Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2014-6277

Summary
Assigner-debian
Assigner Org ID-79363d38-fa19-49d1-9214-5f28da3f3ac5
Published At-27 Sep, 2014 | 22:00
Updated At-06 Aug, 2024 | 12:10
Rejected At-
Credits

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:debian
Assigner Org ID:79363d38-fa19-49d1-9214-5f28da3f3ac5
Published At:27 Sep, 2014 | 22:00
Updated At:06 Aug, 2024 | 12:10
Rejected At:
▼CVE Numbering Authority (CNA)

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21685749
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141577137423233&w=2
vendor-advisory
x_refsource_HP
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
x_refsource_CONFIRM
http://linux.oracle.com/errata/ELSA-2014-3093
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142721162228379&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=142358026505815&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=swg21686479
x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN55667175/index.html
third-party-advisory
x_refsource_JVN
http://secunia.com/advisories/60433
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141383026420882&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=141585637922673&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=141576728022234&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=swg21685541
x_refsource_CONFIRM
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
x_refsource_CONFIRM
http://secunia.com/advisories/61816
third-party-advisory
x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/61442
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142358078406056&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61283
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
vendor-advisory
x_refsource_APPLE
https://kc.mcafee.com/corporate/index?page=content&id=SB10085
x_refsource_CONFIRM
http://secunia.com/advisories/61654
third-party-advisory
x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-2380-1
vendor-advisory
x_refsource_UBUNTU
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
x_refsource_CONFIRM
http://secunia.com/advisories/62312
third-party-advisory
x_refsource_SECUNIA
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141879528318582&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=swg21685604
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61703
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61065
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141383196021590&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=141383081521087&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=swg21686445
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21686131
x_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
third-party-advisory
x_refsource_JVNDB
http://marc.info/?l=bugtraq&m=141879528318582&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61641
third-party-advisory
x_refsource_SECUNIA
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
vendor-advisory
x_refsource_SUSE
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21685914
x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
vendor-advisory
x_refsource_MANDRIVA
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
x_refsource_CONFIRM
https://support.apple.com/HT205267
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142721162228379&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/60325
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/60024
third-party-advisory
x_refsource_SECUNIA
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
x_refsource_MISC
http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
x_refsource_MISC
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
vendor-advisory
x_refsource_CISCO
http://secunia.com/advisories/62343
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61565
third-party-advisory
x_refsource_SECUNIA
https://www.suse.com/support/shellshock/
x_refsource_CONFIRM
http://support.apple.com/HT204244
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141450491804793&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61313
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142289270617409&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=142358026505815&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61485
third-party-advisory
x_refsource_SECUNIA
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141577297623641&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141383244821813&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61312
third-party-advisory
x_refsource_SECUNIA
http://linux.oracle.com/errata/ELSA-2014-3094
x_refsource_CONFIRM
http://secunia.com/advisories/60193
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/security/advisories/VMSA-2014-0010.html
x_refsource_CONFIRM
http://secunia.com/advisories/60063
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/60034
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59907
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/58200
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141577241923505&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61643
third-party-advisory
x_refsource_SECUNIA
http://www.novell.com/support/kb/doc.php?id=7015721
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21687079
x_refsource_CONFIRM
http://secunia.com/advisories/61503
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=swg21686246
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142289270617409&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141383465822787&w=2
vendor-advisory
x_refsource_HP
http://www.qnap.com/i/en/support/con_show.php?cid=61
x_refsource_CONFIRM
http://secunia.com/advisories/61552
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61780
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
x_refsource_CONFIRM
https://support.citrix.com/article/CTX200223
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141330468527613&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/60044
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61291
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141345648114150&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61287
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141383353622268&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
x_refsource_CONFIRM
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
vendor-advisory
x_refsource_APPLE
http://marc.info/?l=bugtraq&m=141383304022067&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61128
third-party-advisory
x_refsource_SECUNIA
https://support.citrix.com/article/CTX200217
x_refsource_CONFIRM
http://secunia.com/advisories/61471
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/60055
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59961
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61550
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61633
third-party-advisory
x_refsource_SECUNIA
http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
x_refsource_MISC
http://www-01.ibm.com/support/docview.wss?uid=swg21686494
x_refsource_CONFIRM
http://support.novell.com/security/cve/CVE-2014-6277.html
x_refsource_CONFIRM
https://kb.bluecoat.com/index?page=content&id=SA82
x_refsource_CONFIRM
http://secunia.com/advisories/61328
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=swg21685733
x_refsource_CONFIRM
http://secunia.com/advisories/61129
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61603
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61857
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685749
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141577137423233&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
Resource:
x_refsource_CONFIRM
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3093
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686479
Resource:
x_refsource_CONFIRM
Hyperlink: http://jvn.jp/en/jp/JVN55667175/index.html
Resource:
third-party-advisory
x_refsource_JVN
Hyperlink: http://secunia.com/advisories/60433
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=141383026420882&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=141585637922673&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=141576728022234&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685541
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61816
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/61442
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=142358078406056&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61283
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10085
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61654
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ubuntu.com/usn/USN-2380-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/62312
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685604
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61703
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61065
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=141383196021590&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=141383081521087&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686445
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686131
Resource:
x_refsource_CONFIRM
Hyperlink: http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
Resource:
third-party-advisory
x_refsource_JVNDB
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61641
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685914
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
Resource:
x_refsource_CONFIRM
Hyperlink: https://support.apple.com/HT205267
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/60325
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/60024
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
Resource:
x_refsource_MISC
Hyperlink: http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
Resource:
x_refsource_MISC
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: http://secunia.com/advisories/62343
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61565
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://www.suse.com/support/shellshock/
Resource:
x_refsource_CONFIRM
Hyperlink: http://support.apple.com/HT204244
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141450491804793&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61313
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61485
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141577297623641&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141383244821813&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61312
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3094
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/60193
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0010.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/60063
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/60034
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59907
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/58200
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=141577241923505&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61643
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.novell.com/support/kb/doc.php?id=7015721
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21687079
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61503
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686246
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141383465822787&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.qnap.com/i/en/support/con_show.php?cid=61
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61552
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61780
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
Resource:
x_refsource_CONFIRM
Hyperlink: https://support.citrix.com/article/CTX200223
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141330468527613&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/60044
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61291
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=141345648114150&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61287
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=141383353622268&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://marc.info/?l=bugtraq&m=141383304022067&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61128
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://support.citrix.com/article/CTX200217
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61471
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/60055
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59961
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61550
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61633
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
Resource:
x_refsource_MISC
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686494
Resource:
x_refsource_CONFIRM
Hyperlink: http://support.novell.com/security/cve/CVE-2014-6277.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://kb.bluecoat.com/index?page=content&id=SA82
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61328
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685733
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61129
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61603
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61857
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21685749
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141577137423233&w=2
vendor-advisory
x_refsource_HP
x_transferred
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
x_refsource_CONFIRM
x_transferred
http://linux.oracle.com/errata/ELSA-2014-3093
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=142721162228379&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=142358026505815&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686479
x_refsource_CONFIRM
x_transferred
http://jvn.jp/en/jp/JVN55667175/index.html
third-party-advisory
x_refsource_JVN
x_transferred
http://secunia.com/advisories/60433
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=141383026420882&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=141585637922673&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=141576728022234&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21685541
x_refsource_CONFIRM
x_transferred
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61816
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/61442
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=142358078406056&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61283
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
vendor-advisory
x_refsource_APPLE
x_transferred
https://kc.mcafee.com/corporate/index?page=content&id=SB10085
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61654
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ubuntu.com/usn/USN-2380-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/62312
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141879528318582&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21685604
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61703
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61065
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=141383196021590&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=141383081521087&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686445
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686131
x_refsource_CONFIRM
x_transferred
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
third-party-advisory
x_refsource_JVNDB
x_transferred
http://marc.info/?l=bugtraq&m=141879528318582&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61641
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21685914
x_refsource_CONFIRM
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
vendor-advisory
x_refsource_MANDRIVA
x_transferred
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
x_refsource_CONFIRM
x_transferred
https://support.apple.com/HT205267
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=142721162228379&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/60325
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/60024
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
x_refsource_MISC
x_transferred
http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
x_refsource_MISC
x_transferred
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
vendor-advisory
x_refsource_CISCO
x_transferred
http://secunia.com/advisories/62343
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61565
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://www.suse.com/support/shellshock/
x_refsource_CONFIRM
x_transferred
http://support.apple.com/HT204244
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141450491804793&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61313
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=142289270617409&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=142358026505815&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61485
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141577297623641&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141383244821813&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61312
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://linux.oracle.com/errata/ELSA-2014-3094
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/60193
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/security/advisories/VMSA-2014-0010.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/60063
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/60034
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59907
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/58200
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=141577241923505&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61643
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.novell.com/support/kb/doc.php?id=7015721
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21687079
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61503
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686246
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=142289270617409&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141383465822787&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.qnap.com/i/en/support/con_show.php?cid=61
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61552
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61780
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
x_refsource_CONFIRM
x_transferred
https://support.citrix.com/article/CTX200223
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141330468527613&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/60044
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61291
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=141345648114150&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61287
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=141383353622268&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
x_refsource_CONFIRM
x_transferred
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://marc.info/?l=bugtraq&m=141383304022067&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61128
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://support.citrix.com/article/CTX200217
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61471
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/60055
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59961
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61550
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61633
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
x_refsource_MISC
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686494
x_refsource_CONFIRM
x_transferred
http://support.novell.com/security/cve/CVE-2014-6277.html
x_refsource_CONFIRM
x_transferred
https://kb.bluecoat.com/index?page=content&id=SA82
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61328
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21685733
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61129
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61603
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61857
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685749
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141577137423233&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3093
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686479
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://jvn.jp/en/jp/JVN55667175/index.html
Resource:
third-party-advisory
x_refsource_JVN
x_transferred
Hyperlink: http://secunia.com/advisories/60433
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383026420882&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141585637922673&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141576728022234&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685541
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61816
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/61442
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142358078406056&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61283
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10085
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61654
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ubuntu.com/usn/USN-2380-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/62312
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685604
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61703
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61065
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383196021590&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383081521087&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686445
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686131
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
Resource:
third-party-advisory
x_refsource_JVNDB
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61641
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685914
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://support.apple.com/HT205267
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/60325
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/60024
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: http://secunia.com/advisories/62343
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61565
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://www.suse.com/support/shellshock/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.apple.com/HT204244
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141450491804793&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61313
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61485
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141577297623641&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383244821813&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61312
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3094
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/60193
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0010.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/60063
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/60034
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59907
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/58200
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141577241923505&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61643
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.novell.com/support/kb/doc.php?id=7015721
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21687079
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61503
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686246
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383465822787&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.qnap.com/i/en/support/con_show.php?cid=61
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61552
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61780
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://support.citrix.com/article/CTX200223
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141330468527613&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/60044
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61291
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141345648114150&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61287
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383353622268&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383304022067&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61128
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://support.citrix.com/article/CTX200217
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61471
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/60055
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59961
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61550
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61633
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686494
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.novell.com/security/cve/CVE-2014-6277.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://kb.bluecoat.com/index?page=content&id=SA82
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61328
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685733
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61129
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61603
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61857
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@debian.org
Published At:27 Sep, 2014 | 22:55
Updated At:12 Apr, 2025 | 10:46

