{"api_version":"1","generated_at":"2026-04-22T22:47:57+00:00","cve":"CVE-2015-0235","urls":{"html":"https://cve.report/CVE-2015-0235","api":"https://cve.report/api/cve/CVE-2015-0235.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2015-0235","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2015-0235"},"summary":{"title":"CVE-2015-0235","description":"Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka \"GHOST.\"","state":"PUBLIC","assigner":"secalert@redhat.com","published_at":"2015-01-28 19:59:00","updated_at":"2022-07-05 18:42:00"},"problem_types":["CWE-787"],"metrics":[],"references":[{"url":"https://www.sophos.com/en-us/support/knowledgebase/121879.aspx","name":"https://www.sophos.com/en-us/support/knowledgebase/121879.aspx","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"The glibc (Ghost) vulnerability: affected versions, recommended steps and workarounds","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://secunia.com/advisories/62813","name":"62813","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA62813 - IBM Security Network Protection Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost","name":"20150128 GNU glibc gethostbyname Function Buffer Overflow Vulnerability","refsource":"CISCO","tags":["Third Party Advisory"],"title":"GNU glibc gethostbyname Function Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt","name":"https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt","refsource":"MISC","tags":["Third Party Advisory"],"title":"","mime":"text/plain","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2019/Jun/18","name":"20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series","refsource":"FULLDISC","tags":["Mailing List","Third Party Advisory"],"title":"Full Disclosure: SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.apple.com/kb/HT204942","name":"http://support.apple.com/kb/HT204942","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"About the security content of OS X Yosemite v10.10.4 and Security Update 2015-005 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/62871","name":"62871","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA62871 - IBM PureApplication System GNU C Library Buffer Overflow Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html","name":"http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html","refsource":"MISC","tags":["Third Party Advisory","VDB Entry"],"title":"EMC Secure Remote Services GHOST / SQL Injection / Command Injection ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2021/05/04/7","name":"[oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim","refsource":"MLIST","tags":[],"title":"oss-security - 21Nails: Multiple vulnerabilities in Exim","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21696618","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21696618","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: GNU C library (glibc) vulnerability affects IBM Security Proventia Network Enterprise Scanner (CVE-2015-0235) - United States","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:039","name":"MDVSA-2015:039","refsource":"MANDRIVA","tags":["Third Party Advisory"],"title":"Support / Security / Advisories /  / MDVSA-2015:039 | Mandriva","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668","name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"HPE Support document - HPE Support Center","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","name":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Critical Patch Update - July 2016","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://secunia.com/advisories/62816","name":"62816","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA62816 - F-Secure Messaging Security Gateway GNU C Library Buffer Overflow Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html","name":"APPLE-SA-2015-10-21-4","refsource":"APPLE","tags":["Mailing List","Third Party Advisory"],"title":"APPLE-SA-2015-10-21-4 OS X El Capitan 10.11.1 and Security Update\t2015-007","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21696526","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21696526","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: GNU C library (glibc) vulnerability affects IBM Security Virtual Server Protection for VMware (CVE-2015-0235) - United States","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html","name":"APPLE-SA-2015-09-30-3","refsource":"APPLE","tags":["Mailing List","Third Party Advisory"],"title":"APPLE-SA-2015-09-30-3 OS X El Capitan 10.11","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://linux.oracle.com/errata/ELSA-2015-0090.html","name":"http://linux.oracle.com/errata/ELSA-2015-0090.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"linux.oracle.com | ELSA-2015-0090 -  glibc security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/91787","name":"91787","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"Oracle July 2016 Critical Patch Update Multiple Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21695860","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21695860","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: GNU C library (glibc) vulnerability affects QRadar SIEM, QRadar Risk Manager, and QRadar Vulnerability Manager (CVE-2015-0235) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://seclists.org/bugtraq/2019/Jun/14","name":"20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series","refsource":"BUGTRAQ","tags":["Mailing List","Third Party Advisory"],"title":"Bugtraq: SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://rhn.redhat.com/errata/RHSA-2015-0126.html","name":"RHSA-2015:0126","refsource":"REDHAT","tags":["Third Party