Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2014-6277

Summary
Assigner-debian
Assigner Org ID-79363d38-fa19-49d1-9214-5f28da3f3ac5
Published At-27 Sep, 2014 | 22:00
Updated At-06 Aug, 2024 | 12:10
Rejected At-
Credits

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:debian
Assigner Org ID:79363d38-fa19-49d1-9214-5f28da3f3ac5
Published At:27 Sep, 2014 | 22:00
Updated At:06 Aug, 2024 | 12:10
Rejected At:
▼CVE Numbering Authority (CNA)

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21685749
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141577137423233&w=2
vendor-advisory
x_refsource_HP
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
x_refsource_CONFIRM
http://linux.oracle.com/errata/ELSA-2014-3093
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142721162228379&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=142358026505815&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=swg21686479
x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN55667175/index.html
third-party-advisory
x_refsource_JVN
http://secunia.com/advisories/60433
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141383026420882&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=141585637922673&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=141576728022234&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=swg21685541
x_refsource_CONFIRM
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
x_refsource_CONFIRM
http://secunia.com/advisories/61816
third-party-advisory
x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
vendor-advisory
x_refsource_SUSE
http://secunia.com/advisories/61442
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142358078406056&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61283
third-party-advisory
x_refsource_SECUNIA
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
vendor-advisory
x_refsource_APPLE
https://kc.mcafee.com/corporate/index?page=content&id=SB10085
x_refsource_CONFIRM
http://secunia.com/advisories/61654
third-party-advisory
x_refsource_SECUNIA
http://www.ubuntu.com/usn/USN-2380-1
vendor-advisory
x_refsource_UBUNTU
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
x_refsource_CONFIRM
http://secunia.com/advisories/62312
third-party-advisory
x_refsource_SECUNIA
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141879528318582&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=swg21685604
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61703
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61065
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141383196021590&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=141383081521087&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=swg21686445
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21686131
x_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
third-party-advisory
x_refsource_JVNDB
http://marc.info/?l=bugtraq&m=141879528318582&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61641
third-party-advisory
x_refsource_SECUNIA
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
vendor-advisory
x_refsource_SUSE
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21685914
x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
vendor-advisory
x_refsource_MANDRIVA
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
x_refsource_CONFIRM
https://support.apple.com/HT205267
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142721162228379&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/60325
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/60024
third-party-advisory
x_refsource_SECUNIA
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
x_refsource_MISC
http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
x_refsource_MISC
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
vendor-advisory
x_refsource_CISCO
http://secunia.com/advisories/62343
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61565
third-party-advisory
x_refsource_SECUNIA
https://www.suse.com/support/shellshock/
x_refsource_CONFIRM
http://support.apple.com/HT204244
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141450491804793&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61313
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=142289270617409&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=142358026505815&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61485
third-party-advisory
x_refsource_SECUNIA
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141577297623641&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141383244821813&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61312
third-party-advisory
x_refsource_SECUNIA
http://linux.oracle.com/errata/ELSA-2014-3094
x_refsource_CONFIRM
http://secunia.com/advisories/60193
third-party-advisory
x_refsource_SECUNIA
http://www.vmware.com/security/advisories/VMSA-2014-0010.html
x_refsource_CONFIRM
http://secunia.com/advisories/60063
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/60034
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59907
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/58200
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141577241923505&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61643
third-party-advisory
x_refsource_SECUNIA
http://www.novell.com/support/kb/doc.php?id=7015721
x_refsource_CONFIRM
http://www-01.ibm.com/support/docview.wss?uid=swg21687079
x_refsource_CONFIRM
http://secunia.com/advisories/61503
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=swg21686246
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=142289270617409&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141383465822787&w=2
vendor-advisory
x_refsource_HP
http://www.qnap.com/i/en/support/con_show.php?cid=61
x_refsource_CONFIRM
http://secunia.com/advisories/61552
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61780
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
x_refsource_CONFIRM
https://support.citrix.com/article/CTX200223
x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=141330468527613&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/60044
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61291
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141345648114150&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61287
third-party-advisory
x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=141383353622268&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
x_refsource_CONFIRM
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
vendor-advisory
x_refsource_APPLE
http://marc.info/?l=bugtraq&m=141383304022067&w=2
vendor-advisory
x_refsource_HP
http://secunia.com/advisories/61128
third-party-advisory
x_refsource_SECUNIA
https://support.citrix.com/article/CTX200217
x_refsource_CONFIRM
http://secunia.com/advisories/61471
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/60055
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/59961
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61550
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61633
third-party-advisory
x_refsource_SECUNIA
http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
x_refsource_MISC
http://www-01.ibm.com/support/docview.wss?uid=swg21686494
x_refsource_CONFIRM
http://support.novell.com/security/cve/CVE-2014-6277.html
x_refsource_CONFIRM
https://kb.bluecoat.com/index?page=content&id=SA82
x_refsource_CONFIRM
http://secunia.com/advisories/61328
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=swg21685733
x_refsource_CONFIRM
http://secunia.com/advisories/61129
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61603
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/61857
third-party-advisory
x_refsource_SECUNIA
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685749
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141577137423233&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
Resource:
x_refsource_CONFIRM
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3093
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686479
Resource:
x_refsource_CONFIRM
Hyperlink: http://jvn.jp/en/jp/JVN55667175/index.html
Resource:
third-party-advisory
x_refsource_JVN
Hyperlink: http://secunia.com/advisories/60433
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=141383026420882&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=141585637922673&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=141576728022234&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685541
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61816
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://secunia.com/advisories/61442
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=142358078406056&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61283
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10085
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61654
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.ubuntu.com/usn/USN-2380-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/62312
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685604
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61703
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61065
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=141383196021590&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=141383081521087&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686445
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686131
Resource:
x_refsource_CONFIRM
Hyperlink: http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
Resource:
third-party-advisory
x_refsource_JVNDB
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61641
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685914
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
Resource:
x_refsource_CONFIRM
Hyperlink: https://support.apple.com/HT205267
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/60325
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/60024
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
Resource:
x_refsource_MISC
Hyperlink: http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
Resource:
x_refsource_MISC
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: http://secunia.com/advisories/62343
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61565
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://www.suse.com/support/shellshock/
Resource:
x_refsource_CONFIRM
Hyperlink: http://support.apple.com/HT204244
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141450491804793&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61313
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61485
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141577297623641&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141383244821813&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61312
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3094
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/60193
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0010.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/60063
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/60034
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59907
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/58200
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=141577241923505&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61643
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.novell.com/support/kb/doc.php?id=7015721
Resource:
x_refsource_CONFIRM
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21687079
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61503
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686246
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141383465822787&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www.qnap.com/i/en/support/con_show.php?cid=61
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61552
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61780
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
Resource:
x_refsource_CONFIRM
Hyperlink: https://support.citrix.com/article/CTX200223
Resource:
x_refsource_CONFIRM
Hyperlink: http://marc.info/?l=bugtraq&m=141330468527613&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/60044
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61291
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=141345648114150&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61287
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://marc.info/?l=bugtraq&m=141383353622268&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
Hyperlink: http://marc.info/?l=bugtraq&m=141383304022067&w=2
Resource:
vendor-advisory
x_refsource_HP
Hyperlink: http://secunia.com/advisories/61128
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://support.citrix.com/article/CTX200217
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61471
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/60055
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/59961
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61550
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61633
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
Resource:
x_refsource_MISC
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686494
Resource:
x_refsource_CONFIRM
