Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2014-6277

Summary
Assigner-debian
Assigner Org ID-79363d38-fa19-49d1-9214-5f28da3f3ac5
Published At-27 Sep, 2014 | 22:00
Updated At-06 Aug, 2024 | 12:10
Rejected At-
Credits

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:debian
Assigner Org ID:79363d38-fa19-49d1-9214-5f28da3f3ac5
Published At:27 Sep, 2014 | 22:00
Updated At:06 Aug, 2024 | 12:10
Rejected At:
▼CVE Numbering Authority (CNA)

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21685749
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141577137423233&w=2
vendor-advisory
x_refsource_HP
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
x_refsource_CONFIRM
http://linux.oracle.com/errata/ELSA-2014-3093
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142721162228379&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=142358026505815&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=swg21686479
x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN55667175/index.html
third-party-advisory
x_refsource_JVN
http://secunia.com/advisories/60433
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141383026420882&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=141585637922673&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=141576728022234&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=swg21685541
x_refsource_CONFIRM
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
x_refsource_CONFIRM
http://secunia.com/advisories/61816
third-party-advisory
x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/61442
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142358078406056&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61283
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
vendor-advisory
x_refsource_APPLE
https://kc.mcafee.com/corporate/index?page=content&id=SB10085
x_refsource_CONFIRM
http://secunia.com/advisories/61654
third-party-advisory
x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-2380-1
vendor-advisory
x_refsource_UBUNTU
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
x_refsource_CONFIRM
http://secunia.com/advisories/62312
third-party-advisory
x_refsource_SECUNIA
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141879528318582&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=swg21685604
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61703
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61065
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141383196021590&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=141383081521087&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=swg21686445
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21686131
x_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
third-party-advisory
x_refsource_JVNDB
http://marc.info/?l=bugtraq&m=141879528318582&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61641
third-party-advisory
x_refsource_SECUNIA
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
vendor-advisory
x_refsource_SUSE
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21685914
x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
vendor-advisory
x_refsource_MANDRIVA
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
x_refsource_CONFIRM
https://support.apple.com/HT205267
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142721162228379&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/60325
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/60024
third-party-advisory
x_refsource_SECUNIA
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
x_refsource_MISC
http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
x_refsource_MISC
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
vendor-advisory
x_refsource_CISCO
http://secunia.com/advisories/62343
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61565
third-party-advisory
x_refsource_SECUNIA
https://www.suse.com/support/shellshock/
x_refsource_CONFIRM
http://support.apple.com/HT204244
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141450491804793&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61313
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142289270617409&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=142358026505815&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61485
third-party-advisory
x_refsource_SECUNIA
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141577297623641&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141383244821813&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61312
third-party-advisory
x_refsource_SECUNIA
http://linux.oracle.com/errata/ELSA-2014-3094
x_refsource_CONFIRM
http://secunia.com/advisories/60193
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/security/advisories/VMSA-2014-0010.html
x_refsource_CONFIRM
http://secunia.com/advisories/60063
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/60034
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59907
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/58200
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141577241923505&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61643
third-party-advisory
x_refsource_SECUNIA
http://www.novell.com/support/kb/doc.php?id=7015721
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21687079
x_refsource_CONFIRM
http://secunia.com/advisories/61503
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=swg21686246
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142289270617409&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141383465822787&w=2
vendor-advisory
x_refsource_HP
http://www.qnap.com/i/en/support/con_show.php?cid=61
x_refsource_CONFIRM
http://secunia.com/advisories/61552
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61780
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
x_refsource_CONFIRM
https://support.citrix.com/article/CTX200223
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141330468527613&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/60044
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61291
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141345648114150&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61287
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141383353622268&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
x_refsource_CONFIRM
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
vendor-advisory
x_refsource_APPLE
http://marc.info/?l=bugtraq&m=141383304022067&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61128
third-party-advisory
x_refsource_SECUNIA
https://support.citrix.com/article/CTX200217
x_refsource_CONFIRM
http://secunia.com/advisories/61471
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/60055
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59961
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61550
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61633
third-party-advisory
x_refsource_SECUNIA
http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
x_refsource_MISC
http://www-01.ibm.com/support/docview.wss?uid=swg21686494
x_refsource_CONFIRM
http://support.novell.com/security/cve/CVE-2014-6277.html
x_refsource_CONFIRM
https://kb.bluecoat.com/index?page=content&id=SA82
x_refsource_CONFIRM
http://secunia.com/advisories/61328
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=swg21685733
x_refsource_CONFIRM
http://secunia.com/advisories/61129
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61603
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61857
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685749
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141577137423233&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
Resource:
x_refsource_CONFIRM
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3093
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686479
Resource:
x_refsource_CONFIRM
Hyperlink: http://jvn.jp/en/jp/JVN55667175/index.html
Resource:
third-party-advisory
x_refsource_JVN
Hyperlink: http://secunia.com/advisories/60433
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=141383026420882&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=141585637922673&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=141576728022234&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685541
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61816
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/61442
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=142358078406056&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61283
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10085
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61654
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ubuntu.com/usn/USN-2380-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/62312
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685604
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61703
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61065
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=141383196021590&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=141383081521087&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686445
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686131
Resource:
x_refsource_CONFIRM
Hyperlink: http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
Resource:
third-party-advisory
x_refsource_JVNDB
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61641
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685914
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
Resource:
x_refsource_CONFIRM
Hyperlink: https://support.apple.com/HT205267
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/60325
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/60024
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
Resource:
x_refsource_MISC
Hyperlink: http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
Resource:
x_refsource_MISC
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: http://secunia.com/advisories/62343
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61565
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://www.suse.com/support/shellshock/
Resource:
x_refsource_CONFIRM
Hyperlink: http://support.apple.com/HT204244
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141450491804793&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61313
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61485
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141577297623641&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141383244821813&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61312
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3094
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/60193
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0010.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/60063
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/60034
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59907
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/58200
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=141577241923505&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61643
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.novell.com/support/kb/doc.php?id=7015721
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21687079
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61503
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686246
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141383465822787&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.qnap.com/i/en/support/con_show.php?cid=61
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61552
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61780
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
Resource:
x_refsource_CONFIRM
Hyperlink: https://support.citrix.com/article/CTX200223
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141330468527613&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/60044
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61291
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=141345648114150&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61287
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=141383353622268&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://marc.info/?l=bugtraq&m=141383304022067&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61128
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://support.citrix.com/article/CTX200217
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61471
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/60055
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59961
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61550
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61633
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
Resource:
x_refsource_MISC
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686494