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 10.0
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

GNU
gnu
>>bash>>1.14.0
cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.1
cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.2
cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.3
cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.4
cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.5
cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.6
cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.7
cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.0
cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.01
cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.01.1
cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.02
cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.02.1
cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.03
cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.04
cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.05
cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.05
cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*
GNU
gnu
>>bash>>2.05
cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*
GNU
gnu
>>bash>>3.0
cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*
GNU
gnu
>>bash>>3.0.16
cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*
GNU
gnu
>>bash>>3.1
cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*
GNU
gnu
>>bash>>3.2
cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*
GNU
gnu
>>bash>>3.2.48
cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*
GNU
gnu
>>bash>>4.0
cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*
GNU
gnu
>>bash>>4.0
cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*
GNU
gnu
>>bash>>4.1
cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*
GNU
gnu
>>bash>>4.2
cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*
GNU
gnu
>>bash>>4.3
cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-78Primarynvd@nist.gov
CWE ID: CWE-78
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://jvn.jp/en/jp/JVN55667175/index.htmlsecurity@debian.org
N/A
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126security@debian.org
N/A
http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.htmlsecurity@debian.org
Exploit
Patch
http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.htmlsecurity@debian.org
N/A
http://linux.oracle.com/errata/ELSA-2014-3093security@debian.org
N/A
http://linux.oracle.com/errata/ELSA-2014-3094security@debian.org
N/A
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.htmlsecurity@debian.org
N/A
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.htmlsecurity@debian.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.htmlsecurity@debian.org
N/A
http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.htmlsecurity@debian.org
N/A
http://marc.info/?l=bugtraq&m=141330468527613&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141345648114150&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383026420882&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383081521087&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383196021590&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383244821813&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383304022067&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383353622268&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383465822787&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141450491804793&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141576728022234&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141577137423233&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141577241923505&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141577297623641&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141585637922673&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141879528318582&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141879528318582&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142289270617409&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142289270617409&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142358026505815&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142358026505815&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142358078406056&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142721162228379&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142721162228379&w=2security@debian.org
N/A
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.htmlsecurity@debian.org
N/A
http://secunia.com/advisories/58200security@debian.org
N/A
http://secunia.com/advisories/59907security@debian.org
N/A
http://secunia.com/advisories/59961security@debian.org
N/A
http://secunia.com/advisories/60024security@debian.org
N/A
http://secunia.com/advisories/60034security@debian.org
N/A
http://secunia.com/advisories/60044security@debian.org
N/A
http://secunia.com/advisories/60055security@debian.org
N/A
http://secunia.com/advisories/60063security@debian.org
N/A
http://secunia.com/advisories/60193security@debian.org
N/A
http://secunia.com/advisories/60325security@debian.org
N/A
http://secunia.com/advisories/60433security@debian.org
N/A
http://secunia.com/advisories/61065security@debian.org
N/A
http://secunia.com/advisories/61128security@debian.org
N/A
http://secunia.com/advisories/61129security@debian.org
N/A
http://secunia.com/advisories/61283security@debian.org
N/A
http://secunia.com/advisories/61287security@debian.org
N/A
http://secunia.com/advisories/61291security@debian.org
N/A
http://secunia.com/advisories/61312security@debian.org
N/A
http://secunia.com/advisories/61313security@debian.org
N/A
http://secunia.com/advisories/61328security@debian.org
N/A
http://secunia.com/advisories/61442security@debian.org
N/A
http://secunia.com/advisories/61471security@debian.org
N/A
http://secunia.com/advisories/61485security@debian.org
N/A
http://secunia.com/advisories/61503security@debian.org
N/A
http://secunia.com/advisories/61550security@debian.org
N/A
http://secunia.com/advisories/61552security@debian.org
N/A
http://secunia.com/advisories/61565security@debian.org
N/A
http://secunia.com/advisories/61603security@debian.org
N/A
http://secunia.com/advisories/61633security@debian.org
N/A
http://secunia.com/advisories/61641security@debian.org
N/A
http://secunia.com/advisories/61643security@debian.org
N/A
http://secunia.com/advisories/61654security@debian.org
N/A
http://secunia.com/advisories/61703security@debian.org
N/A
http://secunia.com/advisories/61780security@debian.org
N/A
http://secunia.com/advisories/61816security@debian.org
N/A
http://secunia.com/advisories/61857security@debian.org
N/A
http://secunia.com/advisories/62312security@debian.org
N/A
http://secunia.com/advisories/62343security@debian.org
N/A
http://support.apple.com/HT204244security@debian.org
N/A
http://support.novell.com/security/cve/CVE-2014-6277.htmlsecurity@debian.org
N/A
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bashsecurity@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685541security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685604security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685733security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685749security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685914security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686131security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686246security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686445security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686479security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686494security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21687079security@debian.org
N/A
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315security@debian.org
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164security@debian.org
N/A
http://www.novell.com/support/kb/doc.php?id=7015721security@debian.org
N/A
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.htmlsecurity@debian.org
N/A
http://www.qnap.com/i/en/support/con_show.php?cid=61security@debian.org
N/A
http://www.ubuntu.com/usn/USN-2380-1security@debian.org
N/A
http://www.vmware.com/security/advisories/VMSA-2014-0010.htmlsecurity@debian.org
N/A
https://kb.bluecoat.com/index?page=content&id=SA82security@debian.org
N/A
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648security@debian.org
N/A
https://kc.mcafee.com/corporate/index?page=content&id=SB10085security@debian.org
N/A
https://support.apple.com/HT205267security@debian.org
N/A
https://support.citrix.com/article/CTX200217security@debian.org
N/A
https://support.citrix.com/article/CTX200223security@debian.org
N/A
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.htmlsecurity@debian.org
N/A
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075security@debian.org
N/A
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183security@debian.org
N/A
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlertssecurity@debian.org
N/A
https://www.suse.com/support/shellshock/security@debian.org
N/A
http://jvn.jp/en/jp/JVN55667175/index.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126af854a3a-2127-422b-91ae-364da2661108
N/A
http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://linux.oracle.com/errata/ELSA-2014-3093af854a3a-2127-422b-91ae-364da2661108
N/A
http://linux.oracle.com/errata/ELSA-2014-3094af854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141330468527613&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141345648114150&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383026420882&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383081521087&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383196021590&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383244821813&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383304022067&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383353622268&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383465822787&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141450491804793&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141576728022234&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141577137423233&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141577241923505&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141577297623641&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141585637922673&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141879528318582&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141879528318582&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142289270617409&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142289270617409&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142358026505815&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142358026505815&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142358078406056&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142721162228379&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142721162228379&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/58200af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/59907af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/59961af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60024af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60034af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60044af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60055af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60063af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60193af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60325af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60433af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61065af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61128af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61129af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61283af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61287af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61291af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61312af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61313af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61328af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61442af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61471af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61485af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61503af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61550af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61552af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61565af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61603af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61633af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61641af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61643af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61654af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61703af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61780af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61816af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61857af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/62312af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/62343af854a3a-2127-422b-91ae-364da2661108
