Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Intel Corporation | Most Modern Operating Systems | All | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4) | https://github.com/ionescu007/SpecuCheck | POC Details |
| 2 | Meltdown Exploit / Proof-of-concept / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN. | https://github.com/raphaelsc/Am-I-affected-by-Meltdown | POC Details |
| 3 | This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in | https://github.com/Viralmaniar/In-Spectre-Meltdown | POC Details |
| 4 | Proof-of-concept / Exploit / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a | https://github.com/speecyy/Am-I-affected-by-Meltdown | POC Details |
| 5 | PoC for Meltdown in linux (CVE-2017-5754) | https://github.com/zzado/Meltdown | POC Details |
| 6 | Naive shell script to verify Meltdown (CVE-2017-5754) patch status of EC2 instances | https://github.com/jdmulloy/meltdown-aws-scanner | POC Details |
No public POC found.
Login to generate AI POC| CVE-2017-5715 | Intel和ARM CPU芯片信息泄露漏洞 | |
| CVE-2017-5753 | Intel和ARM CPU芯片信息泄露漏洞 |
No comments yet