Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Test wether you're exposed to ghost (CVE-2015-0235). All kudos go to Qualys Security | https://github.com/fser/ghost-checker | POC Details |
| 2 | A chef cookbook to test the GHOST vulnerability | https://github.com/mikesplain/CVE-2015-0235-cookbook | POC Details |
| 3 | Ansible playbook to check vulnerability for CVE-2015-0235 | https://github.com/aaronfay/CVE-2015-0235-test | POC Details |
| 4 | glibc vulnerability GHOST(CVE-2015-0235) Affected software list | https://github.com/piyokango/ghost | POC Details |
| 5 | None | https://github.com/mholzinger/CVE-2015-0235_GHOST | POC Details |
| 6 | Ansible playbook, to check for CVE-2015-0235 (GHOST) vulnerability | https://github.com/adherzog/ansible-CVE-2015-0235-GHOST | POC Details |
| 7 | CVE-2015-0235 patches lenny libc6 packages for amd64 | https://github.com/favoretti/lenny-libc6 | POC Details |
| 8 | gethostbyname*() buffer overflow exploit in glibc - CVE-2015-0235 https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability | https://github.com/nickanderson/cfengine-CVE_2015_0235 | POC Details |
| 9 | cookbook for update glibc. CVE-2015-0235(GHOST) | https://github.com/koudaiii-archives/cookbook-update-glibc | POC Details |
| 10 | Playbooks 'Fix for CVE-2015-0235(GHOST)' running on Ansible | https://github.com/F88/ghostbusters15 | POC Details |
| 11 | glibc gethostbyname bug | https://github.com/tobyzxj/CVE-2015-0235 | POC Details |
| 12 | A shared library wrapper with additional checks for vulnerable functions gethostbyname2_r gethostbyname_r (GHOST vulnerability) | https://github.com/makelinux/CVE-2015-0235-workaround | POC Details |
| 13 | CVE-2015-0235 EXIM ESTMP GHOST Glibc Gethostbyname() DoS Exploit/PoC | https://github.com/arm13/ghost_exploit | POC Details |
| 14 | CVE-2015-0235 | https://github.com/alanmeyer/CVE-glibc | POC Details |
| 15 | Script to test vulnarability for CVE-2015-0235 | https://github.com/1and1-serversupport/ghosttester | POC Details |
| 16 | None | https://github.com/sUbc0ol/CVE-2015-0235 | POC Details |
| 17 | A check for GHOST; cve-2015-0235 | https://github.com/chayim/GHOSTCHECK-cve-2015-0235 | POC Details |
| 18 | None | https://github.com/limkokholefork/GHOSTCHECK-cve-2015-0235 | POC Details |
| 19 | None | https://github.com/furyutei/CVE-2015-0235_GHOST | POC Details |
No public POC found.
Login to generate AI POC
| CVE-2014-8917 | IBM Social Media Analytics 跨站脚本漏洞 | |
| CVE-2014-8920 | IBM i Access 5770-XE1 Data Transfer Program 缓冲区溢出漏洞 | |
| CVE-2015-0312 | Adobe Flash Player 双重释放漏洞 | |
| CVE-2015-0581 | Cisco Prime Service Catalog 安全漏洞 | |
| CVE-2015-0586 | Cisco 2900 Series Integrated Services Router 拒绝服务漏洞 | |
| CVE-2015-1375 | WordPress Pixabay Images插件权限许可和访问控制漏洞 | |
| CVE-2015-1376 | WordPress Pixabay Images插件输入验证漏洞 | |
| CVE-2015-1419 | VSFTP 安全漏洞 |
No comments yet