N/A
http://support.apple.com/HT204244af854a3a-2127-422b-91ae-364da2661108
N/A
http://support.novell.com/security/cve/CVE-2014-6277.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bashaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685541af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685604af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685733af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685749af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685914af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686131af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686246af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686445af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686479af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686494af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21687079af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.novell.com/support/kb/doc.php?id=7015721af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.qnap.com/i/en/support/con_show.php?cid=61af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/USN-2380-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vmware.com/security/advisories/VMSA-2014-0010.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://kb.bluecoat.com/index?page=content&id=SA82af854a3a-2127-422b-91ae-364da2661108
N/A
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648af854a3a-2127-422b-91ae-364da2661108
N/A
https://kc.mcafee.com/corporate/index?page=content&id=SB10085af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.apple.com/HT205267af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.citrix.com/article/CTX200217af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.citrix.com/article/CTX200223af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183af854a3a-2127-422b-91ae-364da2661108
N/A
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlertsaf854a3a-2127-422b-91ae-364da2661108
N/A
https://www.suse.com/support/shellshock/af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://jvn.jp/en/jp/JVN55667175/index.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
Source: security@debian.org
Resource: N/A
Hyperlink: http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
Source: security@debian.org
Resource:
Exploit
Patch
Hyperlink: http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3093
Source: security@debian.org
Resource: N/A
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3094
Source: security@debian.org
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141330468527613&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141345648114150&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383026420882&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383081521087&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383196021590&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383244821813&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383304022067&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383353622268&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383465822787&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141450491804793&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141576728022234&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577137423233&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577241923505&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577297623641&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141585637922673&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358078406056&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/58200
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/59907
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/59961
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60024
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60034
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60044
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60055
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60063
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60193
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60325
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60433
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61065
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61128
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61129
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61283
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61287
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61291
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61312
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61313
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61328
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61442
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61471
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61485
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61503
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61550
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61552
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61565
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61603
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61633
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61641
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61643
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61654
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61703
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61780
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61816
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61857
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/62312
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/62343
Source: security@debian.org
Resource: N/A
Hyperlink: http://support.apple.com/HT204244
Source: security@debian.org
Resource: N/A
Hyperlink: http://support.novell.com/security/cve/CVE-2014-6277.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685541
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685604
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685733
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685749
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685914
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686131
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686246
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686445
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686479
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686494
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21687079
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.novell.com/support/kb/doc.php?id=7015721
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.qnap.com/i/en/support/con_show.php?cid=61
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-2380-1
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0010.html
Source: security@debian.org
Resource: N/A
Hyperlink: https://kb.bluecoat.com/index?page=content&id=SA82
Source: security@debian.org
Resource: N/A
Hyperlink: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
Source: security@debian.org
Resource: N/A
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10085
Source: security@debian.org
Resource: N/A
Hyperlink: https://support.apple.com/HT205267
Source: security@debian.org
Resource: N/A
Hyperlink: https://support.citrix.com/article/CTX200217
Source: security@debian.org
Resource: N/A
Hyperlink: https://support.citrix.com/article/CTX200223
Source: security@debian.org
Resource: N/A
Hyperlink: https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
Source: security@debian.org
Resource: N/A
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
Source: security@debian.org
Resource: N/A
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
Source: security@debian.org
Resource: N/A
Hyperlink: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
Source: security@debian.org
Resource: N/A
Hyperlink: https://www.suse.com/support/shellshock/
Source: security@debian.org
Resource: N/A
Hyperlink: http://jvn.jp/en/jp/JVN55667175/index.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Patch
Hyperlink: http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3093
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3094
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141330468527613&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141345648114150&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383026420882&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383081521087&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383196021590&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383244821813&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383304022067&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383353622268&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383465822787&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141450491804793&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141576728022234&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577137423233&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577241923505&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577297623641&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141585637922673&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358078406056&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/58200
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/59907
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/59961
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60024
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60034
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60044
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60055
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60063
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60193
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60325
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60433
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61065
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61128
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61129
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61283
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61287
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61291
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61312
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61313
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61328
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61442
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61471
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61485
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61503
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61550
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61552
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61565
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61603
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61633
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61641
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61643
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61654
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61703
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61780
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61816
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61857
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/62312
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/62343
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.apple.com/HT204244
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.novell.com/security/cve/CVE-2014-6277.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685541
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685604
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685733
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685749
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685914
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686131
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686246
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686445
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686479
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686494
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21687079
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.novell.com/support/kb/doc.php?id=7015721
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.qnap.com/i/en/support/con_show.php?cid=61
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-2380-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0010.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://kb.bluecoat.com/index?page=content&id=SA82
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10085
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.apple.com/HT205267
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.citrix.com/article/CTX200217
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.citrix.com/article/CTX200223
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.suse.com/support/shellshock/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