Resource:
x_refsource_CONFIRM
Hyperlink: http://support.novell.com/security/cve/CVE-2014-6277.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://kb.bluecoat.com/index?page=content&id=SA82
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61328
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685733
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61129
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61603
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61857
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21685749
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141577137423233&w=2
vendor-advisory
x_refsource_HP
x_transferred
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
x_refsource_CONFIRM
x_transferred
http://linux.oracle.com/errata/ELSA-2014-3093
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=142721162228379&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=142358026505815&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686479
x_refsource_CONFIRM
x_transferred
http://jvn.jp/en/jp/JVN55667175/index.html
third-party-advisory
x_refsource_JVN
x_transferred
http://secunia.com/advisories/60433
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=141383026420882&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=141585637922673&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=141576728022234&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21685541
x_refsource_CONFIRM
x_transferred
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61816
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/61442
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=142358078406056&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61283
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
vendor-advisory
x_refsource_APPLE
x_transferred
https://kc.mcafee.com/corporate/index?page=content&id=SB10085
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61654
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ubuntu.com/usn/USN-2380-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/62312
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141879528318582&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21685604
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61703
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61065
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=141383196021590&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=141383081521087&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686445
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686131
x_refsource_CONFIRM
x_transferred
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
third-party-advisory
x_refsource_JVNDB
x_transferred
http://marc.info/?l=bugtraq&m=141879528318582&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61641
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21685914
x_refsource_CONFIRM
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
vendor-advisory
x_refsource_MANDRIVA
x_transferred
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
x_refsource_CONFIRM
x_transferred
https://support.apple.com/HT205267
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=142721162228379&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/60325
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/60024
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
x_refsource_MISC
x_transferred
http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
x_refsource_MISC
x_transferred
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
vendor-advisory
x_refsource_CISCO
x_transferred
http://secunia.com/advisories/62343
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61565
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://www.suse.com/support/shellshock/
x_refsource_CONFIRM
x_transferred
http://support.apple.com/HT204244
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141450491804793&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61313
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=142289270617409&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=142358026505815&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61485
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141577297623641&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141383244821813&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61312
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://linux.oracle.com/errata/ELSA-2014-3094
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/60193
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/security/advisories/VMSA-2014-0010.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/60063
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/60034
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59907
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/58200
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=141577241923505&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61643
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.novell.com/support/kb/doc.php?id=7015721
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21687079
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61503
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686246
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=142289270617409&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141383465822787&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.qnap.com/i/en/support/con_show.php?cid=61
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61552
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61780
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
x_refsource_CONFIRM
x_transferred
https://support.citrix.com/article/CTX200223
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141330468527613&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/60044
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61291
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=141345648114150&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61287
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=141383353622268&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
x_refsource_CONFIRM
x_transferred
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://marc.info/?l=bugtraq&m=141383304022067&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61128
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://support.citrix.com/article/CTX200217
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61471
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/60055
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59961
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61550
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61633
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
x_refsource_MISC
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686494
x_refsource_CONFIRM
x_transferred
http://support.novell.com/security/cve/CVE-2014-6277.html
x_refsource_CONFIRM
x_transferred
https://kb.bluecoat.com/index?page=content&id=SA82
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61328
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21685733
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61129
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61603
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61857
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685749
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141577137423233&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3093
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686479
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://jvn.jp/en/jp/JVN55667175/index.html
Resource:
third-party-advisory
x_refsource_JVN
x_transferred
Hyperlink: http://secunia.com/advisories/60433
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383026420882&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141585637922673&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141576728022234&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685541
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61816
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/61442
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142358078406056&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61283
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10085
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61654
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ubuntu.com/usn/USN-2380-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/62312
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685604
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61703
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61065
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383196021590&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383081521087&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686445
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686131
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
Resource:
third-party-advisory
x_refsource_JVNDB
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61641
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685914
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://support.apple.com/HT205267
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/60325
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/60024
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: http://secunia.com/advisories/62343
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61565
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://www.suse.com/support/shellshock/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.apple.com/HT204244
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141450491804793&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61313
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61485
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141577297623641&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383244821813&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61312
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3094
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/60193
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0010.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/60063
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/60034
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59907
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/58200
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141577241923505&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61643
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.novell.com/support/kb/doc.php?id=7015721
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21687079
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61503
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686246
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383465822787&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.qnap.com/i/en/support/con_show.php?cid=61
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61552
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61780
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://support.citrix.com/article/CTX200223
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141330468527613&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/60044
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61291
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141345648114150&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61287
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383353622268&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383304022067&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61128
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://support.citrix.com/article/CTX200217
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61471
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/60055
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59961
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61550
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61633
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686494
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.novell.com/security/cve/CVE-2014-6277.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://kb.bluecoat.com/index?page=content&id=SA82
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61328
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685733
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61129
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61603
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61857
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@debian.org
Published At:27 Sep, 2014 | 22:55
Updated At:12 Apr, 2025 | 10:46