Hyperlink: http://support.novell.com/security/cve/CVE-2014-6277.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://kb.bluecoat.com/index?page=content&id=SA82
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61328
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685733
Resource:
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/61129
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61603
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/61857
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21685749
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141577137423233&w=2
vendor-advisory
x_refsource_HP
x_transferred
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
x_refsource_CONFIRM
x_transferred
http://linux.oracle.com/errata/ELSA-2014-3093
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=142721162228379&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=142358026505815&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686479
x_refsource_CONFIRM
x_transferred
http://jvn.jp/en/jp/JVN55667175/index.html
third-party-advisory
x_refsource_JVN
x_transferred
http://secunia.com/advisories/60433
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=141383026420882&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=141585637922673&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=141576728022234&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21685541
x_refsource_CONFIRM
x_transferred
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61816
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://secunia.com/advisories/61442
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=142358078406056&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61283
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
vendor-advisory
x_refsource_APPLE
x_transferred
https://kc.mcafee.com/corporate/index?page=content&id=SB10085
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61654
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.ubuntu.com/usn/USN-2380-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/62312
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141879528318582&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21685604
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61703
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61065
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=141383196021590&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=141383081521087&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686445
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686131
x_refsource_CONFIRM
x_transferred
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
third-party-advisory
x_refsource_JVNDB
x_transferred
http://marc.info/?l=bugtraq&m=141879528318582&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61641
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21685914
x_refsource_CONFIRM
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
vendor-advisory
x_refsource_MANDRIVA
x_transferred
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
x_refsource_CONFIRM
x_transferred
https://support.apple.com/HT205267
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=142721162228379&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/60325
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/60024
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
x_refsource_MISC
x_transferred
http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
x_refsource_MISC
x_transferred
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
vendor-advisory
x_refsource_CISCO
x_transferred
http://secunia.com/advisories/62343
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61565
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://www.suse.com/support/shellshock/
x_refsource_CONFIRM
x_transferred
http://support.apple.com/HT204244
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141450491804793&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61313
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=142289270617409&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=142358026505815&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61485
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141577297623641&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141383244821813&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61312
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://linux.oracle.com/errata/ELSA-2014-3094
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/60193
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.vmware.com/security/advisories/VMSA-2014-0010.html
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/60063
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/60034
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59907
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/58200
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=141577241923505&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61643
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.novell.com/support/kb/doc.php?id=7015721
x_refsource_CONFIRM
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21687079
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61503
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686246
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=142289270617409&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141383465822787&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www.qnap.com/i/en/support/con_show.php?cid=61
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61552
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61780
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
x_refsource_CONFIRM
x_transferred
https://support.citrix.com/article/CTX200223
x_refsource_CONFIRM
x_transferred
http://marc.info/?l=bugtraq&m=141330468527613&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/60044
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61291
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=141345648114150&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61287
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://marc.info/?l=bugtraq&m=141383353622268&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://marc.info/?l=bugtraq&m=142118135300698&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
x_refsource_CONFIRM
x_transferred
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
vendor-advisory
x_refsource_APPLE
x_transferred
http://marc.info/?l=bugtraq&m=141383304022067&w=2
vendor-advisory
x_refsource_HP
x_transferred
http://secunia.com/advisories/61128
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://support.citrix.com/article/CTX200217
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61471
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/60055
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/59961
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61550
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61633
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
x_refsource_MISC
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21686494
x_refsource_CONFIRM
x_transferred
http://support.novell.com/security/cve/CVE-2014-6277.html
x_refsource_CONFIRM
x_transferred
https://kb.bluecoat.com/index?page=content&id=SA82
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61328
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=swg21685733
x_refsource_CONFIRM
x_transferred
http://secunia.com/advisories/61129
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61603
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/61857
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685749
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141577137423233&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3093
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686479
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://jvn.jp/en/jp/JVN55667175/index.html
Resource:
third-party-advisory
x_refsource_JVN
x_transferred
Hyperlink: http://secunia.com/advisories/60433
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383026420882&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141585637922673&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141576728022234&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685541
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61816
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://secunia.com/advisories/61442
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142358078406056&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61283
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10085
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61654
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.ubuntu.com/usn/USN-2380-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/62312
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685604
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61703
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61065
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383196021590&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383081521087&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686445
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686131
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
Resource:
third-party-advisory
x_refsource_JVNDB
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61641
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685914
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://support.apple.com/HT205267
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/60325
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/60024
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: http://secunia.com/advisories/62343
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61565
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://www.suse.com/support/shellshock/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.apple.com/HT204244
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141450491804793&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61313
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61485
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141577297623641&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383244821813&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61312
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3094
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/60193
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0010.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/60063
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/60034
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59907
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/58200
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141577241923505&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61643
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.novell.com/support/kb/doc.php?id=7015721
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21687079
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61503
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686246
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383465822787&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www.qnap.com/i/en/support/con_show.php?cid=61
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61552
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61780
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://support.citrix.com/article/CTX200223
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141330468527613&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/60044
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61291
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141345648114150&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61287
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383353622268&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
Resource:
vendor-advisory
x_refsource_APPLE
x_transferred
Hyperlink: http://marc.info/?l=bugtraq&m=141383304022067&w=2
Resource:
vendor-advisory
x_refsource_HP
x_transferred
Hyperlink: http://secunia.com/advisories/61128
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://support.citrix.com/article/CTX200217
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61471
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/60055
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/59961
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61550
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61633
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686494
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.novell.com/security/cve/CVE-2014-6277.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://kb.bluecoat.com/index?page=content&id=SA82
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61328
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685733
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/61129
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61603
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/61857
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@debian.org
Published At:27 Sep, 2014 | 22:55
Updated At:12 Apr, 2025 | 10:46