560Records found

CVE-2008-6554
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-3.22% / 86.55%
||
7 Day CHG~0.00%
Published-30 Mar, 2009 | 20:00
Updated-07 Aug, 2024 | 11:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

cgi-bin/script in Aztech ADSL2/2+ 4-port router 3.7.0 build 070426 allows remote attackers to execute arbitrary commands via shell metacharacters in the query string.

Action-Not Available
Vendor-aztechn/a
Product-adsl2\/2\+4-port_routern/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-13307
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-15.30% / 94.36%
||
7 Day CHG~0.00%
Published-27 Nov, 2018 | 21:00
Updated-05 Aug, 2024 | 09:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

System command injection in fromNtp in TOTOLINK A3002RU version 1.0.8 allows attackers to execute system commands via the "ntpServerIp2" POST parameter. Certain payloads cause the device to become permanently inoperable.

Action-Not Available
Vendor-n/aTOTOLINK
Product-a3002rua3002ru_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-14706
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-63.86% / 98.35%
||
7 Day CHG~0.00%
Published-03 Dec, 2018 | 22:00
Updated-05 Aug, 2024 | 09:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

System command injection in the /DroboPix/api/drobopix/demo endpoint on Drobo 5N2 NAS version 4.0.5-13.28.96115 allows unauthenticated attackers to execute system commands via the payload in a POST request.

Action-Not Available
Vendor-drobon/a
Product-5n2_firmware5n2n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-13306
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-15.30% / 94.36%
||
7 Day CHG~0.00%
Published-27 Nov, 2018 | 21:00
Updated-05 Aug, 2024 | 09:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

System command injection in formDlna in TOTOLINK A3002RU version 1.0.8 allows attackers to execute system commands via the "ftpUser" POST parameter.

Action-Not Available
Vendor-n/aTOTOLINK
Product-a3002rua3002ru_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-13354
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-12.08% / 93.54%
||
7 Day CHG~0.00%
Published-27 Nov, 2018 | 21:00
Updated-05 Aug, 2024 | 09:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

System command injection in logtable.php in TerraMaster TOS version 3.1.03 allows attackers to execute system commands via the "Event" parameter.

Action-Not Available
Vendor-terra-mastern/a
Product-terramaster_operating_systemn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-13338
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-12.49% / 93.67%
||
7 Day CHG~0.00%
Published-27 Nov, 2018 | 21:00
Updated-05 Aug, 2024 | 09:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

System command injection in ajaxdata.php in TerraMaster TOS version 3.1.03 allows attackers to execute system commands via the "username" parameter during user creation.

Action-Not Available
Vendor-terra-mastern/a
Product-terramaster_operating_systemn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-20658
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-2.14% / 83.51%
||
7 Day CHG~0.00%
Published-24 Feb, 2021 | 03:51
Updated-03 Aug, 2024 | 17:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SolarView Compact SV-CPT-MC310 prior to Ver.6.5 allows an attacker to execute arbitrary OS commands with the web server privilege via unspecified vectors.

Action-Not Available
Vendor-contecContec Co., Ltd.
Product-sv-cpt-mc310sv-cpt-mc310_firmwareSolarView Compact
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-32534
Matching Score-4
Assigner-Robert Bosch GmbH
ShareView Details
Matching Score-4
Assigner-Robert Bosch GmbH
CVSS Score-8.8||HIGH
EPSS-2.83% / 85.65%
||
7 Day CHG~0.00%
Published-22 Jun, 2022 | 13:55
Updated-03 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OS Command Injection

The Bosch Ethernet switch PRA-ES8P2S with software version 1.01.05 and earlier was found to be vulnerable to command injection through its diagnostics web interface. This allows execution of shell commands.

Action-Not Available
Vendor-Robert Bosch GmbH
Product-pra-es8p2spra-es8p2s_firmwarePRA-ES8P2S
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-12670
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-12.49% / 93.67%
||
7 Day CHG~0.00%
Published-19 Oct, 2018 | 22:00
Updated-05 Aug, 2024 | 08:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SV3C L-SERIES HD CAMERA V2.3.4.2103-S50-NTD-B20170508B and V2.3.4.2103-S50-NTD-B20170823B devices allow OS Command Injection.

Action-Not Available
Vendor-sv3cn/a
Product-h.264_poe_ip_camera_firmwaresv-b11vpoe-1080p-lsv-b01poe-1080p-lsv-d02poe-1080p-ln/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-31795
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-11.76% / 93.44%
||
7 Day CHG~0.00%
Published-20 Jun, 2022 | 14:41
Updated-03 Aug, 2024 | 07:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Fujitsu ETERNUS CentricStor CS8000 (Control Center) devices before 8.1A SP02 P04. The vulnerability resides in the grel_finfo function in grel.php. An attacker is able to influence the username (user), password (pw), and file-name (file) parameters and inject special characters such as semicolons, backticks, or command-substitution sequences in order to force the application to execute arbitrary commands.

Action-Not Available
Vendor-n/aFujitsu Limited
Product-eternus_cs8000eternus_cs8000_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-12313
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-5.20% / 89.53%
||
7 Day CHG~0.00%
Published-04 Dec, 2018 | 17:00
Updated-05 Aug, 2024 | 08:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OS command injection in snmp.cgi in ASUSTOR ADM version 3.1.1 allows attackers to execute system commands without authentication via the "rocommunity" URL parameter.

Action-Not Available
Vendor-n/aASUSTOR Inc.
Product-as602tdata_mastern/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-31446
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-29.95% / 96.49%
||
7 Day CHG-18.70%
Published-14 Jun, 2022 | 02:41
Updated-03 Aug, 2024 | 07:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Tenda AC18 router V15.03.05.19 and V15.03.05.05 was discovered to contain a remote code execution (RCE) vulnerability via the Mac parameter at ip/goform/WriteFacMac.