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 10.0
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

GNU
gnu
>>bash>>1.14.0
cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.1
cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.2
cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.3
cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.4
cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.5
cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.6
cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.7
cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.0
cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.01
cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.01.1
cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.02
cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.02.1
cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.03
cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.04
cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.05
cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.05
cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*
GNU
gnu
>>bash>>2.05
cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*
GNU
gnu
>>bash>>3.0
cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*
GNU
gnu
>>bash>>3.0.16
cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*
GNU
gnu
>>bash>>3.1
cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*
GNU
gnu
>>bash>>3.2
cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*
GNU
gnu
>>bash>>3.2.48
cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*
GNU
gnu
>>bash>>4.0
cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*
GNU
gnu
>>bash>>4.0
cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*
GNU
gnu
>>bash>>4.1
cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*
GNU
gnu
>>bash>>4.2
cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*
GNU
gnu
>>bash>>4.3
cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-78Primarynvd@nist.gov
CWE ID: CWE-78
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://jvn.jp/en/jp/JVN55667175/index.htmlsecurity@debian.org
N/A
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126security@debian.org
N/A
http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.htmlsecurity@debian.org
Exploit
Patch
http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.htmlsecurity@debian.org
N/A
http://linux.oracle.com/errata/ELSA-2014-3093security@debian.org
N/A
http://linux.oracle.com/errata/ELSA-2014-3094security@debian.org
N/A
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.htmlsecurity@debian.org
N/A
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.htmlsecurity@debian.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.htmlsecurity@debian.org
N/A
http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.htmlsecurity@debian.org
N/A
http://marc.info/?l=bugtraq&m=141330468527613&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141345648114150&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383026420882&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383081521087&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383196021590&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383244821813&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383304022067&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383353622268&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383465822787&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141450491804793&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141576728022234&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141577137423233&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141577241923505&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141577297623641&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141585637922673&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141879528318582&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141879528318582&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142289270617409&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142289270617409&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142358026505815&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142358026505815&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142358078406056&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142721162228379&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142721162228379&w=2security@debian.org
N/A
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.htmlsecurity@debian.org
N/A
http://secunia.com/advisories/58200security@debian.org
N/A
http://secunia.com/advisories/59907security@debian.org
N/A
http://secunia.com/advisories/59961security@debian.org
N/A
http://secunia.com/advisories/60024security@debian.org
N/A
http://secunia.com/advisories/60034security@debian.org
N/A
http://secunia.com/advisories/60044security@debian.org
N/A
http://secunia.com/advisories/60055security@debian.org
N/A
http://secunia.com/advisories/60063security@debian.org
N/A
http://secunia.com/advisories/60193security@debian.org
N/A
http://secunia.com/advisories/60325security@debian.org
N/A
http://secunia.com/advisories/60433security@debian.org
N/A
http://secunia.com/advisories/61065security@debian.org
N/A
http://secunia.com/advisories/61128security@debian.org
N/A
http://secunia.com/advisories/61129security@debian.org
N/A
http://secunia.com/advisories/61283security@debian.org
N/A
http://secunia.com/advisories/61287security@debian.org
N/A
http://secunia.com/advisories/61291security@debian.org
N/A
http://secunia.com/advisories/61312security@debian.org
N/A
http://secunia.com/advisories/61313security@debian.org
N/A
http://secunia.com/advisories/61328security@debian.org
N/A
http://secunia.com/advisories/61442security@debian.org
N/A
http://secunia.com/advisories/61471security@debian.org
N/A
http://secunia.com/advisories/61485security@debian.org
N/A
http://secunia.com/advisories/61503security@debian.org
N/A
http://secunia.com/advisories/61550security@debian.org
N/A
http://secunia.com/advisories/61552security@debian.org
N/A
http://secunia.com/advisories/61565security@debian.org
N/A
http://secunia.com/advisories/61603security@debian.org
N/A
http://secunia.com/advisories/61633security@debian.org
N/A
http://secunia.com/advisories/61641security@debian.org
N/A
http://secunia.com/advisories/61643security@debian.org
N/A
http://secunia.com/advisories/61654security@debian.org
N/A
http://secunia.com/advisories/61703security@debian.org
N/A
http://secunia.com/advisories/61780security@debian.org
N/A
http://secunia.com/advisories/61816security@debian.org
N/A
http://secunia.com/advisories/61857security@debian.org
N/A
http://secunia.com/advisories/62312security@debian.org
N/A
http://secunia.com/advisories/62343security@debian.org
N/A
http://support.apple.com/HT204244security@debian.org
N/A
http://support.novell.com/security/cve/CVE-2014-6277.htmlsecurity@debian.org
N/A
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bashsecurity@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685541security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685604security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685733security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685749security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685914security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686131security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686246security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686445security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686479security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686494security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21687079security@debian.org
N/A
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315security@debian.org
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164security@debian.org
N/A
http://www.novell.com/support/kb/doc.php?id=7015721security@debian.org
N/A
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.htmlsecurity@debian.org
N/A
http://www.qnap.com/i/en/support/con_show.php?cid=61security@debian.org
N/A
http://www.ubuntu.com/usn/USN-2380-1security@debian.org
N/A
http://www.vmware.com/security/advisories/VMSA-2014-0010.htmlsecurity@debian.org
N/A
https://kb.bluecoat.com/index?page=content&id=SA82security@debian.org
N/A
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648security@debian.org
N/A
https://kc.mcafee.com/corporate/index?page=content&id=SB10085security@debian.org
N/A
https://support.apple.com/HT205267security@debian.org
N/A
https://support.citrix.com/article/CTX200217security@debian.org
N/A
https://support.citrix.com/article/CTX200223security@debian.org
N/A
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.htmlsecurity@debian.org
N/A
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075security@debian.org
N/A