Advisory"],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0","name":"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0","refsource":"CONFIRM","tags":["Permissions Required"],"title":"Vulnerabilities resolved in TRITON APX Version 8.0","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","name":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Critical Patch Update - October 2015","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/oss-sec/2015/q1/269","name":"20150127 GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235)","refsource":"BUGTRAQ","tags":["Mailing List","Third Party Advisory"],"title":"oss-sec: GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/62690","name":"62690","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA62690 - Juniper Multiple Products GNU C Library Buffer Overflow Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html","name":"http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html","refsource":"MISC","tags":["Exploit","Third Party Advisory","VDB Entry"],"title":"Exim GHOST (glibc gethostbyname) Buffer Overflow ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html","name":"http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html","refsource":"MISC","tags":[],"title":"Moxa Command Injection / Cross Site Scripting / Vulnerable Software ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21696600","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21696600","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: GNU C library (glibc) vulnerability affects IBM Workload Deployer  (CVE-2015-0235) - United States","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","name":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Critical Patch Update - July 2015","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/62691","name":"62691","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA62691 - Blue Coat Multiple Products GNU C Library Buffer Overflow Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability","name":"https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability","refsource":"MISC","tags":["Third Party Advisory"],"title":"The Laws of Vulnerabilities: The GHOST Vulnerab... | Qualys Community","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21695774","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21695774","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: GNU C library (glibc) vulnerability affects IBM Security Access Manager for Web (CVE-2015-0235) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/62688","name":"62688","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA62688 - Sophos Multiple Products GNU C Library Buffer Overflow Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html","name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Critical Patch Update - October 2016","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://secunia.com/advisories/62640","name":"62640","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA62640 - IBM Security QRadar SIEM Multiple Vulnerabilities - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=143145428124857&w=2","name":"HPSBMU03330","refsource":"HP","tags":["Issue Tracking","Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBMU03330 rev.1 - HP Matrix Operating Environment (MOE) running glibc on Linux' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html","name":"APPLE-SA-2015-06-30-2","refsource":"APPLE","tags":["Mailing List","Third Party Advisory"],"title":"APPLE-SA-2015-06-30-2 OS X Yosemite v10.10.4 and Security Update\t2015-005","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html","name":"http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html","refsource":"MISC","tags":["Exploit","Third Party Advisory","VDB Entry"],"title":"Exim ESMTP GHOST Denial Of Service ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/72325","name":"72325","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://marc.info/?l=bugtraq&m=142722450701342&w=2","name":"HPSBGN03285","refsource":"HP","tags":["Issue Tracking","Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBGN03285 rev.1 - HP Business Service Manager Virtual Appliance, Multiple  Vul' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdf","name":"http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdf","refsource":"CONFIRM","tags":["Broken Link"],"title":"404 Not Found","mime":"application/pdf","httpstatus":"404","archivestatus":"200"},{"url":"http://secunia.com/advisories/62812","name":"62812","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA62812 - IBM Security Access Manager for Web GNU C Library Buffer Overflow Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21695695","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21695695","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: GNU C library (glibc) vulnerability affects IBM Security Access Manager for Mobile (CVE-2015-0235) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/62870","name":"62870","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA62870 - IBM Workload Deployer GNU C Library Buffer Overflow Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/62517","name":"62517","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA62517 - McAfee Multiple Products GNU C Library Buffer Overflow Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21696243","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21696243","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: GNU C library (glibc) vulnerability affects WebSphere Transformation Extender with Launcher Hypervisor Edition [for RHEL]  (CVE-2015-0235) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142781412222323&w=2","name":"HPSBGN03270","refsource":"HP","tags":["Issue