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 10.0
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

GNU
gnu
>>bash>>1.14.0
cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.1
cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.2
cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.3
cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.4
cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.5
cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.6
cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*
GNU
gnu
>>bash>>1.14.7
cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.0
cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.01
cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.01.1
cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.02
cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.02.1
cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.03
cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.04
cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.05
cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*
GNU
gnu
>>bash>>2.05
cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*
GNU
gnu
>>bash>>2.05
cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*
GNU
gnu
>>bash>>3.0
cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*
GNU
gnu
>>bash>>3.0.16
cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*
GNU
gnu
>>bash>>3.1
cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*
GNU
gnu
>>bash>>3.2
cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*
GNU
gnu
>>bash>>3.2.48
cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*
GNU
gnu
>>bash>>4.0
cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*
GNU
gnu
>>bash>>4.0
cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*
GNU
gnu
>>bash>>4.1
cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*
GNU
gnu
>>bash>>4.2
cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*
GNU
gnu
>>bash>>4.3
cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-78Primarynvd@nist.gov
CWE ID: CWE-78
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://jvn.jp/en/jp/JVN55667175/index.htmlsecurity@debian.org
N/A
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126security@debian.org
N/A
http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.htmlsecurity@debian.org
Exploit
Patch
http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.htmlsecurity@debian.org
N/A
http://linux.oracle.com/errata/ELSA-2014-3093security@debian.org
N/A
http://linux.oracle.com/errata/ELSA-2014-3094security@debian.org
N/A
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.htmlsecurity@debian.org
N/A
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.htmlsecurity@debian.org
N/A
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.htmlsecurity@debian.org
N/A
http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.htmlsecurity@debian.org
N/A
http://marc.info/?l=bugtraq&m=141330468527613&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141345648114150&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383026420882&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383081521087&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383196021590&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383244821813&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383304022067&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383353622268&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141383465822787&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141450491804793&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141576728022234&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141577137423233&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141577241923505&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141577297623641&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141585637922673&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141879528318582&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=141879528318582&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142289270617409&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142289270617409&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142358026505815&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142358026505815&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142358078406056&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142721162228379&w=2security@debian.org
N/A
http://marc.info/?l=bugtraq&m=142721162228379&w=2security@debian.org
N/A
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.htmlsecurity@debian.org
N/A
http://secunia.com/advisories/58200security@debian.org
N/A
http://secunia.com/advisories/59907security@debian.org
N/A
http://secunia.com/advisories/59961security@debian.org
N/A
http://secunia.com/advisories/60024security@debian.org
N/A
http://secunia.com/advisories/60034security@debian.org
N/A
http://secunia.com/advisories/60044security@debian.org
N/A
http://secunia.com/advisories/60055security@debian.org
N/A
http://secunia.com/advisories/60063security@debian.org
N/A
http://secunia.com/advisories/60193security@debian.org
N/A
http://secunia.com/advisories/60325security@debian.org
N/A
http://secunia.com/advisories/60433security@debian.org
N/A
http://secunia.com/advisories/61065security@debian.org
N/A
http://secunia.com/advisories/61128security@debian.org
N/A
http://secunia.com/advisories/61129security@debian.org
N/A
http://secunia.com/advisories/61283security@debian.org
N/A
http://secunia.com/advisories/61287security@debian.org
N/A
http://secunia.com/advisories/61291security@debian.org
N/A
http://secunia.com/advisories/61312security@debian.org
N/A
http://secunia.com/advisories/61313security@debian.org
N/A
http://secunia.com/advisories/61328security@debian.org
N/A
http://secunia.com/advisories/61442security@debian.org
N/A
http://secunia.com/advisories/61471security@debian.org
N/A
http://secunia.com/advisories/61485security@debian.org
N/A
http://secunia.com/advisories/61503security@debian.org
N/A
http://secunia.com/advisories/61550security@debian.org
N/A
http://secunia.com/advisories/61552security@debian.org
N/A
http://secunia.com/advisories/61565security@debian.org
N/A
http://secunia.com/advisories/61603security@debian.org
N/A
http://secunia.com/advisories/61633security@debian.org
N/A
http://secunia.com/advisories/61641security@debian.org
N/A
http://secunia.com/advisories/61643security@debian.org
N/A
http://secunia.com/advisories/61654security@debian.org
N/A
http://secunia.com/advisories/61703security@debian.org
N/A
http://secunia.com/advisories/61780security@debian.org
N/A
http://secunia.com/advisories/61816security@debian.org
N/A
http://secunia.com/advisories/61857security@debian.org
N/A
http://secunia.com/advisories/62312security@debian.org
N/A
http://secunia.com/advisories/62343security@debian.org
N/A
http://support.apple.com/HT204244security@debian.org
N/A
http://support.novell.com/security/cve/CVE-2014-6277.htmlsecurity@debian.org
N/A
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bashsecurity@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685541security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685604security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685733security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685749security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685914security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686131security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686246security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686445security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686479security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686494security@debian.org
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21687079security@debian.org
N/A
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315security@debian.org
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164security@debian.org
N/A
http://www.novell.com/support/kb/doc.php?id=7015721security@debian.org
N/A
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.htmlsecurity@debian.org
N/A
http://www.qnap.com/i/en/support/con_show.php?cid=61security@debian.org
N/A
http://www.ubuntu.com/usn/USN-2380-1security@debian.org
N/A
http://www.vmware.com/security/advisories/VMSA-2014-0010.htmlsecurity@debian.org
N/A
https://kb.bluecoat.com/index?page=content&id=SA82security@debian.org
N/A
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648security@debian.org
N/A
https://kc.mcafee.com/corporate/index?page=content&id=SB10085security@debian.org
N/A
https://support.apple.com/HT205267security@debian.org
N/A
https://support.citrix.com/article/CTX200217security@debian.org
N/A
https://support.citrix.com/article/CTX200223security@debian.org
N/A
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.htmlsecurity@debian.org
N/A
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075security@debian.org
N/A
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183security@debian.org
N/A
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlertssecurity@debian.org
N/A
https://www.suse.com/support/shellshock/security@debian.org
N/A
http://jvn.jp/en/jp/JVN55667175/index.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126af854a3a-2127-422b-91ae-364da2661108
N/A
http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://linux.oracle.com/errata/ELSA-2014-3093af854a3a-2127-422b-91ae-364da2661108
N/A
http://linux.oracle.com/errata/ELSA-2014-3094af854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141330468527613&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141345648114150&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383026420882&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383081521087&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383196021590&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383244821813&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383304022067&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383353622268&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141383465822787&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141450491804793&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141576728022234&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141577137423233&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141577241923505&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141577297623641&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141585637922673&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141879528318582&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=141879528318582&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142118135300698&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142289270617409&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142289270617409&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142358026505815&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142358026505815&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142358078406056&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142721162228379&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://marc.info/?l=bugtraq&m=142721162228379&w=2af854a3a-2127-422b-91ae-364da2661108
N/A
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/58200af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/59907af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/59961af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60024af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60034af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60044af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60055af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60063af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60193af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60325af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/60433af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61065af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61128af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61129af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61283af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61287af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61291af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61312af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61313af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61328af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61442af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61471af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61485af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61503af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61550af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61552af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61565af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61603af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61633af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61641af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61643af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61654af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61703af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61780af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61816af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/61857af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/62312af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/62343af854a3a-2127-422b-91ae-364da2661108
N/A
http://support.apple.com/HT204244af854a3a-2127-422b-91ae-364da2661108
N/A