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183security@debian.org
N/A
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlertssecurity@debian.org
N/A
https://www.suse.com/support/shellshock/security@debian.org
N/A
http://jvn.jp/en/jp/JVN55667175/index.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126af854a3a-2127-422b-91ae-364da2661108
N/A
http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://linux.oracle.com/errata/ELSA-2014-3093af854a3a-2127-422b-91ae-364da2661108
N/A
http://linux.oracle.com/errata/ELSA-2014-3094af854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141330468527613&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141345648114150&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383026420882&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383081521087&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383196021590&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383244821813&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383304022067&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383353622268&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383465822787&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141450491804793&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141576728022234&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141577137423233&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141577241923505&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141577297623641&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141585637922673&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141879528318582&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141879528318582&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142289270617409&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142289270617409&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142358026505815&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142358026505815&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142358078406056&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142721162228379&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142721162228379&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/58200af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/59907af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/59961af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60024af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60034af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60044af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60055af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60063af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60193af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60325af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60433af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61065af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61128af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61129af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61283af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61287af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61291af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61312af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61313af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61328af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61442af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61471af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61485af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61503af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61550af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61552af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61565af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61603af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61633af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61641af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61643af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61654af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61703af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61780af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61816af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61857af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/62312af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/62343af854a3a-2127-422b-91ae-364da2661108
N/A
http://support.apple.com/HT204244af854a3a-2127-422b-91ae-364da2661108
N/A
http://support.novell.com/security/cve/CVE-2014-6277.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bashaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685541af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685604af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685733af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685749af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685914af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686131af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686246af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686445af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686479af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686494af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21687079af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.novell.com/support/kb/doc.php?id=7015721af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.qnap.com/i/en/support/con_show.php?cid=61af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/USN-2380-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vmware.com/security/advisories/VMSA-2014-0010.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://kb.bluecoat.com/index?page=content&id=SA82af854a3a-2127-422b-91ae-364da2661108
N/A
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648af854a3a-2127-422b-91ae-364da2661108
N/A
https://kc.mcafee.com/corporate/index?page=content&id=SB10085af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.apple.com/HT205267af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.citrix.com/article/CTX200217af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.citrix.com/article/CTX200223af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183af854a3a-2127-422b-91ae-364da2661108
N/A
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlertsaf854a3a-2127-422b-91ae-364da2661108
N/A
https://www.suse.com/support/shellshock/af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://jvn.jp/en/jp/JVN55667175/index.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
Source: security@debian.org
Resource: N/A
Hyperlink: http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
Source: security@debian.org
Resource:
Exploit
Patch
Hyperlink: http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3093
Source: security@debian.org
Resource: N/A
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3094
Source: security@debian.org
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141330468527613&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141345648114150&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383026420882&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383081521087&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383196021590&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383244821813&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383304022067&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383353622268&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383465822787&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141450491804793&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141576728022234&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577137423233&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577241923505&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577297623641&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141585637922673&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358078406056&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/58200
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/59907
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/59961
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60024
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60034
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60044
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60055
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60063
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60193
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60325
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60433
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61065
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61128
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61129
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61283