Tracking","Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBGN03270 rev.1 - HP Operations Analytics, Remote Execution of Code' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html","name":"http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html","refsource":"MISC","tags":[],"title":"Nexans FTTO GigaSwitch Outdated Components / Hardcoded Backdoor ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://secunia.com/advisories/62680","name":"62680","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA62680 - Ubuntu update for eglibc - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/62758","name":"62758","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA62758 - IBM Security Access Manager for Mobile GNU C Library Buffer Overflow Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.f-secure.com/en/web/labs_global/fsc-2015-1","name":"https://www.f-secure.com/en/web/labs_global/fsc-2015-1","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"fsc-2015-1 | F-Secure Labs","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bto.bluecoat.com/security-advisory/sa90","name":"https://bto.bluecoat.com/security-advisory/sa90","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Home | Blue Coat Systems, Inc.","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21696131","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21696131","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: GNU C library (glibc) vulnerability affects IBM Security Network Protection (CVE-2015-0235) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21696602","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21696602","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: GNU C library (glibc) vulnerability affects IBM PureApplication System  (CVE-2015-0235) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes","name":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"StruxureWare Data Center Operation Software Vulnerability Fixes - User Assistance for StruxureWare Data Center Operation 8 - Help Center: Support for EcoStruxure IT, StruxureWare for Data Centers, and NetBotz","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/oss-sec/2015/q1/274","name":"20150127 Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow","refsource":"BUGTRAQ","tags":["Exploit","Mailing List","Third Party Advisory"],"title":"oss-sec: Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10100","name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10100","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"McAfee KnowledgeBase - McAfee Security Bulletin - GHOST Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/HT205375","name":"https://support.apple.com/HT205375","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"About the security content of OS X El Capitan 10.11.1, Security Update 2015-004 Yosemite, and Security Update 2015-007 Mavericks - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2015/dsa-3142","name":"DSA-3142","refsource":"DEBIAN","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-3142-1 eglibc","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671","name":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Juniper Networks - 2015-01 Out of Cycle Security Bulletin: GHOST glibc gethostbyname() buffer overflow vulnerability (CVE-2015-0235)   - Knowledge Base","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2015/Jan/111","name":"20150128 Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow","refsource":"FULLDISC","tags":["Mailing List","Third Party Advisory"],"title":"Full Disclosure: Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2021/Sep/0","name":"20210901 SEC Consult SA-20210901-0 :: Multiple vulnerabilities in MOXA devices","refsource":"FULLDISC","tags":[],"title":"Full Disclosure: SEC Consult SA-20210901-0 :: Multiple vulnerabilities in MOXA\tdevices","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.gentoo.org/glsa/201503-04","name":"GLSA-201503-04","refsource":"GENTOO","tags":["Third Party Advisory"],"title":"Gentoo Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html","name":"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Critical Patch Update - April 2015","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/62865","name":"62865","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA62865 - IBM WebSphere Transformation Extender GNU C Library Buffer Overflow Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/534845/100/0/threaded","name":"20150311 OpenSSL v1.0.2 for Linux affected by CVE-2015-0235","refsource":"BUGTRAQ","tags":["Exploit","Third Party Advisory","VDB Entry"],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/62879","name":"62879","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA62879 - IBM Security Virtual Server Protection for VMware GNU C Library Buffer Overflow Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"CPU Oct 2018","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/62692","name":"62692","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA62692 - Cisco Multiple Products GNU C Library Buffer Overflow Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20150127-0001/","name":"https://security.netapp.com/advisory/ntap-20150127-0001/","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"CVE-2015-0235 GNU C Library (glibc) Vulnerability in Multiple NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/","name":"http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Sophos products and the GHOST vulnerability affecting Linux | Sophos Blog","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/62883","name":"62883","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA62883 - IBM Proventia Network Enterprise Scanner GNU C Library Buffer Overflow Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9","name":"https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9","refsource":"MISC","tags":[],"title":"Arista - Security Advisory 0009","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/HT205267","name":"https://support.apple.com/HT205267","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"About the security content of OS X El Capitan v10.11 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/62698","name":"62698","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA62698 - Oracle Linux update for glibc - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142296726407499&w=2","name":"HPSBGN03247","refsource":"HP","tags":["Issue Tracking","Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBGN03247 rev.1 - HP IceWall SSO Dfw using glibc, Remote Execution of Abitrary' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21695835","name":"http://www-01.ibm.com/support/docview.wss?uid=swg21695835","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"IBM Security Bulletin: Security Bulletin: GNU C library (glibc) vulnerability is fixed in IBM Security Access Manager for Enterprise Single Sign-On Virtual Appliance (CVE-2015-0235) - United States","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/62681","name":"62681","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA62681 - SUSE update for glibc - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/62715","name":"62715","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA62715 - IBM Security Access Manager for Enterprise Single Sign-On GNU C Library Buffer Overflow Vulnerability - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","name":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Critical Patch Update - July 2017","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://marc.info/?l=bugtraq&m=142721102728110&w=2","name":"HPSBHF03289","refsource":"HP","tags":["Issue Tracking","Mailing List","Third Party Advisory"],"title":"'[security bulletin] HPSBHF03289 rev.1- HP ThinClient PCs running ThinPro Linux, Remote Code Executio' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Critical Patch Update - October 2017","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/62667","name":"62667","refsource":"SECUNIA","tags":["Third Party Advisory"],"title":"Security Advisory SA62667 - Red Hat update for glibc - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://linux.oracle.com/errata/ELSA-2015-0092.html","name":"http://linux.oracle.com/errata/ELSA-2015-0092.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"linux.oracle.com | ELSA-2015-0092 -  glibc security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1032909","name":"1032909","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"Oracle Communications Applications Flaws Let Remote Users Gain Elevated Privileges and Partially Access Data, Modify Data, and Deny Service - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","name":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","refsource":"CONFIRM","tags":["Third Party Advisory"],"title":"Oracle Critical Patch Update - January 2016","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://seclists.org/fulldisclosure/2022/Jun/36","name":"20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series","refsource":"FULLDISC","tags":[],"title":"Full Disclosure: SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html","name":"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html","refsource":"MISC","tags":["Third Party Advisory","VDB Entry"],"title":"WAGO 852 Industrial Managed Switch Series Code Execution / Hardcoded Credentials ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2015-0235","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-0235","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"mac_os_x","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"mac_os_x","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnu","cpe5":"glibc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"gnu","cpe5":"glibc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"pureapplication_system","cpe6":"1.0.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"pureapplication_system","cpe6":"1.1.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"pureapplication_system","cpe6":"2.0.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"pureapplication_system","cpe6":"1.0.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"pureapplication_system","cpe6":"1.1.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"pureapplication_system","cpe6":"2.0.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"security_access_manager_for_enterprise_single_sign-on","cpe6":"8.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"security_access_manager_for_enterprise_single_sign-on","cpe6":"8.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_application_session_controller","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_application_session_controller","cpe6":"3.7.1","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_application_session_controller","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_application_session_controller","cpe6":"3.7.1","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_eagle_application_processor","cpe6":"16.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_eagle_application_processor","cpe6":"16.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_eagle_lnp_application_processor","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_eagle_lnp_application_processor","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_lsms","cpe6":"13.