Action-Not Available
Vendor-n/aTenda Technology Co., Ltd.
Product-ac18_firmwareac18n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-31137
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-10||CRITICAL
EPSS-94.00% / 99.88%
||
7 Day CHG~0.00%
Published-08 Jul, 2022 | 00:00
Updated-22 Apr, 2025 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated Remote Code Execution in Roxy-WI

Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions prior to 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-roxy-wihap-wi
Product-roxy-wiroxy-wi
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-32054
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-21.69% / 95.52%
||
7 Day CHG~0.00%
Published-07 Jul, 2022 | 17:08
Updated-03 Aug, 2024 | 07:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Tenda AC10 US_AC10V1.0RTL_V15.03.06.26_multi_TD01 was discovered to contain a remote code execution (RCE) vulnerability via the lanIp parameter.

Action-Not Available
Vendor-n/aTenda Technology Co., Ltd.
Product-ac10ac10_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-31479
Matching Score-4
Assigner-Carrier Global Corporation
ShareView Details
Matching Score-4
Assigner-Carrier Global Corporation
CVSS Score-9.6||CRITICAL
EPSS-9.19% / 92.38%
||
7 Day CHG+2.25%
Published-06 Jun, 2022 | 16:36
Updated-16 Sep, 2024 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Remote Code Execution via command injection of the hostname

An unauthenticated attacker can update the hostname with a specially crafted name that will allow for shell commands to be executed during the core collection process. This vulnerability impacts products based on HID Mercury Intelligent Controllers LP1501, LP1502, LP2500, LP4502, and EP4502 which contain firmware versions prior to 1.302 for the LP series and 1.296 for the EP series. An attacker with this level of access on the device can monitor all communications sent to and from this device, modify onboard relays, change configuration files, or cause the device to become unstable. The injected commands only get executed during start up or when unsafe calls regarding the hostname are used. This allows the attacker to gain remote access to the device and can make their persistence permanent by modifying the filesystem.

Action-Not Available
Vendor-hidglobalcarrierLenelS2HID Mercury
Product-lenels2_lnl-x2210lp2500_firmwareep4502lp2500lenels2_s2-lp-2500lenels2_lnl-x2220lenels2_s2-lp-4502_firmwarelenels2_s2-lp-4502lenels2_lnl-x4420lenels2_lnl-x3300lenels2_lnl-x3300_firmwarelenels2_s2-lp-1502ep4502_firmwarelenels2_s2-lp-1502_firmwarelenels2_lnl-4420lenels2_lnl-x2220_firmwarelenels2_lnl-x4420_firmwarelenels2_lnl-4420_firmwarelenels2_s2-lp-2500_firmwarelenels2_s2-lp-1501lp4502lp1501lenels2_s2-lp-1501_firmwarelp1502lenels2_lnl-x2210_firmwarelp1501_firmwarelp4502_firmwarelp1502_firmwareLP2500LNL-X2210S2-LP-1502LNL-4420LP1502S2-LP-2500S2-LP-4502EP4502LP4502LP1501S2-LP-1501LNL-X3300LNL-X4420LNL-X2220
CWE ID-CWE-693
Protection Mechanism Failure
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-30309
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-9.8||CRITICAL
EPSS-0.65% / 69.87%
||
7 Day CHG~0.00%
Published-13 Jun, 2022 | 13:45
Updated-16 Sep, 2024 | 23:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FESTO: CECC-X-M1 and Servo Press Kit YJKP OS Command Injection vulnerability

In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-web-viewer-request-off" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.

Action-Not Available
Vendor-festoFesto
Product-controller_cecc-x-m1-mv-s1controller_cecc-x-m1controller_cecc-x-m1-ys-l2_firmwareservo_press_kit_yjkp_firmwareservo_press_kit_yjkp-controller_cecc-x-m1-ys-l1_firmwareservo_press_kit_yjkpcontroller_cecc-x-m1-mv_firmwarecontroller_cecc-x-m1-y-yjkpcontroller_cecc-x-m1-ys-l2controller_cecc-x-m1-mvcontroller_cecc-x-m1_firmwareservo_press_kit_yjkp-_firmwarecontroller_cecc-x-m1-y-yjkp_firmwarecontroller_cecc-x-m1-ys-l1controller_cecc-x-m1-mv-s1_firmwareController CECC-X-M1-MV (4407605)Controller CECC-X-M1-Y-YJKP (4803891)Controller CECC-X-M1 (8124922)Controller CECC-X-M1-MV-S1 (4407606)Controller CECC-X-M1-YS-L1 (8082793)Controller CECC-X-M1-MV (8124923)Controller CECC-X-M1-MV-S1 (8124924)Controller CECC-X-M1-YS-L2 (8082794)Servo Press Kit YJKP (8077950)Servo Press Kit YJKP- (8058596)Controller CECC-X-M1 (4407603)
CWE ID-CWE-863
Incorrect Authorization
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-1235
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-9.8||CRITICAL
EPSS-52.85% / 97.86%
||
7 Day CHG-3.59%
Published-29 May, 2018 | 17:00
Updated-16 Sep, 2024 | 19:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC RecoverPoint versions prior to 5.1.2 and RecoverPoint for VMs versions prior to 5.1.1.3, contain a command injection vulnerability. An unauthenticated remote attacker may potentially exploit this vulnerability to execute arbitrary commands on the affected system with root privilege.

Action-Not Available
Vendor-Dell Inc.ELAN Microelectronics Corporation
Product-recoverpoint_for_virtual_machinesrecoverpointDell EMC RecoverPointDell EMC RecoverPoint Virtual Machine (VM)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-1138
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-7.60% / 91.48%
||
7 Day CHG~0.00%
Published-20 Jan, 2021 | 20:11
Updated-12 Nov, 2024 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Smart Software Manager Satellite Web UI Command Injection Vulnerabilities

Multiple vulnerabilities in the web UI of Cisco Smart Software Manager Satellite could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-smart_software_manager_satelliteCisco Smart Software Manager On-Prem
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-30525
Matching Score-4
Assigner-Zyxel Corporation
ShareView Details
Matching Score-4
Assigner-Zyxel Corporation
CVSS Score-9.8||CRITICAL
EPSS-94.45% / 99.99%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 13:05
Updated-30 Jul, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-06-06||Apply updates per vendor instructions.

A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.

Action-Not Available
Vendor-Zyxel Networks Corporation
Product-usg_flex_500_firmwareusg_flex_50w_firmwareatp800atp500_firmwarevpn50_firmwarevpn1000_firmwarevpn300usg_flex_700atp100atp100_firmwareatp700vpn300_firmwareusg_flex_200atp100wusg_flex_50wusg_flex_700_firmwareusg_flex_500atp200usg20w-vpn_firmwarevpn1000usg20w-vpnatp200_firmwareusg_flex_100w_firmwareusg_flex_200_firmwarevpn50atp700_firmwareusg_flex_100wvpn100_firmwarevpn100atp100w_firmwareatp500atp800_firmwareUSG FLEX 100(W) firmwareUSG 20(W)-VPN firmwareUSG FLEX 700 firmwareUSG FLEX 500 firmwareUSG FLEX 200 firmwareVPN series firmwareUSG FLEX 50(W) firmwareATP series firmwareMultiple Firewalls
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-1140
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-7.60% / 91.48%
||
7 Day CHG~0.00%
Published-20 Jan, 2021 | 20:11
Updated-12 Nov, 2024 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Smart Software Manager Satellite Web UI Command Injection Vulnerabilities

Multiple vulnerabilities in the web UI of Cisco Smart Software Manager Satellite could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-smart_software_manager_satelliteCisco Smart Software Manager On-Prem
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-30308
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-9.8||CRITICAL
EPSS-0.51% / 65.60%
||
7 Day CHG~0.00%
Published-13 Jun, 2022 | 13:45
Updated-16 Sep, 2024 | 23:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FESTO: CECC-X-M1 and Servo Press Kit YJKP OS Command Injection vulnerability

In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-web-viewer-request-on" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.