http://support.novell.com/security/cve/CVE-2014-6277.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bashaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685541af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685604af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685733af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685749af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21685914af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686131af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686246af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686445af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686479af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21686494af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-01.ibm.com/support/docview.wss?uid=swg21687079af854a3a-2127-422b-91ae-364da2661108
N/A
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.novell.com/support/kb/doc.php?id=7015721af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.qnap.com/i/en/support/con_show.php?cid=61af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.ubuntu.com/usn/USN-2380-1af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vmware.com/security/advisories/VMSA-2014-0010.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://kb.bluecoat.com/index?page=content&id=SA82af854a3a-2127-422b-91ae-364da2661108
N/A
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648af854a3a-2127-422b-91ae-364da2661108
N/A
https://kc.mcafee.com/corporate/index?page=content&id=SB10085af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.apple.com/HT205267af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.citrix.com/article/CTX200217af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.citrix.com/article/CTX200223af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183af854a3a-2127-422b-91ae-364da2661108
N/A
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlertsaf854a3a-2127-422b-91ae-364da2661108
N/A
https://www.suse.com/support/shellshock/af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://jvn.jp/en/jp/JVN55667175/index.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
Source: security@debian.org
Resource: N/A
Hyperlink: http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
Source: security@debian.org
Resource:
Exploit
Patch
Hyperlink: http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3093
Source: security@debian.org
Resource: N/A
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3094
Source: security@debian.org
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141330468527613&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141345648114150&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383026420882&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383081521087&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383196021590&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383244821813&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383304022067&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383353622268&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383465822787&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141450491804793&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141576728022234&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577137423233&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577241923505&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577297623641&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141585637922673&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358078406056&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Source: security@debian.org
Resource: N/A
Hyperlink: http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/58200
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/59907
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/59961
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60024
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60034
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60044
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60055
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60063
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60193
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60325
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/60433
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61065
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61128
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61129
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61283
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61287
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61291
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61312
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61313
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61328
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61442
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61471
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61485
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61503
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61550
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61552
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61565
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61603
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61633
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61641
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61643
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61654
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61703
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61780
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61816
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/61857
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/62312
Source: security@debian.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/62343
Source: security@debian.org
Resource: N/A
Hyperlink: http://support.apple.com/HT204244
Source: security@debian.org
Resource: N/A
Hyperlink: http://support.novell.com/security/cve/CVE-2014-6277.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685541
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685604
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685733
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685749
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685914
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686131
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686246
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686445
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686479
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686494
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21687079
Source: security@debian.org
Resource: N/A
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.novell.com/support/kb/doc.php?id=7015721
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.qnap.com/i/en/support/con_show.php?cid=61
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-2380-1
Source: security@debian.org
Resource: N/A
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0010.html
Source: security@debian.org
Resource: N/A
Hyperlink: https://kb.bluecoat.com/index?page=content&id=SA82
Source: security@debian.org
Resource: N/A
Hyperlink: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
Source: security@debian.org
Resource: N/A
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10085
Source: security@debian.org
Resource: N/A
Hyperlink: https://support.apple.com/HT205267
Source: security@debian.org
Resource: N/A
Hyperlink: https://support.citrix.com/article/CTX200217
Source: security@debian.org
Resource: N/A
Hyperlink: https://support.citrix.com/article/CTX200223
Source: security@debian.org
Resource: N/A
Hyperlink: https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
Source: security@debian.org
Resource: N/A
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
Source: security@debian.org
Resource: N/A
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
Source: security@debian.org
Resource: N/A
Hyperlink: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
Source: security@debian.org
Resource: N/A
Hyperlink: https://www.suse.com/support/shellshock/
Source: security@debian.org
Resource: N/A
Hyperlink: http://jvn.jp/en/jp/JVN55667175/index.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Patch
Hyperlink: http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3093
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://linux.oracle.com/errata/ELSA-2014-3094
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141330468527613&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141345648114150&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383026420882&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383081521087&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383196021590&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383244821813&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383304022067&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383353622268&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141383465822787&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141450491804793&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141576728022234&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577137423233&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577241923505&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141577297623641&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141585637922673&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=141879528318582&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142118135300698&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142289270617409&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358026505815&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142358078406056&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://marc.info/?l=bugtraq&m=142721162228379&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/58200
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/59907
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/59961
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60024
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60034
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60044
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60055
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60063
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60193
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60325
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/60433
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61065
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61128
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61129
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61283
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61287
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61291
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61312
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61313
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61328
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61442
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61471
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61485
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61503
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61550
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61552
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61565
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61603
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61633
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61641
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61643
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61654
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61703
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61780
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61816
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/61857
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/62312
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/62343
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.apple.com/HT204244
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://support.novell.com/security/cve/CVE-2014-6277.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685541
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685604
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685733
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685749
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21685914
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686131
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686246
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686445
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686479
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21686494
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-01.ibm.com/support/docview.wss?uid=swg21687079
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.novell.com/support/kb/doc.php?id=7015721
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.qnap.com/i/en/support/con_show.php?cid=61
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.ubuntu.com/usn/USN-2380-1
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.vmware.com/security/advisories/VMSA-2014-0010.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://kb.bluecoat.com/index?page=content&id=SA82
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://kc.mcafee.com/corporate/index?page=content&id=SB10085
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.apple.com/HT205267
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.citrix.com/article/CTX200217
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.citrix.com/article/CTX200223
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.suse.com/support/shellshock/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

