Search for vulnerabilities
| Vulnerability ID | VCID-mmg2-fxha-tugq |
| Aliases |
CVE-2015-0235
|
| Summary | |
| Status | Published |
| Exploitability | 2.0 |
| Weighted Severity | 0.8 |
| Risk | 1.6 |
| Affected and Fixed Packages | Package Details |
| CWE-131 | Incorrect Calculation of Buffer Size |
| CWE-122 | Heap-based Buffer Overflow |
| System | Score | Found at |
|---|---|---|
| epss | 0.85843 | https://api.first.org/data/v1/epss?cve=CVE-2015-0235 |
| epss | 0.85843 | https://api.first.org/data/v1/epss?cve=CVE-2015-0235 |
| epss | 0.85843 | https://api.first.org/data/v1/epss?cve=CVE-2015-0235 |
| epss | 0.85843 | https://api.first.org/data/v1/epss?cve=CVE-2015-0235 |
| epss | 0.85843 | https://api.first.org/data/v1/epss?cve=CVE-2015-0235 |
| epss | 0.86032 | https://api.first.org/data/v1/epss?cve=CVE-2015-0235 |
| epss | 0.86032 | https://api.first.org/data/v1/epss?cve=CVE-2015-0235 |
| epss | 0.8763 | https://api.first.org/data/v1/epss?cve=CVE-2015-0235 |
| epss | 0.8763 | https://api.first.org/data/v1/epss?cve=CVE-2015-0235 |
| epss | 0.8763 | https://api.first.org/data/v1/epss?cve=CVE-2015-0235 |
| epss | 0.8763 | https://api.first.org/data/v1/epss?cve=CVE-2015-0235 |
| epss | 0.88421 | https://api.first.org/data/v1/epss?cve=CVE-2015-0235 |
| Data source | Exploit-DB |
|---|---|
| Date added | March 18, 2015 |
| Description | Exim - 'GHOST' glibc gethostbyname Buffer Overflow (Metasploit) |
| Ransomware campaign use | Known |
| Source publication date | March 18, 2015 |
| Exploit type | remote |
| Platform | linux |
| Source update date | Jan. 22, 2018 |
| Source URL | https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt |
| Data source | Metasploit |
|---|---|
| Description | This module remotely exploits CVE-2015-0235, aka GHOST, a heap-based buffer overflow in the GNU C Library's gethostbyname functions on x86 and x86_64 GNU/Linux systems that run the Exim mail server. |
| Note | AKA: - ghost Stability: - unknown-stability Reliability: - unknown-reliability SideEffects: - unknown-side-effects |
| Ransomware campaign use | Unknown |
| Source publication date | Jan. 27, 2015 |
| Platform | Unix |
| Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/linux/smtp/exim_gethostbyname_bof.rb |
| Percentile | 0.99337 |
| EPSS Score | 0.85843 |
| Published At | Aug. 17, 2025, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2025-07-31T08:41:57.034372+00:00 | Ubuntu USN Importer | Import | https://usn.ubuntu.com/2485-1/ | 37.0.0 |