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61287
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61291
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61312
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61313
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61328
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61442
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61471
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61485
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61503
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61550
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61552
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61565
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61603
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61633
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61641
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61643
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61654
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61703
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61780
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61816
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61857
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/62312
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/62343
Source: security@debian.org
Resource: N/A
Hyperlink: http://support.apple.com/HT204244
Source: security@debian.org
Resource: N/A
Hyperlink: http://support.novell.com/security/cve/CVE-2014-6277.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685541
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685604
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685733
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685749
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685914
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686131
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686246
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686445
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686479
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686494
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21687079
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.novell.com/support/kb/doc.php?id=7015721
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.qnap.com/i/en/support/con_show.php?cid=61
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-2380-1
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0010.html
Source: security@debian.org
Resource: N/A
Hyperlink: https://kb.bluecoat.com/index?page=content&id=SA82
Source: security@debian.org
Resource: N/A
Hyperlink: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
Source: security@debian.org
Resource: N/A
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10085
Source: security@debian.org
Resource: N/A
Hyperlink: https://support.apple.com/HT205267
Source: security@debian.org
Resource: N/A
Hyperlink: https://support.citrix.com/article/CTX200217
Source: security@debian.org
Resource: N/A
Hyperlink: https://support.citrix.com/article/CTX200223
Source: security@debian.org
Resource: N/A
Hyperlink: https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
Source: security@debian.org
Resource: N/A
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
Source: security@debian.org
Resource: N/A
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
Source: security@debian.org
Resource: N/A
Hyperlink: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
Source: security@debian.org
Resource: N/A
Hyperlink: https://www.suse.com/support/shellshock/
Source: security@debian.org
Resource: N/A
Hyperlink: http://jvn.jp/en/jp/JVN55667175/index.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Patch
Hyperlink: http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3093
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3094
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141330468527613&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141345648114150&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383026420882&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383081521087&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383196021590&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383244821813&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383304022067&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383353622268&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383465822787&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141450491804793&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141576728022234&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577137423233&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577241923505&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577297623641&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141585637922673&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358078406056&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/58200
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/59907
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/59961
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60024
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60034
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60044
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60055
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60063
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60193
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60325
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60433
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61065
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61128
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61129
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61283
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61287
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61291
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61312
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61313
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61328
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61442
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61471
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61485
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61503
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61550
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61552
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61565
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61603
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61633
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61641
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61643
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61654
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61703
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61780
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61816
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61857
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/62312
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/62343
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.apple.com/HT204244
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.novell.com/security/cve/CVE-2014-6277.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685541
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685604
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685733
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685749
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685914
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686131
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686246
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686445
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686479
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686494
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21687079
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.novell.com/support/kb/doc.php?id=7015721
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.qnap.com/i/en/support/con_show.php?cid=61
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-2380-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0010.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://kb.bluecoat.com/index?page=content&id=SA82
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10085
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.apple.com/HT205267
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.citrix.com/article/CTX200217
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.citrix.com/article/CTX200223
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.suse.com/support/shellshock/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