560Records found

CVE-2018-19646
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.61% / 85.09%
||
7 Day CHG~0.00%
Published-28 Nov, 2018 | 17:00
Updated-17 Sep, 2024 | 02:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Python CGI scripts in PWS in Imperva SecureSphere 13.0.10, 13.1.10, and 13.2.10 allow remote attackers to execute arbitrary OS commands because command-line arguments are mishandled.

Action-Not Available
Vendor-impervan/a
Product-securespheren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-18472
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-20.08% / 95.28%
||
7 Day CHG~0.00%
Published-19 Jun, 2019 | 15:44
Updated-05 Aug, 2024 | 11:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Western Digital WD My Book Live and WD My Book Live Duo (all versions) have a root Remote Command Execution bug via shell metacharacters in the /api/1.0/rest/language_configuration language parameter. It can be triggered by anyone who knows the IP address of the affected device, as exploited in the wild in June 2021 for factory reset commands,

Action-Not Available
Vendor-n/aWestern Digital Corp.
Product-my_book_live_firmwaremy_book_liven/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-19168
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-12.61% / 93.71%
||
7 Day CHG~0.00%
Published-11 Nov, 2018 | 00:00
Updated-16 Sep, 2024 | 17:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Shell Metacharacter Injection in www/modules/save.php in FruityWifi (aka PatatasFritas/PatataWifi) through 2.4 allows remote attackers to execute arbitrary code with root privileges via a crafted mod_name parameter in a POST request. NOTE: unlike in CVE-2018-17317, the attacker does not need a valid session.

Action-Not Available
Vendor-fruitywifi_projectn/a
Product-fruitywifin/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-17068
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-14.54% / 94.20%
||
7 Day CHG~0.00%
Published-15 Sep, 2018 | 21:00
Updated-05 Aug, 2024 | 10:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction in the handler function of the /goform/Diagnosis route. This could lead to command injection via shell metacharacters in the sendNum parameter.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-816_a2dir-816_a2_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-14558
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-81.99% / 99.16%
||
7 Day CHG~0.00%
Published-30 Oct, 2018 | 18:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-05-03||Apply updates per vendor instructions.

An issue was discovered on Tenda AC7 devices with firmware through V15.03.06.44_CN(AC7), AC9 devices with firmware through V15.03.05.19(6318)_CN(AC9), and AC10 devices with firmware through V15.03.06.23_CN(AC10). A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted goform/setUsbUnload request. This occurs because the "formsetUsbUnload" function executes a dosystemCmd function with untrusted input.

Action-Not Available
Vendor-n/aTenda Technology Co., Ltd.
Product-ac10ac9_firmwareac7ac9ac10_firmwareac7_firmwaren/aAC7, AC9, and AC10 Routers
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-0265
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-8.1||HIGH
EPSS-5.43% / 89.79%
||
7 Day CHG~0.00%
Published-22 Apr, 2021 | 19:37
Updated-16 Sep, 2024 | 18:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Contrail Insights: The REST API implementation allows an unauthenticated remote attacker to execute commands as root.

An unvalidated REST API in the AppFormix Agent of Juniper Networks AppFormix allows an unauthenticated remote attacker to execute commands as root on the host running the AppFormix Agent, when certain preconditions are performed by the attacker, thus granting the attacker full control over the environment. This issue affects: Juniper Networks AppFormix 3 versions prior to 3.1.22, 3.2.14, 3.3.0.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-appformixContrail Insights
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-14933
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-93.75% / 99.85%
||
7 Day CHG~0.00%
Published-04 Aug, 2018 | 19:00
Updated-30 Jul, 2025 | 01:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-01-08||The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.

upgrade_handle.php on NUUO NVRmini devices allows Remote Command Execution via shell metacharacters in the uploaddir parameter for a writeuploaddir command.

Action-Not Available
Vendor-n/aNUUO Inc.
Product-nvrmininvrmini_firmwaren/aNVRmini Devices
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-9026
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.19% / 86.49%
||
7 Day CHG~0.00%
Published-17 Feb, 2020 | 03:02
Updated-04 Aug, 2024 | 10:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ELTEX NTP-RG-1402G 1v10 3.25.3.32 devices allow OS command injection via the PING field of the resource ping.cmd. The NTP-2 device is also affected.

