mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-17 13:22:21 +01:00
232 lines
No EOL
8.1 KiB
JSON
232 lines
No EOL
8.1 KiB
JSON
[
|
|
{
|
|
"id": 30004399,
|
|
"name": "cfengine-CVE_2015_0235",
|
|
"full_name": "nickanderson\/cfengine-CVE_2015_0235",
|
|
"owner": {
|
|
"login": "nickanderson",
|
|
"id": 202896,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/202896?v=4",
|
|
"html_url": "https:\/\/github.com\/nickanderson"
|
|
},
|
|
"html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE_2015_0235",
|
|
"description": "gethostbyname*() buffer overflow exploit in glibc - CVE-2015-0235 https:\/\/community.qualys.com\/blogs\/laws-of-vulnerabilities\/2015\/01\/27\/the-ghost-vulnerability",
|
|
"fork": false,
|
|
"created_at": "2015-01-29T04:58:54Z",
|
|
"updated_at": "2016-02-13T01:41:47Z",
|
|
"pushed_at": "2015-01-29T21:23:45Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 30008427,
|
|
"name": "cookbook-update-glibc",
|
|
"full_name": "koudaiii-archives\/cookbook-update-glibc",
|
|
"owner": {
|
|
"login": "koudaiii-archives",
|
|
"id": 51727289,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/51727289?v=4",
|
|
"html_url": "https:\/\/github.com\/koudaiii-archives"
|
|
},
|
|
"html_url": "https:\/\/github.com\/koudaiii-archives\/cookbook-update-glibc",
|
|
"description": "cookbook for update glibc. CVE-2015-0235(GHOST)",
|
|
"fork": false,
|
|
"created_at": "2015-01-29T07:14:17Z",
|
|
"updated_at": "2019-06-14T02:44:06Z",
|
|
"pushed_at": "2015-01-29T07:38:40Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 30019912,
|
|
"name": "ghostbusters15",
|
|
"full_name": "F88\/ghostbusters15",
|
|
"owner": {
|
|
"login": "F88",
|
|
"id": 685250,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/685250?v=4",
|
|
"html_url": "https:\/\/github.com\/F88"
|
|
},
|
|
"html_url": "https:\/\/github.com\/F88\/ghostbusters15",
|
|
"description": "Playbooks 'Fix for CVE-2015-0235(GHOST)' running on Ansible",
|
|
"fork": false,
|
|
"created_at": "2015-01-29T12:52:45Z",
|
|
"updated_at": "2015-02-17T06:13:00Z",
|
|
"pushed_at": "2015-11-20T18:24:11Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 30059704,
|
|
"name": "ghosttester",
|
|
"full_name": "JustDenisYT\/ghosttester",
|
|
"owner": {
|
|
"login": "JustDenisYT",
|
|
"id": 9379272,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/9379272?v=4",
|
|
"html_url": "https:\/\/github.com\/JustDenisYT"
|
|
},
|
|
"html_url": "https:\/\/github.com\/JustDenisYT\/ghosttester",
|
|
"description": "Script to test vulnarability for CVE-2015-0235",
|
|
"fork": false,
|
|
"created_at": "2015-01-30T06:37:06Z",
|
|
"updated_at": "2015-02-04T08:03:37Z",
|
|
"pushed_at": "2015-02-04T08:03:37Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 30066365,
|
|
"name": "CVE-2015-0235",
|
|
"full_name": "tobyzxj\/CVE-2015-0235",
|
|
"owner": {
|
|
"login": "tobyzxj",
|
|
"id": 4661855,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4661855?v=4",
|
|
"html_url": "https:\/\/github.com\/tobyzxj"
|
|
},
|
|
"html_url": "https:\/\/github.com\/tobyzxj\/CVE-2015-0235",
|
|
"description": "glibc gethostbyname bug",
|
|
"fork": false,
|
|
"created_at": "2015-01-30T09:58:09Z",
|
|
"updated_at": "2015-01-30T10:02:28Z",
|
|
"pushed_at": "2015-01-30T10:02:28Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 30183649,