560Records found

CVE-2020-21937
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-8.07% / 91.78%
||
7 Day CHG~0.00%
Published-21 Jul, 2021 | 13:24
Updated-04 Aug, 2024 | 14:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An command injection vulnerability in HNAP1/SetWLanApcliSettings of Motorola CX2 router CX 1.0.2 Build 20190508 Rel.97360n allows attackers to execute arbitrary system commands.

Action-Not Available
Vendor-n/aMotorola Mobility LLC. (Lenovo Group Limited)
Product-cx2_firmwarecx2n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2009-1916
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-4.68% / 88.91%
||
7 Day CHG~0.00%
Published-04 Jun, 2009 | 17:00
Updated-07 Aug, 2024 | 05:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

dig.php in GScripts.net DNS Tools allows remote attackers to execute arbitrary commands via shell metacharacters in the ns parameter.

Action-Not Available
Vendor-gscriptsn/a
Product-dns_toolsn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15920
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-93.93% / 99.87%
||
7 Day CHG~0.00%
Published-24 Jul, 2020 | 00:58
Updated-04 Aug, 2024 | 13:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is an OS Command Injection in Mida eFramework through 2.9.0 that allows an attacker to achieve Remote Code Execution (RCE) with administrative (root) privileges. No authentication is required.

Action-Not Available
Vendor-midasolutionsn/a
Product-eframeworkn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-3191
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-9.8||CRITICAL
EPSS-2.45% / 84.58%
||
7 Day CHG~0.00%
Published-29 Apr, 2024 | 06:21
Updated-11 Apr, 2025 | 14:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MailCleaner Email os command injection

A vulnerability, which was classified as critical, has been found in MailCleaner up to 2023.03.14. This issue affects some unknown processing of the component Email Handler. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-262307.

Action-Not Available
Vendor-mailcleanern/amailcleaner
Product-mailcleanerMailCleanermailcleaner
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15433
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-2.07% / 83.23%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_php_pecl.php. When parsing the phpversion parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9715.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15610
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-2.07% / 83.23%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_php_pecl.php. When parsing the modulo parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9728.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2024-3193
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-8.8||HIGH
EPSS-1.64% / 81.20%
||
7 Day CHG~0.00%
Published-29 Apr, 2024 | 06:22
Updated-10 Apr, 2025 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MailCleaner Admin Endpoints os command injection

A vulnerability has been found in MailCleaner up to 2023.03.14 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Admin Endpoints. The manipulation leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-262309 was assigned to this vulnerability.

Action-Not Available
Vendor-mailcleanern/a
Product-mailcleanerMailCleaner
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15922
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-79.17% / 99.03%
||
7 Day CHG+13.48%
Published-24 Jul, 2020 | 00:58
Updated-04 Aug, 2024 | 13:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is an OS Command Injection in Mida eFramework 2.9.0 that allows an attacker to achieve Remote Code Execution (RCE) with administrative (root) privileges. Authentication is required.

Action-Not Available
Vendor-midasolutionsn/a
Product-eframeworkn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15431
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-2.07% / 83.23%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_crons.php. When parsing the user parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9740.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15432
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-2.07% / 83.23%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_migration_cpanel.php. When parsing the filespace parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9743.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15916
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.63% / 87.37%
||
7 Day CHG~0.00%
Published-23 Jul, 2020 | 17:53
Updated-04 Aug, 2024 | 13:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

goform/AdvSetLanip endpoint on Tenda AC15 AC1900 15.03.05.19 devices allows remote attackers to execute arbitrary system commands via shell metacharacters in the lanIp POST parameter.

Action-Not Available
Vendor-n/aTenda Technology Co., Ltd.
Product-ac15_firmwareac15n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15607
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-2.07% / 83.23%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_admin_apis.php. When parsing the line parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9721.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15477
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-8.17% / 91.83%
||
7 Day CHG~0.00%
Published-23 Jul, 2020 | 19:46
Updated-04 Aug, 2024 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The WebControl in RaspberryTortoise through 2012-10-28 is vulnerable to remote code execution via shell metacharacters in a URI. The file nodejs/raspberryTortoise.js has no validation on the parameter incomingString before passing it to the child_process.exec function.

Action-Not Available
Vendor-raspberrytorten/a
Product-raspberrytortoisen/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15614
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-2.07% / 83.23%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_php_pecl.php. When parsing the cha parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9718.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15427
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-2.07% / 83.23%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_disk_usage.php. When parsing the folderName parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9713.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15612
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-2.07% / 83.23%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_ftp_manager.php. When parsing the userLogin parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9737.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-16257
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-6.27% / 90.54%
||
7 Day CHG~0.00%
Published-28 Oct, 2020 | 17:02
Updated-04 Aug, 2024 | 13:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Winston 1.5.4 devices are vulnerable to command injection via the API.

Action-Not Available
Vendor-winstonprivacyn/a
Product-winston_firmwarewinstonn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15430
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-2.07% / 83.23%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_list_accounts.php. When parsing the username parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9736.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15357
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-6.08% / 90.39%
||
7 Day CHG~0.00%
Published-11 Dec, 2020 | 15:22
Updated-04 Aug, 2024 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Network Analysis functionality in Askey AP5100W_Dual_SIG_1.01.097 and all prior versions allows remote attackers to execute arbitrary commands via a shell metacharacter in the ping, traceroute, or route options.