Action-Not Available
Vendor-eltex-con/a
Product-ntp-2_firmwarentp-rg-1402g_firmwarentp-rg-1402gntp-2n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-13316
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-15.30% / 94.36%
||
7 Day CHG~0.00%
Published-27 Nov, 2018 | 21:00
Updated-05 Aug, 2024 | 09:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

System command injection in formAliasIp in TOTOLINK A3002RU version 1.0.8 allows attackers to execute system commands via the "subnet" POST parameter.

Action-Not Available
Vendor-n/aTOTOLINK
Product-a3002rua3002ru_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2015-7253
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-10||HIGH
EPSS-0.81% / 73.25%
||
7 Day CHG~0.00%
Published-04 Nov, 2015 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Web Console in Commvault Edge Server 10 R2 allows remote attackers to execute arbitrary OS commands via crafted serialized data in a cookie.

Action-Not Available
Vendor-n/aCommvault Systems, Inc.
Product-edge_servern/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-9054
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-9.8||CRITICAL
EPSS-94.31% / 99.94%
||
7 Day CHG~0.00%
Published-04 Mar, 2020 | 19:30
Updated-30 Jul, 2025 | 01:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-04-15||Apply updates per vendor instructions.
ZyXEL NAS products running firmware version 5.21 and earlier are vulnerable to pre-authentication command injection in weblogin.cgi

Multiple ZyXEL network-attached storage (NAS) devices running firmware version 5.21 contain a pre-authentication command injection vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable device. ZyXEL NAS devices achieve authentication by using the weblogin.cgi CGI executable. This program fails to properly sanitize the username parameter that is passed to it. If the username parameter contains certain characters, it can allow command injection with the privileges of the web server that runs on the ZyXEL device. Although the web server does not run as the root user, ZyXEL devices include a setuid utility that can be leveraged to run any command with root privileges. As such, it should be assumed that exploitation of this vulnerability can lead to remote code execution with root privileges. By sending a specially-crafted HTTP POST or GET request to a vulnerable ZyXEL device, a remote, unauthenticated attacker may be able to execute arbitrary code on the device. This may happen by directly connecting to a device if it is directly exposed to an attacker. However, there are ways to trigger such crafted requests even if an attacker does not have direct connectivity to a vulnerable devices. For example, simply visiting a website can result in the compromise of any ZyXEL device that is reachable from the client system. Affected products include: NAS326 before firmware V5.21(AAZF.7)C0 NAS520 before firmware V5.21(AASZ.3)C0 NAS540 before firmware V5.21(AATB.4)C0 NAS542 before firmware V5.21(ABAG.4)C0 ZyXEL has made firmware updates available for NAS326, NAS520, NAS540, and NAS542 devices. Affected models that are end-of-support: NSA210, NSA220, NSA220+, NSA221, NSA310, NSA310S, NSA320, NSA320S, NSA325 and NSA325v2

Action-Not Available
Vendor-Zyxel Networks Corporation
Product-atp500vpn1000_firmwareatp200zywall310usg110_firmwareusg1100usg1900usg310_firmwareatp200_firmwarevpn300usg40w_firmwarenas540usg20w-vpnusg20w-vpn_firmwareusg20-vpnusg210_firmwarevpn100atp100nas540_firmwareatp100_firmwareusg2200_firmwarezywall1100usg60usg2200vpn1000zywall110_firmwarezywall110usg60_firmwareusg40watp800usg40_firmwareusg1100_firmwarenas542_firmwarenas326_firmwareatp500_firmwareusg110usg20-vpn_firmwareusg60w_firmwarenas520_firmwarenas542nas520zywall1100_firmwareusg310zywall310_firmwareusg60wvpn100_firmwareatp800_firmwarevpn50_firmwareusg210vpn300_firmwarevpn50usg40nas326usg1900_firmwareNAS542NSA325v2NSA210NSA220NSA310NSA320SNSA320NSA325NAS326NAS540NSA221NAS520NSA220+Multiple Network-Attached Storage (NAS) Devices
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-17565
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.52% / 65.65%
||
7 Day CHG~0.00%
Published-01 Apr, 2019 | 20:51
Updated-05 Aug, 2024 | 10:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Shell Metacharacter Injection in the SSH configuration interface on Grandstream GXP16xx VoIP 1.0.4.128 phones allows attackers to execute arbitrary system commands and gain a root shell.

Action-Not Available
Vendor-grandstreamn/a
Product-gxp1628gxp1610gxp1620_firmwaregxp1625gxp1615_firmwaregxp1610_firmwaregxp1628_firmwaregxp1630gxp1615gxp1620gxp1630_firmwaregxp1625_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-9027
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.19% / 86.49%
||
7 Day CHG~0.00%
Published-17 Feb, 2020 | 03:02
Updated-04 Aug, 2024 | 10:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ELTEX NTP-RG-1402G 1v10 3.25.3.32 devices allow OS command injection via the TRACE field of the resource ping.cmd. The NTP-2 device is also affected.

Action-Not Available
Vendor-eltex-con/a
Product-ntp-2_firmwarentp-rg-1402g_firmwarentp-rg-1402gntp-2n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-8963
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.25% / 86.63%
||
7 Day CHG~0.00%
Published-13 Feb, 2020 | 02:56
Updated-04 Aug, 2024 | 10:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TimeTools SC7105 1.0.007, SC9205 1.0.007, SC9705 1.0.007, SR7110 1.0.007, SR9210 1.0.007, SR9750 1.0.007, SR9850 1.0.007, T100 1.0.003, T300 1.0.003, and T550 1.0.003 devices allow remote attackers to execute arbitrary OS commands via shell metacharacters in the t3.cgi srmodel or srtime parameter.

Action-Not Available
Vendor-timetoolsltdn/a
Product-sr9750_firmwaresc9705t100sr7110_firmwaresr9750sr9850_firmwaret550_firmwaresc9205t100_firmwaresc7105_firmwaret300_firmwaresc9205_firmwaret550sc9705_firmwaresc7105sr7110t300sr9850sr9210_firmwaresr9210n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-8515
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-94.36% / 99.96%
||
7 Day CHG~0.00%
Published-01 Feb, 2020 | 12:36
Updated-30 Jul, 2025 | 01:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-05-03||Apply updates per vendor instructions.

DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.4.2.1_Beta, and 1.4.4_Beta devices allow remote code execution as root (without authentication) via shell metacharacters to the cgi-bin/mainfunction.cgi URI. This issue has been fixed in Vigor3900/2960/300B v1.5.1.

Action-Not Available
Vendor-n/aDrayTek Corp.
Product-vigor300b_firmwarevigor2960vigor3900_firmwarevigor3900vigor300bvigor2960_firmwaren/aMultiple Vigor Routers
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-9021
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.32% / 54.05%
||
7 Day CHG~0.00%
Published-17 Feb, 2020 | 03:03
Updated-04 Aug, 2024 | 10:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Post Oak AWAM Bluetooth Field Device 7400v2.08.21.2018, 7800SD.2015.1.16, 2011.3, 7400v2.02.01.2019, and 7800SD.2012.12.5 is vulnerable to injections of operating system commands through timeconfig.py via shell metacharacters in the htmlNtpServer parameter.

Action-Not Available
Vendor-postoaktrafficn/a
Product-awam_bluetooth_field_device_firmwareawam_bluetooth_field_devicen/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-9020
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.54% / 66.58%
||
7 Day CHG~0.00%
Published-17 Feb, 2020 | 03:03
Updated-04 Aug, 2024 | 10:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Iteris Vantage Velocity Field Unit 2.3.1, 2.4.2, and 3.0 devices allow the injection of OS commands into cgi-bin/timeconfig.py via shell metacharacters in the NTP Server field.

Action-Not Available
Vendor-iterisn/a
Product-vantage_velocityvantage_velocity_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-13311
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-5.05% / 89.37%
||
7 Day CHG~0.00%
Published-26 Nov, 2018 | 22:00
Updated-05 Aug, 2024 | 09:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

System command injection in formDlna in TOTOLINK A3002RU version 1.0.8 allows attackers to execute system commands via the "sambaUser" POST parameter.

Action-Not Available
Vendor-n/aTOTOLINK
Product-a3002rua3002ru_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-7825
Matching Score-4
Assigner-KrCERT/CC
ShareView Details
Matching Score-4
Assigner-KrCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.51% / 65.44%
||
7 Day CHG~0.00%
Published-17 Jul, 2020 | 15:13
Updated-17 Sep, 2024 | 01:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists that could allow the execution of operating system commands on systems running MiPlatform 2019.05.16 and earlier. An attacker could execute arbitrary remote command by sending parameters to WinExec function in ExtCommandApi.dll module of MiPlatform.

Action-Not Available
Vendor-tobesoftTOBESOFT
Product-miplatformMiPlatform 320, 320U, 330, 330U
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-14060
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-11.26% / 93.26%
||
7 Day CHG~0.00%
Published-15 Jul, 2018 | 03:00
Updated-05 Aug, 2024 | 09:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OS command injection in the AP mode settings feature in /cgi-bin/luci /api/misystem/set_router_wifiap on Xiaomi R3D before 2.26.4 devices allows an attacker to execute any command via crafted JSON data.

Action-Not Available
Vendor-n/aXiaomi
Product-xiaomi_r3d_firmwarexiaomi_r3dn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-7805
Matching Score-4
Assigner-KrCERT/CC
ShareView Details
Matching Score-4
Assigner-KrCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-5.27% / 89.62%
||
7 Day CHG~0.00%
Published-07 May, 2020 | 17:06
Updated-04 Aug, 2024 | 09:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on KT Slim egg IML500 (R7283, R8112, R8424) and IML520 (R8112, R8368, R8411) wifi device. This issue is a command injection allowing attackers to execute arbitrary OS commands.

Action-Not Available
Vendor-infomarkInfomark
Product-iml520_firmwareiml500iml500_firmwareiml520KT Slim egg IML500KT Slim egg IML520
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-8178
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-9.8||CRITICAL
EPSS-5.60% / 89.96%
||
7 Day CHG~0.00%
Published-15 Jul, 2020 | 16:10
Updated-04 Aug, 2024 | 09:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient input validation in npm package `jison` <= 0.4.18 may lead to OS command injection attacks.

Action-Not Available
Vendor-jison_projectn/a
Product-jisonjison
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-5868
Matching Score-4
Assigner-F5, Inc.
ShareView Details
Matching Score-4
Assigner-F5, Inc.
CVSS Score-9.8||CRITICAL
EPSS-3.88% / 87.79%
||
7 Day CHG~0.00%
Published-24 Apr, 2020 | 12:54
Updated-04 Aug, 2024 | 08:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In BIG-IQ 6.0.0-7.0.0, a remote access vulnerability has been discovered that may allow a remote user to execute shell commands on affected systems using HTTP requests to the BIG-IQ user interface.

Action-Not Available
Vendor-n/aF5, Inc.
Product-big-iq_centralized_managementBIG-IQ
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-6841
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-10.17% / 92.83%
||
7 Day CHG~0.00%
Published-21 Feb, 2020 | 15:35
Updated-04 Aug, 2024 | 09:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

D-Link DCH-M225 1.05b01 and earlier devices allow remote attackers to execute arbitrary OS commands via shell metacharacters in the spotifyConnect.php userName parameter.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dch-m225dch-m225_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-6760
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.45% / 62.60%
||
7 Day CHG~0.00%
Published-06 Feb, 2020 | 20:02
Updated-04 Aug, 2024 | 09:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Schmid ZI 620 V400 VPN 090 routers allow an attacker to execute OS commands as root via shell metacharacters to an entry on the SSH subcommand menu, as demonstrated by ping.

Action-Not Available
Vendor-schmid-telecomn/a
Product-zi_620_v400_firmwarezi_620_v400n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-12670
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-12.49% / 93.67%
||
7 Day CHG~0.00%
Published-19 Oct, 2018 | 22:00
Updated-05 Aug, 2024 | 08:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SV3C L-SERIES HD CAMERA V2.3.4.2103-S50-NTD-B20170508B and V2.3.4.2103-S50-NTD-B20170823B devices allow OS Command Injection.

