Auto Update 2020/09/09 18:08:51

This commit is contained in:
motikan2010-bot 2020-09-09 18:08:51 +09:00
parent 77bf365c2b
commit 991ef6a552
23 changed files with 87 additions and 312 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-09-08T03:06:41Z",
"updated_at": "2020-09-09T04:32:14Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 674,
"watchers_count": 674,
"stargazers_count": 675,
"watchers_count": 675,
"forks_count": 165,
"forks": 165,
"watchers": 674,
"watchers": 675,
"score": 0
},
{

View file

@ -1,25 +0,0 @@
[
{
"id": 19259219,
"name": "imposter",
"full_name": "bugch3ck\/imposter",
"owner": {
"login": "bugch3ck",
"id": 4165895,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4165895?v=4",
"html_url": "https:\/\/github.com\/bugch3ck"
},
"html_url": "https:\/\/github.com\/bugch3ck\/imposter",
"description": "Proof of concept for CVE-2015-0006. Fixed in MS15-005 https:\/\/docs.microsoft.com\/en-us\/security-updates\/SecurityBulletins\/2015\/ms15-005 .",
"fork": false,
"created_at": "2014-04-29T01:05:57Z",
"updated_at": "2018-06-26T21:10:14Z",
"pushed_at": "2014-06-07T23:45:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,188 +1,4 @@
[
{
"id": 29925728,
"name": "ghost-checker",
"full_name": "fser\/ghost-checker",
"owner": {
"login": "fser",
"id": 774138,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/774138?v=4",
"html_url": "https:\/\/github.com\/fser"
},
"html_url": "https:\/\/github.com\/fser\/ghost-checker",
"description": "Test wether you're exposed to ghost (CVE-2015-0235). All kudos go to Qualys Security",
"fork": false,
"created_at": "2015-01-27T17:31:33Z",
"updated_at": "2018-05-15T04:55:01Z",
"pushed_at": "2015-01-27T17:35:16Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 29933656,
"name": "CVE-2015-0235-cookbook",
"full_name": "mikesplain\/CVE-2015-0235-cookbook",
"owner": {
"login": "mikesplain",
"id": 881965,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/881965?v=4",
"html_url": "https:\/\/github.com\/mikesplain"
},
"html_url": "https:\/\/github.com\/mikesplain\/CVE-2015-0235-cookbook",
"description": "A chef cookbook to test the GHOST vulnerability",
"fork": false,
"created_at": "2015-01-27T20:34:42Z",
"updated_at": "2017-09-29T11:32:54Z",
"pushed_at": "2015-01-27T21:41:24Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 29941036,
"name": "CVE-2015-0235-test",
"full_name": "aaronfay\/CVE-2015-0235-test",
"owner": {
"login": "aaronfay",
"id": 1033941,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1033941?v=4",
"html_url": "https:\/\/github.com\/aaronfay"
},
"html_url": "https:\/\/github.com\/aaronfay\/CVE-2015-0235-test",
"description": "Ansible playbook to check vulnerability for CVE-2015-0235",
"fork": false,
"created_at": "2015-01-27T23:45:22Z",
"updated_at": "2016-08-31T16:50:49Z",
"pushed_at": "2015-01-29T03:33:29Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 3,
"forks": 3,
"watchers": 14,
"score": 0
},
{
"id": 29942046,
"name": "ghost",
"full_name": "piyokango\/ghost",
"owner": {
"login": "piyokango",
"id": 10733273,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10733273?v=4",
"html_url": "https:\/\/github.com\/piyokango"
},
"html_url": "https:\/\/github.com\/piyokango\/ghost",
"description": "glibc vulnerability GHOST(CVE-2015-0235) Affected software list",
"fork": false,
"created_at": "2015-01-28T00:14:35Z",
"updated_at": "2015-08-13T21:27:35Z",
"pushed_at": "2015-01-28T14:29:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 29948700,
"name": "GHOSTCHECK-cve-2015-0235",
"full_name": "LyricalSecurity\/GHOSTCHECK-cve-2015-0235",
"owner": {
"login": "LyricalSecurity",
"id": 10375093,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10375093?v=4",
"html_url": "https:\/\/github.com\/LyricalSecurity"
},
"html_url": "https:\/\/github.com\/LyricalSecurity\/GHOSTCHECK-cve-2015-0235",
"description": null,
"fork": false,
"created_at": "2015-01-28T03:30:21Z",
"updated_at": "2020-04-23T22:26:31Z",
"pushed_at": "2015-01-28T15:10:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 29950345,
"name": "CVE-2015-0235_GHOST",
"full_name": "mholzinger\/CVE-2015-0235_GHOST",
"owner": {
"login": "mholzinger",
"id": 235958,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/235958?v=4",
"html_url": "https:\/\/github.com\/mholzinger"
},
"html_url": "https:\/\/github.com\/mholzinger\/CVE-2015-0235_GHOST",
"description": null,
"fork": false,
"created_at": "2015-01-28T04:22:05Z",
"updated_at": "2016-02-26T05:46:40Z",
"pushed_at": "2015-01-28T05:26:34Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 29988916,
"name": "ansible-CVE-2015-0235-GHOST",
"full_name": "adherzog\/ansible-CVE-2015-0235-GHOST",
"owner": {
"login": "adherzog",
"id": 1744181,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1744181?v=4",
"html_url": "https:\/\/github.com\/adherzog"
},
"html_url": "https:\/\/github.com\/adherzog\/ansible-CVE-2015-0235-GHOST",
"description": "Ansible playbook, to check for CVE-2015-0235 (GHOST) vulnerability",
"fork": false,
"created_at": "2015-01-28T21:22:33Z",
"updated_at": "2015-01-28T21:23:35Z",
"pushed_at": "2015-01-28T21:23:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 29993101,
"name": "lenny-libc6",
"full_name": "favoretti\/lenny-libc6",
"owner": {
"login": "favoretti",
"id": 805046,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/805046?v=4",
"html_url": "https:\/\/github.com\/favoretti"
},
"html_url": "https:\/\/github.com\/favoretti\/lenny-libc6",
"description": "CVE-2015-0235 patches lenny libc6 packages for amd64",
"fork": false,
"created_at": "2015-01-28T23:09:13Z",
"updated_at": "2015-01-28T23:09:13Z",
"pushed_at": "2015-01-28T23:11:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 30004399,
"name": "cfengine-CVE_2015_0235",