Action-Not Available
Vendor-n/aAskey Computer Corp.
Product-ap5100wap5100w_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15613
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-2.07% / 83.23%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_admin_apis.php. When parsing the line parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9739.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15428
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-2.07% / 83.23%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_crons.php. When parsing the line parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9714.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-16147
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.99% / 75.89%
||
7 Day CHG~0.00%
Published-24 Sep, 2020 | 13:57
Updated-04 Aug, 2024 | 13:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The login page in Telmat AccessLog <= 6.0 (TAL_20180415) allows an attacker to get root shell access via Unauthenticated code injection over the network.

Action-Not Available
Vendor-telmatn/a
Product-accesslog_firmwareeduc\@boxeduc\@box_firmwaregit\@boxgit\@box_firmwareaccesslogn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15421
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-2.07% / 83.23%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_mod_security.php. When parsing the check_ip parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9707.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15606
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-1.98% / 82.85%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_admin_apis.php. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9720.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-9026
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.19% / 86.48%
||
7 Day CHG~0.00%
Published-17 Feb, 2020 | 03:02
Updated-04 Aug, 2024 | 10:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ELTEX NTP-RG-1402G 1v10 3.25.3.32 devices allow OS command injection via the PING field of the resource ping.cmd. The NTP-2 device is also affected.

Action-Not Available
Vendor-eltex-con/a
Product-ntp-2_firmwarentp-rg-1402g_firmwarentp-rg-1402gntp-2n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15434
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-2.07% / 83.23%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_php_pecl.php. When parsing the canal parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9745.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15424
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-2.07% / 83.23%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_mod_security.php. When parsing the domain parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9735.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15609
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-6.62% / 90.81%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_dashboard.php. When parsing the service_stop parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9726.

Action-Not Available
Vendor-centos-webpanelCentOS Web Panel
Product-centos_web_panelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15608
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-2.07% / 83.23%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_dashboard.php. When parsing the ai_service parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9724.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2017-14474
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-4.97% / 89.27%
||
7 Day CHG~0.00%
Published-09 May, 2018 | 20:00
Updated-16 Sep, 2024 | 23:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the MMM::Agent::Helpers::_execute function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1, a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability.

Action-Not Available
Vendor-mysql-mmmTalos (Cisco Systems, Inc.)
Product-mysql_multi-master_replication_managerMySql MMM
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15611
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-2.07% / 83.23%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_dashboard.php. When parsing the service_restart parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9734.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15420
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-2.07% / 83.23%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-el7-0.9.8.891. Authentication is not required to exploit this vulnerability. The specific flaw exists within loader_ajax.php. When parsing the line parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9259.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2008-6554
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-3.22% / 86.54%
||
7 Day CHG~0.00%
Published-30 Mar, 2009 | 20:00
Updated-07 Aug, 2024 | 11:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

cgi-bin/script in Aztech ADSL2/2+ 4-port router 3.7.0 build 070426 allows remote attackers to execute arbitrary commands via shell metacharacters in the query string.

Action-Not Available
Vendor-aztechn/a
Product-adsl2\/2\+4-port_routern/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15422
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-2.07% / 83.23%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_mod_security.php. When parsing the archivo parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9731.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15429
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-2.07% / 83.23%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_crons.php. When parsing the user parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9716.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15615
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-1.98% / 82.85%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_ftp_manager.php. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9746.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15425
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-9.8||CRITICAL
EPSS-1.98% / 82.85%
||
7 Day CHG~0.00%
Published-28 Jul, 2020 | 17:01
Updated-04 Aug, 2024 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_mod_security.php. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9742.

Action-Not Available
Vendor-control-webpanelCentOS Web Panel
Product-webpanelCentOS Web Panel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-15489
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.60% / 87.31%
||
7 Day CHG~0.00%
Published-01 Jul, 2020 | 20:53
Updated-04 Aug, 2024 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Wavlink WL-WN530HG4 M30HG4.V5030.191116 devices. Multiple shell metacharacter injection vulnerabilities exist in CGI scripts, leading to remote code execution with root privileges.

Action-Not Available
Vendor-n/aWAVLINK Technology Ltd.
Product-wl-wn530hg4wl-wn530hg4_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2008-4796
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-1.09% / 77.02%
||
7 Day CHG~0.00%
Published-30 Oct, 2008 | 20:49
Updated-07 Aug, 2024 | 10:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier, as used in (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost, and possibly other products, allows remote attackers to execute arbitrary commands via shell metacharacters in https URLs.

Action-Not Available
Vendor-snoopy_projectn/aDebian GNU/LinuxWordPress.orgNagios Enterprises, LLC
Product-debian_linuxsnoopywordpressnagiosn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-14072
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.75% / 85.41%
||
7 Day CHG~0.00%
Published-29 Jun, 2020 | 16:29
Updated-04 Aug, 2024 | 12:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in MK-AUTH 19.01. It allows command execution as root via shell metacharacters to /auth admin scripts.

