Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Test wether you're exposed to ghost (CVE-2015-0235). All kudos go to Qualys Security | https://github.com/fser/ghost-checker | POC Details |
| 2 | A chef cookbook to test the GHOST vulnerability | https://github.com/mikesplain/CVE-2015-0235-cookbook | POC Details |
| 3 | Ansible playbook to check vulnerability for CVE-2015-0235 | https://github.com/aaronfay/CVE-2015-0235-test | POC Details |
| 4 | glibc vulnerability GHOST(CVE-2015-0235) Affected software list | https://github.com/piyokango/ghost | POC Details |
| 5 | None | https://github.com/mholzinger/CVE-2015-0235_GHOST | POC Details |
| 6 | Ansible playbook, to check for CVE-2015-0235 (GHOST) vulnerability | https://github.com/adherzog/ansible-CVE-2015-0235-GHOST | POC Details |
| 7 | CVE-2015-0235 patches lenny libc6 packages for amd64 | https://github.com/favoretti/lenny-libc6 | POC Details |
| 8 | gethostbyname*() buffer overflow exploit in glibc - CVE-2015-0235 https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability | https://github.com/nickanderson/cfengine-CVE_2015_0235 | POC Details |
| 9 | cookbook for update glibc. CVE-2015-0235(GHOST) | https://github.com/koudaiii-archives/cookbook-update-glibc | POC Details |
| 10 | Playbooks 'Fix for CVE-2015-0235(GHOST)' running on Ansible | https://github.com/F88/ghostbusters15 | POC Details |
| 11 | glibc gethostbyname bug | https://github.com/tobyzxj/CVE-2015-0235 | POC Details |
| 12 | A shared library wrapper with additional checks for vulnerable functions gethostbyname2_r gethostbyname_r (GHOST vulnerability) | https://github.com/makelinux/CVE-2015-0235-workaround | POC Details |
| 13 | CVE-2015-0235 EXIM ESTMP GHOST Glibc Gethostbyname() DoS Exploit/PoC | https://github.com/arm13/ghost_exploit | POC Details |
| 14 | CVE-2015-0235 | https://github.com/alanmeyer/CVE-glibc | POC Details |
| 15 | Script to test vulnarability for CVE-2015-0235 | https://github.com/1and1-serversupport/ghosttester | POC Details |
| 16 | None | https://github.com/sUbc0ol/CVE-2015-0235 | POC Details |
| 17 | A check for GHOST; cve-2015-0235 | https://github.com/chayim/GHOSTCHECK-cve-2015-0235 | POC Details |
| 18 | None | https://github.com/limkokholefork/GHOSTCHECK-cve-2015-0235 | POC Details |
| 19 | None | https://github.com/furyutei/CVE-2015-0235_GHOST | POC Details |
No public POC found.
Login to generate AI POCNo comments yet