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-09-08T03:06:41Z",
"updated_at": "2020-09-09T04:32:14Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 674,
"watchers_count": 674,
"stargazers_count": 675,
"watchers_count": 675,
"forks_count": 165,
"forks": 165,
"watchers": 674,
"watchers": 675,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-09-08T03:06:41Z",
"updated_at": "2020-09-09T04:32:14Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 674,
"watchers_count": 674,
"stargazers_count": 675,
"watchers_count": 675,
"forks_count": 165,
"forks": 165,
"watchers": 674,
"watchers": 675,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-05-15T16:36:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
}

View file

@ -82,8 +82,8 @@
"description": "CVE-2018-13379 Script for Nmap NSE.",
"fork": false,
"created_at": "2019-10-14T04:09:44Z",
"updated_at": "2019-12-19T09:29:05Z",
"pushed_at": "2019-11-21T22:10:33Z",
"updated_at": "2020-09-09T05:06:07Z",
"pushed_at": "2020-09-09T05:06:05Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-09-08T03:06:41Z",
"updated_at": "2020-09-09T04:32:14Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 674,
"watchers_count": 674,
"stargazers_count": 675,
"watchers_count": 675,
"forks_count": 165,
"forks": 165,
"watchers": 674,
"watchers": 675,
"score": 0
},
{

View file

@ -2210,14 +2210,14 @@
{
"id": 206976374,
"name": "CVE-2019-0708-EXP-MSF-",
"full_name": "qinggegeya\/CVE-2019-0708-EXP-MSF-",
"full_name": "qing-root\/CVE-2019-0708-EXP-MSF-",
"owner": {
"login": "qinggegeya",
"login": "qing-root",
"id": 30001685,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/30001685?v=4",
"html_url": "https:\/\/github.com\/qinggegeya"
"html_url": "https:\/\/github.com\/qing-root"
},
"html_url": "https:\/\/github.com\/qinggegeya\/CVE-2019-0708-EXP-MSF-",
"html_url": "https:\/\/github.com\/qing-root\/CVE-2019-0708-EXP-MSF-",
"description": "CVE-2019-0708-EXP(MSF) Vulnerability exploit program for cve-2019-0708",
"fork": false,
"created_at": "2019-09-07T14:02:50Z",