Action-Not Available
Vendor-mk-authn/a
Product-mk-authn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2017-14478
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-5.01% / 89.31%
||
7 Day CHG~0.00%
Published-09 May, 2018 | 20:00
Updated-17 Sep, 2024 | 03:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the MMM::Agent::Helpers::Network::clear_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for Linux), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability.

Action-Not Available
Vendor-mysql-mmmTalos (Cisco Systems, Inc.)
Product-mysql_multi-master_replication_managerMySql MMM
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2017-14135
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-84.70% / 99.29%
||
7 Day CHG~0.00%
Published-04 Sep, 2017 | 23:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

enigma2-plugins/blob/master/webadmin/src/WebChilds/Script.py in the webadmin plugin for opendreambox 2.0.0 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the command parameter to the /script URI.

Action-Not Available
Vendor-dreamboxn/a
Product-opendreamboxn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2017-14475
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-4.97% / 89.27%
||
7 Day CHG~0.00%
Published-09 May, 2018 | 20:00
Updated-16 Sep, 2024 | 23:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the MMM::Agent::Helpers::Network::add_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for Linux), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability.

Action-Not Available
Vendor-mysql-mmmTalos (Cisco Systems, Inc.)
Product-mysql_multi-master_replication_managerMySql MMM
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2017-14479
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-5.01% / 89.31%
||
7 Day CHG~0.00%
Published-09 May, 2018 | 20:00
Updated-16 Sep, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the MMM::Agent::Helpers::Network::clear_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for Solaris), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability.

Action-Not Available
Vendor-mysql-mmmTalos (Cisco Systems, Inc.)
Product-mysql_multi-master_replication_managerMySql MMM
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2017-14476
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-5.01% / 89.31%
||
7 Day CHG~0.00%
Published-09 May, 2018 | 20:00
Updated-17 Sep, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the MMM::Agent::Helpers::Network::add_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for Solaris), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability.

Action-Not Available
Vendor-mysql-mmmTalos (Cisco Systems, Inc.)
Product-mysql_multi-master_replication_managerMySql MMM
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-20708
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-10||CRITICAL
EPSS-11.20% / 93.22%
||
7 Day CHG~0.00%
Published-10 Feb, 2022 | 17:06
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-03-17||Apply updates per vendor instructions.
Cisco Small Business RV Series Routers Vulnerabilities

Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code Elevate privileges Execute arbitrary commands Bypass authentication and authorization protections Fetch and run unsigned software Cause denial of service (DoS) For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-rv345prv340_firmwarerv345rv340rv340wrv340w_firmwarerv345_firmwarerv345p_firmwareCisco Small Business RV Series Router FirmwareSmall Business RV160, RV260, RV340, and RV345 Series Routers
CWE ID-CWE-121
Stack-based Buffer Overflow
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2017-14459
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-10||CRITICAL
EPSS-20.60% / 95.36%
||
7 Day CHG~0.00%
Published-11 Apr, 2018 | 16:00
Updated-16 Sep, 2024 | 23:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable OS Command Injection vulnerability exists in the Telnet, SSH, and console login functionality of Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client in firmware versions 1.4 to 1.7 (current). An attacker can inject commands via the username parameter of several services (SSH, Telnet, console), resulting in remote, unauthenticated, root-level operating system command execution.

Action-Not Available
Vendor-Moxa Inc.Talos (Cisco Systems, Inc.)
Product-awk-3131aawk-3131a_firmwareMoxa
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2017-14480
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-5.01% / 89.31%
||
7 Day CHG~0.00%
Published-09 May, 2018 | 20:00
Updated-17 Sep, 2024 | 00:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the MMM::Agent::Helpers::Network::clear_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for FreeBSD), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability.

Action-Not Available
Vendor-mysql-mmmTalos (Cisco Systems, Inc.)
Product-mysql_multi-master_replication_managerMySql MMM
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2017-14477
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-5.01% / 89.31%
||
7 Day CHG~0.00%
Published-09 May, 2018 | 20:00
Updated-17 Sep, 2024 | 04:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the MMM::Agent::Helpers::Network::add_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for FreeBSD), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability.

Action-Not Available
Vendor-mysql-mmmTalos (Cisco Systems, Inc.)
Product-mysql_multi-master_replication_managerMySql MMM
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2017-14481
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-2.27% / 83.98%
||
7 Day CHG~0.00%
Published-09 May, 2018 | 20:00
Updated-17 Sep, 2024 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the MMM::Agent::Helpers::Network::send_arp function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for Solaris), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability.

Action-Not Available
Vendor-mysql-mmmTalos (Cisco Systems, Inc.)
Product-mysql_multi-master_replication_managerMySql MMM
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 11
  • 12
  • Next
Details not found