 | Intel和ARM CPU芯片信息泄露漏洞 |
No comments yet