View file

@ -13,13 +13,13 @@
"description": "POC for cve-2019-1458",
"fork": false,
"created_at": "2020-03-03T17:55:07Z",
"updated_at": "2020-09-09T02:30:45Z",
"updated_at": "2020-09-09T06:54:41Z",
"pushed_at": "2020-03-04T07:05:24Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 123,
"watchers_count": 123,
"forks_count": 50,
"forks": 50,
"watchers": 121,
"watchers": 123,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
"fork": false,
"created_at": "2019-12-12T07:58:11Z",
"updated_at": "2020-08-31T16:45:38Z",
"updated_at": "2020-09-09T06:43:55Z",
"pushed_at": "2020-08-31T16:45:35Z",
"stargazers_count": 150,
"watchers_count": 150,
"stargazers_count": 151,
"watchers_count": 151,
"forks_count": 39,
"forks": 39,
"watchers": 150,
"watchers": 151,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-07-25T08:01:07Z",
"stargazers_count": 309,
"watchers_count": 309,
"forks_count": 95,
"forks": 95,
"forks_count": 96,
"forks": 96,
"watchers": 309,
"score": 0
},

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-09-08T03:06:41Z",
"updated_at": "2020-09-09T04:32:14Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 674,
"watchers_count": 674,
"stargazers_count": 675,
"watchers_count": 675,
"forks_count": 165,
"forks": 165,
"watchers": 674,
"watchers": 675,
"score": 0
}
]

View file

@ -312,13 +312,13 @@
"description": "Weblogic CVE-2019-2725 CVE-2019-2729 Getshell 命令执行 ",
"fork": false,
"created_at": "2019-06-24T08:33:07Z",
"updated_at": "2020-09-05T21:03:52Z",
"updated_at": "2020-09-09T03:34:34Z",
"pushed_at": "2019-07-15T06:03:15Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 20,
"forks": 20,
"watchers": 60,
"watchers": 59,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2020-08-10T21:34:16Z",
"updated_at": "2020-08-30T14:18:31Z",
"updated_at": "2020-09-09T08:57:34Z",
"pushed_at": "2020-08-11T21:48:12Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
"forks": 4,
"watchers": 10,
"watchers": 12,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-09-08T06:06:36Z",
"updated_at": "2020-09-08T06:09:57Z",
"updated_at": "2020-09-09T06:43:33Z",
"pushed_at": "2020-09-08T06:09:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
"updated_at": "2020-09-06T12:43:34Z",
"updated_at": "2020-09-09T03:34:15Z",
"pushed_at": "2020-06-19T09:28:15Z",
"stargazers_count": 216,
"watchers_count": 216,
"stargazers_count": 215,
"watchers_count": 215,
"forks_count": 78,
"forks": 78,
"watchers": 216,
"watchers": 215,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2020-09-08T15:01:33Z",
"updated_at": "2020-09-09T06:15:02Z",
"pushed_at": "2020-06-18T00:42:57Z",
"stargazers_count": 411,
"watchers_count": 411,
"stargazers_count": 412,
"watchers_count": 412,
"forks_count": 98,
"forks": 98,
"watchers": 411,
"watchers": 412,
"score": 0
}
]