Action-Not Available
Vendor-festoFesto
Product-controller_cecc-x-m1-mv-s1controller_cecc-x-m1controller_cecc-x-m1-ys-l2_firmwareservo_press_kit_yjkp_firmwareservo_press_kit_yjkp-controller_cecc-x-m1-ys-l1_firmwareservo_press_kit_yjkpcontroller_cecc-x-m1-mv_firmwarecontroller_cecc-x-m1-y-yjkpcontroller_cecc-x-m1-ys-l2controller_cecc-x-m1-mvcontroller_cecc-x-m1_firmwareservo_press_kit_yjkp-_firmwarecontroller_cecc-x-m1-y-yjkp_firmwarecontroller_cecc-x-m1-ys-l1controller_cecc-x-m1-mv-s1_firmwareController CECC-X-M1-MV (4407605)Controller CECC-X-M1-Y-YJKP (4803891)Controller CECC-X-M1 (8124922)Controller CECC-X-M1-MV-S1 (4407606)Controller CECC-X-M1-YS-L1 (8082793)Controller CECC-X-M1-MV (8124923)Controller CECC-X-M1-MV-S1 (8124924)Controller CECC-X-M1-YS-L2 (8082794)Servo Press Kit YJKP (8077950)Servo Press Kit YJKP- (8058596)Controller CECC-X-M1 (4407603)
CWE ID-CWE-863
Incorrect Authorization
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-1143
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-47.11% / 97.60%
||
7 Day CHG~0.00%
Published-19 Apr, 2018 | 13:00
Updated-17 Sep, 2024 | 04:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote unauthenticated user can execute commands as root in the Belkin N750 using firmware version 1.10.22 by sending a crafted HTTP request to twonky_command.cgi.

Action-Not Available
Vendor-Belkin International, Inc.
Product-n750_firmwaren750N750 DB Wi-Fi Dual-Band N+ Gigabit Router (F9K1103)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-30311
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-9.8||CRITICAL
EPSS-0.65% / 69.99%
||
7 Day CHG~0.00%
Published-13 Jun, 2022 | 13:45
Updated-17 Sep, 2024 | 00:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FESTO: CECC-X-M1 and Servo Press Kit YJKP OS Command Injection vulnerability

In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-refresh-request" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.

Action-Not Available
Vendor-festoFesto
Product-controller_cecc-x-m1-mv-s1controller_cecc-x-m1controller_cecc-x-m1-ys-l2_firmwareservo_press_kit_yjkp_firmwareservo_press_kit_yjkp-controller_cecc-x-m1-ys-l1_firmwareservo_press_kit_yjkpcontroller_cecc-x-m1-mv_firmwarecontroller_cecc-x-m1-y-yjkpcontroller_cecc-x-m1-ys-l2controller_cecc-x-m1-mvcontroller_cecc-x-m1_firmwareservo_press_kit_yjkp-_firmwarecontroller_cecc-x-m1-y-yjkp_firmwarecontroller_cecc-x-m1-ys-l1controller_cecc-x-m1-mv-s1_firmwareController CECC-X-M1-MV (4407605)Controller CECC-X-M1-Y-YJKP (4803891)Controller CECC-X-M1 (8124922)Controller CECC-X-M1-MV-S1 (4407606)Controller CECC-X-M1-YS-L1 (8082793)Controller CECC-X-M1-MV (8124923)Controller CECC-X-M1-MV-S1 (8124924)Controller CECC-X-M1-YS-L2 (8082794)Servo Press Kit YJKP (8077950)Servo Press Kit YJKP- (8058596)Controller CECC-X-M1 (4407603)
CWE ID-CWE-863
Incorrect Authorization
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-11138
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-86.83% / 99.39%
||
7 Day CHG~0.00%
Published-31 May, 2018 | 18:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-04-15||Apply updates per vendor instructions.

The '/common/download_agent_installer.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by anonymous users and can be abused to execute arbitrary commands on the system.

Action-Not Available
Vendor-n/aQuest Software, Inc.
Product-kace_system_management_appliancen/aKACE System Management Appliance
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-30105
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.58% / 87.28%
||
7 Day CHG~0.00%
Published-18 May, 2022 | 15:52
Updated-03 Aug, 2024 | 06:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Belkin N300 Firmware 1.00.08, the script located at /setting_hidden.asp, which is accessible before and after configuring the device, exhibits multiple remote command injection vulnerabilities. The following parameters in the [form name] form; [list vulnerable parameters], are not properly sanitized after being submitted to the web interface in a POST request. With specially crafted parameters, it is possible to inject a an OS command which will be executed with root privileges, as the web interface, and all processes on the device, run as root.

Action-Not Available
Vendor-n/aBelkin International, Inc.
Product-n300n300_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-1144
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-30.12% / 96.51%
||
7 Day CHG~0.00%
Published-19 Apr, 2018 | 13:00
Updated-16 Sep, 2024 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote unauthenticated user can execute commands as root in the Belkin N750 using firmware version 1.10.22 by sending a crafted HTTP request to proxy.cgi.

Action-Not Available
Vendor-Belkin International, Inc.
Product-n750_firmwaren750N750 DB Wi-Fi Dual-Band N+ Gigabit Router (F9K1103)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-1497
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-94.36% / 99.96%
||
7 Day CHG~0.00%
Published-06 May, 2021 | 12:41
Updated-30 Jul, 2025 | 01:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2021-11-17||Apply updates per vendor instructions.
Cisco HyperFlex HX Command Injection Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-hyperflex_hx220c_af_m5hyperflex_hx220c_m5hyperflex_hx_data_platformhyperflex_hx240chyperflex_hx240c_af_m5hyperflex_hx220c_edge_m5hyperflex_hx220c_all_nvme_m5hyperflex_hx240c_m5Cisco HyperFlex HX Data PlatformHyperFlex HX
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-1142
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-6.67% / 90.85%
||
7 Day CHG~0.00%
Published-20 Jan, 2021 | 20:11
Updated-12 Nov, 2024 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Smart Software Manager Satellite Web UI Command Injection Vulnerabilities

Multiple vulnerabilities in the web UI of Cisco Smart Software Manager Satellite could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-smart_software_manager_satelliteCisco Smart Software Manager On-Prem
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-28909
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-10.29% / 92.88%
||
7 Day CHG~0.00%
Published-10 May, 2022 | 13:17
Updated-03 Aug, 2024 | 06:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TOTOLink N600R V5.3c.7159_B20190425 was discovered to contain a command injection vulnerability via the webwlanidx parameter in /setting/setWebWlanIdx.

Action-Not Available
Vendor-n/aTOTOLINK
Product-n600r_firmwaren600rn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-28901
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-33.42% / 96.78%
||
7 Day CHG~0.00%
Published-10 May, 2022 | 13:17
Updated-03 Aug, 2024 | 06:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A command injection vulnerability in the component /SetTriggerLEDBlink/Blink of D-Link DIR882 DIR882A1_FW130B06 allows attackers to escalate privileges to root via a crafted payload.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-882_firmwaredir-882n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-28584
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-20.87% / 95.41%
||
7 Day CHG~0.00%
Published-05 May, 2022 | 17:26
Updated-03 Aug, 2024 | 05:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It is found that there is a command injection vulnerability in the setWiFiWpsStart interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows an attacker to execute arbitrary commands through a carefully constructed payload.

Action-Not Available
Vendor-n/aTOTOLINK
Product-a7100rua7100ru_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-28912
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-11.61% / 93.39%
||
7 Day CHG~0.00%
Published-10 May, 2022 | 13:17
Updated-03 Aug, 2024 | 06:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TOTOLink N600R V5.3c.7159_B20190425 was discovered to contain a command injection vulnerability via the filename parameter in /setting/setUpgradeFW.

Action-Not Available
Vendor-n/aTOTOLINK
Product-n600r_firmwaren600rn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-28906
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-11.61% / 93.39%
||
7 Day CHG~0.00%
Published-10 May, 2022 | 13:16
Updated-03 Aug, 2024 | 06:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TOTOLink N600R V5.3c.7159_B20190425 was discovered to contain a command injection vulnerability via the langtype parameter in /setting/setLanguageCfg.

Action-Not Available
Vendor-n/aTOTOLINK
Product-n600r_firmwaren600rn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-28910
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-11.61% / 93.39%
||
7 Day CHG~0.00%
Published-10 May, 2022 | 13:17
Updated-03 Aug, 2024 | 06:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TOTOLink N600R V5.3c.7159_B20190425 was discovered to contain a command injection vulnerability via the devicename parameter in /setting/setDeviceName.

Action-Not Available
Vendor-n/aTOTOLINK
Product-n600r_firmwaren600rn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2014-2650
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-5.27% / 89.62%
||
7 Day CHG~0.00%
Published-09 Jan, 2020 | 13:00
Updated-06 Aug, 2024 | 10:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unify OpenStage / OpenScape Desk Phone IP before V3 R3.11.0 SIP has an OS command injection vulnerability in the web based management interface

Action-Not Available
Vendor-atosn/a
Product-openstage_80_gopenstage_40_g_firmwareopenstage_20_g_firmwareopenscape_desk_phone_ip_55gopenstage_15openscape_desk_phone_ip_35g_eco_firmwareopenstage_80_firmwareopenstage_60openstage_20_gopenstage_40openstage_20_eopenstage_40_gopenstage_15_g_firmwareopenstage_15_gopenscape_desk_phone_ip_35g_firmwareopenstage_80openstage_60_gopenstage_20_e_firmwareopenstage_20_firmwareopenstage_15_firmwareopenstage_5openscape_desk_phone_ip_35gopenstage_60_g_firmwareopenstage_40_firmwareopenscape_desk_phone_ip_35g_ecoopenstage_20openscape_desk_phone_ip_55g_firmwareopenstage_80_g_firmwareopenstage_5_firmwareopenstage_60_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-29592
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-19.87% / 95.23%
||
7 Day CHG~0.00%
Published-05 May, 2022 | 15:51
Updated-03 Aug, 2024 | 06:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Tenda TX9 Pro 22.03.02.10 devices allow OS command injection via set_route (called by doSystemCmd_route).

Action-Not Available
Vendor-n/aTenda Technology Co., Ltd.
Product-tx9_pro_firmwaretx9_pron/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-31794
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-13.27% / 93.89%
||
7 Day CHG~0.00%
Published-20 Jun, 2022 | 14:38
Updated-03 Aug, 2024 | 07:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Fujitsu ETERNUS CentricStor CS8000 (Control Center) devices before 8.1A SP02 P04. The vulnerability resides in the requestTempFile function in hw_view.php. An attacker is able to influence the unitName POST parameter and inject special characters such as semicolons, backticks, or command-substitution sequences in order to force the application to execute arbitrary commands.

Action-Not Available
Vendor-n/aFujitsu Limited
Product-eternus_cs8000eternus_cs8000_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-28580
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-20.87% / 95.41%
||
7 Day CHG~0.00%
Published-05 May, 2022 | 17:40
Updated-03 Aug, 2024 | 05:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It is found that there is a command injection vulnerability in the setL2tpServerCfg interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows an attacker to execute arbitrary commands through a carefully constructed payload.

Action-Not Available
Vendor-n/aTOTOLINK
Product-a7100rua7100ru_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-28913
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-11.61% / 93.39%
||
7 Day CHG~0.00%
Published-10 May, 2022 | 13:17
Updated-03 Aug, 2024 | 06:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TOTOLink N600R V5.3c.7159_B20190425 was discovered to contain a command injection vulnerability via the filename parameter in /setting/setUploadSetting.

Action-Not Available
Vendor-n/aTOTOLINK
Product-n600r_firmwaren600rn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-28908
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-11.61% / 93.39%
||
7 Day CHG~0.00%
Published-10 May, 2022 | 13:16
Updated-03 Aug, 2024 | 06:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TOTOLink N600R V5.3c.7159_B20190425 was discovered to contain a command injection vulnerability via the ipdoamin parameter in /setting/setDiagnosisCfg.

Action-Not Available
Vendor-n/aTOTOLINK
Product-n600r_firmwaren600rn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-28573
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-51.41% / 97.80%
||
7 Day CHG~0.00%
Published-02 May, 2022 | 13:06
Updated-03 Aug, 2024 | 05:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

D-Link DIR-823-Pro v1.0.2 was discovered to contain a command injection vulnerability in the function SetNTPserverSeting. This vulnerability allows attackers to execute arbitrary commands via the system_time_timezone parameter.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-823_pro_firmwaredir-823_pron/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-28578
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-20.87% / 95.41%
||
7 Day CHG~0.00%
Published-05 May, 2022 | 17:36
Updated-03 Aug, 2024 | 05:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It is found that there is a command injection vulnerability in the setOpenVpnCfg interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows an attacker to execute arbitrary commands through a carefully constructed payload.

Action-Not Available
Vendor-n/aTOTOLINK
Product-a7100rua7100ru_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-28905
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-11.61% / 93.39%
||
7 Day CHG~0.00%
Published-10 May, 2022 | 13:16
Updated-03 Aug, 2024 | 06:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TOTOLink N600R V5.3c.7159_B20190425 was discovered to contain a command injection vulnerability via the devicemac parameter in /setting/setDeviceName.

Action-Not Available
Vendor-n/aTOTOLINK
Product-n600r_firmwaren600rn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-0265
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-8.1||HIGH
EPSS-5.43% / 89.79%
||
7 Day CHG~0.00%
Published-22 Apr, 2021 | 19:37
Updated-16 Sep, 2024 | 18:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Contrail Insights: The REST API implementation allows an unauthenticated remote attacker to execute commands as root.