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_lsms","cpe6":"13.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_policy_management","cpe6":"10.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_policy_management","cpe6":"11.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_policy_management","cpe6":"12.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_policy_management","cpe6":"9.7.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_policy_management","cpe6":"9.9.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_policy_management","cpe6":"10.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_policy_management","cpe6":"11.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_policy_management","cpe6":"12.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_policy_management","cpe6":"9.7.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_policy_management","cpe6":"9.9.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_session_border_controller","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_session_border_controller","cpe6":"7.2.0","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_session_border_controller","cpe6":"8.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_session_border_controller","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_session_border_controller","cpe6":"7.2.0","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_session_border_controller","cpe6":"8.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"10.0.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_user_data_repository","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_webrtc_session_controller","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_webrtc_session_controller","cpe6":"7.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_webrtc_session_controller","cpe6":"7.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_webrtc_session_controller","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_webrtc_session_controller","cpe6":"7.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"communications_webrtc_session_controller","cpe6":"7.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"exalogic_infrastructure","cpe6":"1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"exalogic_infrastructure","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"exalogic_infrastructure","cpe6":"1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"exalogic_infrastructure","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"oracle","cpe5":"linux","cpe6":"5","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"oracle","cpe5":"linux","cpe6":"7","cpe7":"0","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"oracle","cpe5":"linux","cpe6":"5","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"oracle","cpe5":"linux","cpe6":"7","cpe7":"0","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"vm_virtualbox","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"vm_virtualbox","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php","cpe5":"php","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"virtualization","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"235","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"redhat","cpe5":"virtualization","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2015-0235","qid":"591368","title":"Eaton Power Xpert Gateway models buffer overflow Vulnerability (ETN-SB-2015-1002)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"secalert@redhat.com","ID":"CVE-2015-0235","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka \"GHOST.\""}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"72325","refsource":"BID","url":"http://www.securityfocus.com/bid/72325"},{"name":"HPSBGN03247","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=142296726407499&w=2"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21696131","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21696131"},{"name":"62883","refsource":"SECUNIA","url":"http://secunia.com/advisories/62883"},{"name":"62691","refsource":"SECUNIA","url":"http://secunia.com/advisories/62691"},{"name":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html"},{"name":"APPLE-SA-2015-10-21-4","refsource":"APPLE","url":"http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html"},{"name":"http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/130974/Exim-GHOST-glibc-gethostbyname-Buffer-Overflow.html"},{"name":"https://support.apple.com/HT205375","refsource":"CONFIRM","url":"https://support.apple.com/HT205375"},{"name":"HPSBGN03285","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=142722450701342&w=2"},{"name":"20150127 GHOST gethostbyname() heap overflow in glibc (CVE-2015-0235)","refsource":"BUGTRAQ","url":"http://seclists.org/oss-sec/2015/q1/269"},{"name":"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0","refsource":"CONFIRM","url":"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0"},{"name":"62698","refsource":"SECUNIA","url":"http://secunia.com/advisories/62698"},{"name":"62640","refsource":"SECUNIA","url":"http://secunia.com/advisories/62640"},{"name":"1032909","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1032909"},{"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html"},{"name":"https://bto.bluecoat.com/security-advisory/sa90","refsource":"CONFIRM","url":"https://bto.bluecoat.com/security-advisory/sa90"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21696618","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21696618"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21696600","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21696600"},{"name":"http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdf","refsource":"CONFIRM","url":"http://www.idirect.net/Partners/~/media/Files/CVE/iDirect-Posted-Common-Vulnerabilities-and-Exposures.pdf"},{"name":"APPLE-SA-2015-09-30-3","refsource":"APPLE","url":"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html"},{"name":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html"},{"name":"https://www.sophos.com/en-us/support/knowledgebase/121879.aspx","refsource":"CONFIRM","url":"https://www.sophos.com/en-us/support/knowledgebase/121879.aspx"},{"name":"62688","refsource":"SECUNIA","url":"http://secunia.com/advisories/62688"},{"name":"62865","refsource":"SECUNIA","url":"http://secunia.com/advisories/62865"},{"name":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21696243","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21696243"},{"name":"HPSBHF03289","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=142721102728110&w=2"},{"name":"APPLE-SA-2015-06-30-2","refsource":"APPLE","url":"http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html"},{"name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10100","refsource":"CONFIRM","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10100"},{"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"},{"name":"62812","refsource":"SECUNIA","url":"http://secunia.com/advisories/62812"},{"name":"62879","refsource":"SECUNIA","url":"http://secunia.com/advisories/62879"},{"name":"HPSBGN03270","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=142781412222323&w=2"},{"name":"http://linux.oracle.com/errata/ELSA-2015-0090.html","refsource":"CONFIRM","url":"http://linux.oracle.com/errata/ELSA-2015-0090.html"},{"name":"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html"},{"name":"62871","refsource":"SECUNIA","url":"http://secunia.com/advisories/62871"},{"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"name":"62690","refsource":"SECUNIA","url":"http://secunia.com/advisories/62690"},{"name":"62692","refsource":"SECUNIA","url":"http://secunia.com/advisories/62692"},{"name":"https://support.apple.com/HT205267","refsource":"CONFIRM","url":"https://support.apple.com/HT205267"},{"name":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes","refsource":"CONFIRM","url":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"},{"name":"62681","refsource":"SECUNIA","url":"http://secunia.com/advisories/62681"},{"name":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671","refsource":"CONFIRM","url":"https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10671"},{"name":"SSRT101937","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=142781412222323&w=2"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21696526","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21696526"},{"name":"SSRT101953","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=142721102728110&w=2"},{"name":"62667","refsource":"SECUNIA","url":"http://secunia.com/advisories/62667"},{"name":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668","refsource":"CONFIRM","url":"https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04874668"},{"name":"MDVSA-2015:039","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:039"},{"name":"https://www.f-secure.com/en/web/labs_global/fsc-2015-1","refsource":"CONFIRM","url":"https://www.f-secure.com/en/web/labs_global/fsc-2015-1"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21696602","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21696602"},{"name":"62517","refsource":"SECUNIA","url":"http://secunia.com/advisories/62517"},{"name":"http://support.apple.com/kb/HT204942","refsource":"CONFIRM","url":"http://support.apple.com/kb/HT204942"},{"name":"http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/","refsource":"CONFIRM","url":"http://blogs.sophos.com/2015/01/29/sophos-products-and-the-ghost-vulnerability-affecting-linux/"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21695695","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21695695"},{"name":"62680","refsource":"SECUNIA","url":"http://secunia.com/advisories/62680"},{"name":"62813","refsource":"SECUNIA","url":"http://secunia.com/advisories/62813"},{"name":"http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/130768/EMC-Secure-Remote-Services-GHOST-SQL-Injection-Command-Injection.html"},{"name":"GLSA-201503-04","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201503-04"},{"name":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"name":"20150128 GNU glibc gethostbyname Function Buffer Overflow Vulnerability","refsource":"CISCO","url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150128-ghost"},{"name":"91787","refsource":"BID","url":"http://www.securityfocus.com/bid/91787"},{"name":"http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/130171/Exim-ESMTP-GHOST-Denial-Of-Service.html"},{"name":"RHSA-2015:0126","refsource":"REDHAT","url":"http://rhn.redhat.com/errata/RHSA-2015-0126.html"},{"name":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"name":"20150311 OpenSSL v1.0.2 for Linux affected by CVE-2015-0235","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/534845/100/0/threaded"},{"name":"62715","refsource":"SECUNIA","url":"http://secunia.com/advisories/62715"},{"name":"https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt","refsource":"MISC","url":"https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21695835","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21695835"},{"name":"20150127 Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow","refsource":"BUGTRAQ","url":"http://seclists.org/oss-sec/2015/q1/274"},{"name":"HPSBMU03330","refsource":"HP","url":"http://marc.info/?l=bugtraq&m=143145428124857&w=2"},{"name":"20150128 Qualys Security Advisory CVE-2015-0235 - GHOST: glibc gethostbyname buffer overflow","refsource":"FULLDISC","url":"http://seclists.org/fulldisclosure/2015/Jan/111"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21695774","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21695774"},{"name":"62870","refsource":"SECUNIA","url":"http://secunia.com/advisories/62870"},{"name":"https://security.netapp.com/advisory/ntap-20150127-0001/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20150127-0001/"},{"name":"http://linux.oracle.com/errata/ELSA-2015-0092.html","refsource":"CONFIRM","url":"http://linux.oracle.com/errata/ELSA-2015-0092.html"},{"name":"http://www-01.ibm.com/support/docview.wss?uid=swg21695860","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?uid=swg21695860"},{"name":"DSA-3142","refsource":"DEBIAN","url":"http://www.debian.org/security/2015/dsa-3142"},{"name":"https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability","refsource":"MISC","url":"https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability"},{"name":"62816","refsource":"SECUNIA","url":"http://secunia.com/advisories/62816"},{"name":"62758","refsource":"SECUNIA","url":"http://secunia.com/advisories/62758"},{"refsource":"FULLDISC","name":"20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series","url":"http://seclists.org/fulldisclosure/2019/Jun/18"},{"refsource":"BUGTRAQ","name":"20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series","url":"https://seclists.org/bugtraq/2019/Jun/14"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html","url":"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html"},{"refsource":"CONFIRM","name":"https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-994726.pdf"},{"refsource":"MLIST","name":"[oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim","url":"http://www.openwall.com/lists/oss-security/2021/05/04/7"},{"refsource":"FULLDISC","name":"20210901 SEC Consult SA-20210901-0 :: Multiple vulnerabilities in MOXA devices","url":"http://seclists.org/fulldisclosure/2021/Sep/0"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html","url":"http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html"},{"refsource":"MISC","name":"https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9","url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1053-security-advisory-9"},{"refsource":"FULLDISC","name":"20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series","url":"http://seclists.org/fulldisclosure/2022/Jun/36"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html","url":"http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html"}]}},"nvd":{"publishedDate":"2015-01-28 19:59:00","lastModifiedDate":"2022-07-05 18:42:00","problem_types":["CWE-787"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":10},"severity":"HIGH","exploitabilityScore":10,"impactScore":10,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0","versionEndExcluding":"2.18","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_policy_management:12.1.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_policy_management:9.9.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_eagle_application_processor:16.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_policy_management:10.4.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_webrtc_session_controller:7.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_webrtc_session_controller:7.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_policy_management:11.5:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:oracle:linux:7:0:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_lsms:13.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_user_data_repository:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0.0","versionEndIncluding":"10.0.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_application_session_controller:*:*:*:*:*:*:*:*","versionEndExcluding":"3.7.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_policy_management:9.7.3:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*","versionEndExcluding":"5.1.24","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_session_border_controller:7.2.0:-:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:communications_session_border_controller:*:*:*:*:*:*:*:*","versionEndExcluding":"7.2.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:redhat:virtualization:6.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*","versionEndExcluding":"10.11.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:pureapplication_system:1.1.0.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:pureapplication_system:2.0.0.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:security_access_manager_for_enterprise_single_sign-on:8.2:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ibm:pureapplication_system:1.0.0.0:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","versionStartIncluding":"5.5.0","versionEndExcluding":"5.5.22","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","versionStartIncluding":"5.6.0","versionEndExcluding":"5.6.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","versionStartIncluding":"5.4.0","versionEndExcluding":"5.4.38","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2015","CveId":"235","Ordinal":"76259","Title":"CVE-2015-0235","CVE":"CVE-2015-0235","Year":"2015"},"notes":[{"CveYear":"2015","CveId":"235","Ordinal":"1","NoteData":"Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka \"GHOST.\"","Type":"Description","Title":null},{"CveYear":"2015","CveId":"235","Ordinal":"2","NoteData":"2015-01-28","Type":"Other","Title":"Published"},{"CveYear":"2015","CveId":"235","Ordinal":"3","NoteData":"2021-11-05","Type":"Other","Title":"Modified"}]}}}