View file

@ -86,8 +86,8 @@
"pushed_at": "2020-03-13T09:54:16Z",
"stargazers_count": 529,
"watchers_count": 529,
"forks_count": 181,
"forks": 181,
"forks_count": 180,
"forks": 180,
"watchers": 529,
"score": 0
},
@ -358,13 +358,13 @@
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
"fork": false,
"created_at": "2020-03-12T18:34:40Z",
"updated_at": "2020-09-09T02:55:28Z",
"updated_at": "2020-09-09T06:54:44Z",
"pushed_at": "2020-03-14T10:04:59Z",
"stargazers_count": 249,
"watchers_count": 249,
"forks_count": 100,
"forks": 100,
"watchers": 249,
"stargazers_count": 251,
"watchers_count": 251,
"forks_count": 101,
"forks": 101,
"watchers": 251,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code",
"fork": false,
"created_at": "2020-09-03T14:45:51Z",
"updated_at": "2020-09-09T02:36:11Z",
"updated_at": "2020-09-09T07:20:59Z",
"pushed_at": "2020-09-08T20:01:05Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 6,
"forks": 6,
"watchers": 22,
"watchers": 23,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "PoC exploit of CVE-2020-11651 and CVE-2020-11652",
"fork": false,
"created_at": "2020-05-04T11:52:28Z",
"updated_at": "2020-09-08T08:33:48Z",
"updated_at": "2020-09-09T06:46:02Z",
"pushed_at": "2020-07-10T09:30:47Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 26,
"forks": 26,
"watchers": 58,
"watchers": 59,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2020-09-08T03:06:41Z",
"updated_at": "2020-09-09T04:32:14Z",
"pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 674,
"watchers_count": 674,
"stargazers_count": 675,
"watchers_count": 675,
"forks_count": 165,
"forks": 165,
"watchers": 674,
"watchers": 675,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "Weblogic IIOP CVE-2020-2551",
"fork": false,
"created_at": "2020-02-28T08:46:21Z",
"updated_at": "2020-09-03T07:07:18Z",
"updated_at": "2020-09-09T06:42:52Z",
"pushed_at": "2020-04-07T03:32:24Z",
"stargazers_count": 222,
"watchers_count": 222,
"stargazers_count": 223,
"watchers_count": 223,
"forks_count": 55,
"forks": 55,
"watchers": 222,
"watchers": 223,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "Use shell to build weblogic debug environment for CVE-2020-2551",
"fork": false,
"created_at": "2020-04-06T10:47:35Z",
"updated_at": "2020-08-26T02:34:02Z",
"updated_at": "2020-09-09T03:15:12Z",
"pushed_at": "2020-04-06T10:59:36Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 1,
"forks": 1,
"watchers": 13,
"watchers": 14,
"score": 0
},
{

View file

@ -2312,7 +2312,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
- [Micr067/CVE-2019-0708RDP-MSF](https://github.com/Micr067/CVE-2019-0708RDP-MSF)
- [adkinguzi/CVE-2019-0708-BlueKeep](https://github.com/adkinguzi/CVE-2019-0708-BlueKeep)
- [FrostsaberX/CVE-2019-0708](https://github.com/FrostsaberX/CVE-2019-0708)
- [qinggegeya/CVE-2019-0708-EXP-MSF-](https://github.com/qinggegeya/CVE-2019-0708-EXP-MSF-)
- [qing-root/CVE-2019-0708-EXP-MSF-](https://github.com/qing-root/CVE-2019-0708-EXP-MSF-)
- [distance-vector/CVE-2019-0708](https://github.com/distance-vector/CVE-2019-0708)
- [0xFlag/CVE-2019-0708-test](https://github.com/0xFlag/CVE-2019-0708-test)
- [1aa87148377/CVE-2019-0708](https://github.com/1aa87148377/CVE-2019-0708)
@ -11967,14 +11967,6 @@ Logitech Unifying devices before 2016-02-26 allow keystroke injection, bypassing
## 2015
### CVE-2015-0006
<code>
The Network Location Awareness (NLA) service in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 does not perform mutual authentication to determine a domain connection, which allows remote attackers to trigger an unintended permissive configuration by spoofing DNS and LDAP responses on a local network, aka &quot;NLA Security Feature Bypass Vulnerability.&quot;
</code>
- [bugch3ck/imposter](https://github.com/bugch3ck/imposter)
### CVE-2015-0057
<code>
@ -12016,14 +12008,6 @@ Use-after-free vulnerability in the process_nested_data function in ext/standard
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka &quot;GHOST.&quot;
</code>
- [fser/ghost-checker](https://github.com/fser/ghost-checker)
- [mikesplain/CVE-2015-0235-cookbook](https://github.com/mikesplain/CVE-2015-0235-cookbook)
- [aaronfay/CVE-2015-0235-test](https://github.com/aaronfay/CVE-2015-0235-test)
- [piyokango/ghost](https://github.com/piyokango/ghost)
- [LyricalSecurity/GHOSTCHECK-cve-2015-0235](https://github.com/LyricalSecurity/GHOSTCHECK-cve-2015-0235)
- [mholzinger/CVE-2015-0235_GHOST](https://github.com/mholzinger/CVE-2015-0235_GHOST)
- [adherzog/ansible-CVE-2015-0235-GHOST](https://github.com/adherzog/ansible-CVE-2015-0235-GHOST)
- [favoretti/lenny-libc6](https://github.com/favoretti/lenny-libc6)
- [nickanderson/cfengine-CVE_2015_0235](https://github.com/nickanderson/cfengine-CVE_2015_0235)
- [koudaiii-archives/cookbook-update-glibc](https://github.com/koudaiii-archives/cookbook-update-glibc)
- [F88/ghostbusters15](https://github.com/F88/ghostbusters15)