An unvalidated REST API in the AppFormix Agent of Juniper Networks AppFormix allows an unauthenticated remote attacker to execute commands as root on the host running the AppFormix Agent, when certain preconditions are performed by the attacker, thus granting the attacker full control over the environment. This issue affects: Juniper Networks AppFormix 3 versions prior to 3.1.22, 3.2.14, 3.3.0.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-appformixContrail Insights
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-29516
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-1.90% / 82.48%
||
7 Day CHG~0.00%
Published-18 May, 2022 | 09:50
Updated-03 Aug, 2024 | 06:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web console of FUJITSU Network IPCOM series (IPCOM EX2 IN(3200, 3500), IPCOM EX2 LB(1100, 3200, 3500), IPCOM EX2 SC(1100, 3200, 3500), IPCOM EX2 NW(1100, 3200, 3500), IPCOM EX2 DC, IPCOM EX2 DC, IPCOM EX IN(2300, 2500, 2700), IPCOM EX LB(1100, 1300, 2300, 2500, 2700), IPCOM EX SC(1100, 1300, 2300, 2500, 2700), and IPCOM EX NW(1100, 1300, 2300, 2500, 2700)) allows a remote attacker to execute an arbitrary OS command via unspecified vectors.

Action-Not Available
Vendor-Fujitsu Limited
Product-ipcom_ex_in_2500_firmwareipcom_ex2_lb_3500ipcom_ex_lb_1300_firmwareipcom_ex_lb_2500_firmwareipcom_ex_in_2300_firmwareipcom_ex_nw_1100_firmwareipcom_ex_nw_2300_firmwareipcom_ex_sc_1300_firmwareipcom_ex2_sc_1100_firmwareipcom_ex_lb_1100ipcom_ve2_sc_plus_200ipcom_ex2_lb_1100ipcom_ex2_nw_3200_firmwareipcom_ex2_dc_3200_firmwareipcom_ex2_nw_1100ipcom_ve2_ls_plus_100_firmwareipcom_ex_sc_2500ipcom_ex_sc_2700ipcom_ex_nw_2300ipcom_ex_in_2700_firmwareipcom_ex2_in_3500_firmwareipcom_ve2_ls_plus2_200_firmwareipcom_ve2_ls_200ipcom_ex_lb_2300_firmwareipcom_ex_nw_1100ipcom_ex2_nw_3500_firmwareipcom_ex_nw_2500_firmwareipcom_ex2_sc_3500ipcom_ex2_in_3500ipcom_ex_nw_2700ipcom_ve2_ls_plus_200_firmwareipcom_ve2_sc_plus_200_firmwareipcom_ex2_in_3200_firmwareipcom_ex2_dc_3500ipcom_ex_lb_1300ipcom_ex2_lb_3500_firmwareipcom_ex_lb_2300ipcom_ve2_ls_200_firmwareipcom_ex2_dc_3500_firmwareipcom_ex_in_2300ipcom_ex_sc_1100ipcom_ve2_sc_220_firmwareipcom_ex2_dc_3200ipcom_ex_sc_1300ipcom_ve2_sc_plus_220ipcom_ex_nw_2700_firmwareipcom_ex_lb_2500ipcom_ex_sc_1100_firmwareipcom_ex_sc_2300_firmwareipcom_ve2_ls_100_firmwareipcom_ex2_lb_3200_firmwareipcom_ex2_lb_3200ipcom_ex_sc_2500_firmwareipcom_ex2_lb_1100_firmwareipcom_ex_sc_2300ipcom_ve2_ls_plus_200ipcom_ex2_in_1100ipcom_ve2_ls_220ipcom_ex2_sc_3200ipcom_ex_lb_1100_firmwareipcom_ex2_nw_3200ipcom_ex2_nw_1100_firmwareipcom_ve2_ls_plus_220_firmwareipcom_ex_nw_1300_firmwareipcom_ex_nw_2500ipcom_ve2_ls_plus2_200ipcom_ve2_ls_plus_220ipcom_ex2_in_1100_firmwareipcom_ve2_ls_100ipcom_ve2_sc_200ipcom_ve2_ls_220_firmwareipcom_ex2_sc_3500_firmwareipcom_ve2_sc_plus_100_firmwareipcom_ve2_ls_plus_100ipcom_ex2_sc_1100ipcom_ex2_sc_3200_firmwareipcom_ex_lb_2700ipcom_ve2_sc_100ipcom_ex_lb_2700_firmwareipcom_ex_sc_2700_firmwareipcom_ex_in_2500ipcom_ex2_in_3200ipcom_ve2_ls_plus2_220ipcom_ex_in_2700ipcom_ve2_ls_plus2_220_firmwareipcom_ve2_sc_plus_220_firmwareipcom_ve2_sc_100_firmwareipcom_ex2_nw_3500ipcom_ve2_sc_200_firmwareipcom_ve2_sc_220ipcom_ve2_sc_plus_100ipcom_ex_nw_1300IPCOM EX2 series, IPCOM EX series, IPCOM VE2 series, and IPCOM VA2/VE1 series
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-24719
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-7.53% / 91.43%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 20:31
Updated-04 Aug, 2024 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Exposed Erlang Cookie could lead to Remote Command Execution (RCE) attack. Communication between Erlang nodes is done by exchanging a shared secret (aka "magic cookie"). There are cases where the magic cookie is included in the content of the logs. An attacker can use the cookie to attach to an Erlang node and run OS level commands on the system running the Erlang node. Affects version: 6.5.1. Fix version: 6.6.0.

Action-Not Available
Vendor-n/aCouchbase, Inc.
Product-couchbase_servern/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-28907
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-11.61% / 93.39%
||
7 Day CHG~0.00%
Published-10 May, 2022 | 13:16
Updated-03 Aug, 2024 | 06:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TOTOLink N600R V5.3c.7159_B20190425 was discovered to contain a command injection vulnerability via the hosttime function in /setting/NTPSyncWithHost.

Action-Not Available
Vendor-n/aTOTOLINK
Product-n600r_firmwaren600rn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-29539
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.17% / 83.65%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 14:15
Updated-03 Aug, 2024 | 06:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

resi-calltrace in RESI Gemini-Net 4.2 is affected by OS Command Injection. It does not properly check the parameters sent as input before they are processed on the server. Due to the lack of validation of user input, an unauthenticated attacker can bypass the syntax intended by the software (e.g., concatenate `&|;\r\ commands) and inject arbitrary system commands with the privileges of the application user.

Action-Not Available
Vendor-resin/a
Product-gemini-netn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2022-28575
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-20.87% / 95.41%
||
7 Day CHG~0.00%
Published-05 May, 2022 | 17:28
Updated-03 Aug, 2024 | 05:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It is found that there is a command injection vulnerability in the setopenvpnclientcfg interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows attackers to execute arbitrary commands through a carefully constructed payload

Action-Not Available
Vendor-n/aTOTOLINK
Product-a7100rua7100ru_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-1000666
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.79% / 87.62%
||
7 Day CHG~0.00%
Published-06 Sep, 2018 | 17:00
Updated-05 Aug, 2024 | 12:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

GIG Technology NV JumpScale Portal 7 version before commit 15443122ed2b1cbfd7bdefc048bf106f075becdb contains a CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in method: notifySpaceModification; that can result in Improper validation of parameters results in command execution. This attack appear to be exploitable via Network connectivity, required minimal auth privileges (everyone can register an account). This vulnerability appears to have been fixed in After commit 15443122ed2b1cbfd7bdefc048bf106f075becdb.

Action-Not Available
Vendor-gigopenvcloud_projectn/a
Product-jumpscaleopenvcloudn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • ...
  • 11
  • 12
  • Next
Details not found