|
|
"name": "CVE-2015-0235-workaround",
|
|
"full_name": "makelinux\/CVE-2015-0235-workaround",
|
|
"owner": {
|
|
"login": "makelinux",
|
|
"id": 2335185,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2335185?v=4",
|
|
"html_url": "https:\/\/github.com\/makelinux"
|
|
},
|
|
"html_url": "https:\/\/github.com\/makelinux\/CVE-2015-0235-workaround",
|
|
"description": "A shared library wrapper with additional checks for vulnerable functions gethostbyname2_r gethostbyname_r (GHOST vulnerability)",
|
|
"fork": false,
|
|
"created_at": "2015-02-02T11:16:42Z",
|
|
"updated_at": "2016-02-17T21:52:40Z",
|
|
"pushed_at": "2015-02-04T19:41:19Z",
|
|
"stargazers_count": 6,
|
|
"watchers_count": 6,
|
|
"forks_count": 4,
|
|
"forks": 4,
|
|
"watchers": 6,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 33016863,
|
|
"name": "ghost_exploit",
|
|
"full_name": "arm13\/ghost_exploit",
|
|
"owner": {
|
|
"login": "arm13",
|
|
"id": 5557134,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/5557134?v=4",
|
|
"html_url": "https:\/\/github.com\/arm13"
|
|
},
|
|
"html_url": "https:\/\/github.com\/arm13\/ghost_exploit",
|
|
"description": "CVE-2015-0235 EXIM ESTMP GHOST Glibc Gethostbyname() DoS Exploit\/PoC",
|
|
"fork": false,
|
|
"created_at": "2015-03-28T01:26:05Z",
|
|
"updated_at": "2020-04-07T07:55:19Z",
|
|
"pushed_at": "2015-03-17T19:48:31Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 3,
|
|
"forks": 3,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 52564080,
|
|
"name": "CVE-glibc",
|
|
"full_name": "alanmeyer\/CVE-glibc",
|
|
"owner": {
|
|
"login": "alanmeyer",
|
|
"id": 7916831,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7916831?v=4",
|
|
"html_url": "https:\/\/github.com\/alanmeyer"
|
|
},
|
|
"html_url": "https:\/\/github.com\/alanmeyer\/CVE-glibc",
|
|
"description": "CVE-2015-0235",
|
|
"fork": false,
|
|
"created_at": "2016-02-25T23:23:34Z",
|
|
"updated_at": "2016-02-26T00:36:14Z",
|
|
"pushed_at": "2016-02-26T00:41:03Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 95877607,
|
|
"name": "CVE-2015-0235",
|
|
"full_name": "sUbc0ol\/CVE-2015-0235",
|
|
"owner": {
|
|
"login": "sUbc0ol",
|
|
"id": 24601456,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/24601456?v=4",
|
|
"html_url": "https:\/\/github.com\/sUbc0ol"
|
|
},
|
|
"html_url": "https:\/\/github.com\/sUbc0ol\/CVE-2015-0235",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2017-06-30T10:29:40Z",
|
|
"updated_at": "2020-03-26T07:48:36Z",
|
|
"pushed_at": "2017-06-30T10:31:02Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 3,
|
|
"forks": 3,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 249738916,
|
|
"name": "GHOSTCHECK-cve-2015-0235",
|
|
"full_name": "chayim\/GHOSTCHECK-cve-2015-0235",
|
|
"owner": {
|
|
"login": "chayim",
|
|
"id": 1333958,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1333958?v=4",
|
|
"html_url": "https:\/\/github.com\/chayim"
|
|
},
|
|
"html_url": "https:\/\/github.com\/chayim\/GHOSTCHECK-cve-2015-0235",
|
|
"description": "A check for GHOST; cve-2015-0235",
|
|
"fork": false,
|
|
"created_at": "2020-03-24T15:03:09Z",
|
|
"updated_at": "2020-04-05T23:20:46Z",
|
|
"pushed_at": "2020-03-24T15:03:42Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |