Search for vulnerabilities
Vulnerability details: VCID-mmg2-fxha-tugq
Vulnerability ID VCID-mmg2-fxha-tugq
Aliases CVE-2015-0235
Summary
Status Published
Exploitability 2.0
Weighted Severity 0.8
Risk 1.6
Affected and Fixed Packages Package Details
Weaknesses (2)
Data source Exploit-DB
Date added March 18, 2015
Description Exim - 'GHOST' glibc gethostbyname Buffer Overflow (Metasploit)
Ransomware campaign use Known
Source publication date March 18, 2015
Exploit type remote
Platform linux
Source update date Jan. 22, 2018
Source URL https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt
Data source Metasploit
Description This module remotely exploits CVE-2015-0235, aka GHOST, a heap-based buffer overflow in the GNU C Library's gethostbyname functions on x86 and x86_64 GNU/Linux systems that run the Exim mail server.
Note
AKA:
  - ghost
Stability:
  - unknown-stability
Reliability:
  - unknown-reliability
SideEffects:
  - unknown-side-effects
Ransomware campaign use Unknown
Source publication date Jan. 27, 2015
Platform Unix
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/linux/smtp/exim_gethostbyname_bof.rb
There are no known vectors.
Exploit Prediction Scoring System (EPSS)
Percentile 0.99337
EPSS Score 0.85843
Published At Aug. 17, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:41:57.034372+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/2485-1/ 37.0.0