Action-Not Available
Vendor-sv3cn/a
Product-h.264_poe_ip_camera_firmwaresv-b11vpoe-1080p-lsv-b01poe-1080p-lsv-d02poe-1080p-ln/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2015-7426
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-10||CRITICAL
EPSS-2.73% / 85.38%
||
7 Day CHG~0.00%
Published-02 Jan, 2016 | 21:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Data Protection extension in the VMware GUI in IBM Tivoli Storage Manager for Virtual Environments: Data Protection for VMware (aka Spectrum Protect for Virtual Environments) 7.1 before 7.1.3.0 and Tivoli Storage FlashCopy Manager for VMware (aka Spectrum Protect Snapshot) 4.1 before 4.1.3.0 allows remote attackers to execute arbitrary OS commands via unspecified vectors.

Action-Not Available
Vendor-n/aIBM Corporation
Product-spectrum_protect_snapshotspectrum_protect_for_virtual_environmentsn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-16618
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-16.17% / 94.55%
||
7 Day CHG~0.00%
Published-19 Jun, 2019 | 17:48
Updated-05 Aug, 2024 | 10:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VTech Storio Max before 56.D3JM6 allows remote command execution via shell metacharacters in an Android activity name. It exposes the storeintenttranslate.x service on port 1668 listening for requests on localhost. Requests submitted to this service are checked for a string of random characters followed by the name of an Android activity to start. Activities are started by inserting their name into a string that is executed in a shell command. By inserting metacharacters this can be exploited to run arbitrary commands as root. The requests also match those of the HTTP protocol and can be triggered on any web page rendered on the device by requesting resources stored at an http://127.0.0.1:1668/ URI, as demonstrated by the http://127.0.0.1:1668/dacdb70556479813fab2d92896596eef?';{ping,example.org}' URL.

Action-Not Available
Vendor-vtechn/a
Product-80-183823storio_max_firmware80-18382480-18380480-18380580-18380780-1838xx80-18380380-183822n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-5757
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-18.52% / 95.00%
||
7 Day CHG~0.00%
Published-17 Jul, 2020 | 20:35
Updated-04 Aug, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via HTTP. An authenticated remote attacker can bypass command injection mitigations and execute commands as the root user by sending a crafted HTTP POST to the UCM's "New" HTTPS API.

Action-Not Available
Vendor-grandstreamn/a
Product-ucm6202_firmwareucm6204_firmwareucm6208_firmwareucm6202ucm6204ucm6208Grandstream UCM6200 Series
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-5759
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-8.11% / 91.82%
||
7 Day CHG~0.00%
Published-17 Jul, 2020 | 20:35
Updated-04 Aug, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Grandstream UCM6200 series firmware version 1.0.20.23 and below is vulnerable to OS command injection via SSH. An authenticated remote attacker can execute commands as the root user by issuing a specially crafted "unset" command.

Action-Not Available
Vendor-grandstreamn/a
Product-ucm6202_firmwareucm6204_firmwareucm6208_firmwareucm6202ucm6204ucm6208Grandstream UCM6200 Series
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-5685
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.61% / 68.91%
||
7 Day CHG~0.00%
Published-13 Jan, 2021 | 09:40
Updated-04 Aug, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

UNIVERGE SV9500 series from V1 to V7and SV8500 series from S6 to S8 allows an attacker to execute arbitrary OS commands or cause a denial-of-service (DoS) condition by sending a specially crafted request to a specific URL.

Action-Not Available
Vendor-NEC Corporation
Product-univerge_sv8500univerge_sv9500_firmwareuniverge_sv8500_firmwareuniverge_sv9500UNIVERGE SV9500/SV8500 series
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-16461
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-9.8||CRITICAL
EPSS-1.49% / 80.32%
||
7 Day CHG~0.00%
Published-30 Oct, 2018 | 21:00
Updated-05 Aug, 2024 | 10:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A command injection vulnerability in libnmapp package for versions <0.4.16 allows arbitrary commands to be executed via arguments to the range options.

Action-Not Available
Vendor-libnmap_projectn/a
Product-libnmaplibnmap
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-16462
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-10||CRITICAL
EPSS-2.30% / 84.10%
||
7 Day CHG~0.00%
Published-30 Oct, 2018 | 21:00
Updated-05 Aug, 2024 | 10:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A command injection vulnerability in the apex-publish-static-files npm module version <2.0.1 which allows arbitrary shell command execution through a maliciously crafted argument.

Action-Not Available
Vendor-apex-publish-static-files_projectn/a
Product-apex-publish-static-filesapex-publish-static-files
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-5561
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-2.14% / 83.53%
||
7 Day CHG~0.00%
Published-25 Mar, 2020 | 01:25
Updated-04 Aug, 2024 | 08:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Keijiban Tsumiki v1.15 allows remote attackers to execute arbitrary OS commands via unspecified vectors.

Action-Not Available
Vendor-keijiban_tsumiki_projectMash room - Free CGI -
Product-keijiban_tsumikiKeijiban Tsumiki
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-4469
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-8.1||HIGH
EPSS-46.36% / 97.57%
||
7 Day CHG~0.00%
Published-15 Jun, 2020 | 13:25
Updated-16 Sep, 2024 | 18:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Spectrum Protect Plus 10.1.0 through 10.1.5 could allow a remote attacker to execute arbitrary code on the system. By using a specially crafted HTTP command, an attacker could exploit this vulnerability to execute arbitrary command on the system. This vulnerability is due to an incomplete fix for CVE-2020-4211. IBM X-Force ID: 181724.

Action-Not Available
Vendor-IBM Corporation
Product-spectrum_protect_plusSpectrum Protect Plus
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-4211
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-9.8||CRITICAL
EPSS-51.55% / 97.81%
||
7 Day CHG~0.00%
Published-24 Feb, 2020 | 15:35
Updated-17 Sep, 2024 | 01:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Spectrum Protect Plus 10.1.0 and 10.1.5 could allow a remote attacker to execute arbitrary code on the system. By using a specially crafted HTTP command, an attacker could exploit this vulnerability to execute arbitrary command on the system. IBM X-Force ID: 175022.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, Inc
Product-spectrum_protectlinux_kernelSpectrum Protect Plus
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-4222
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-9.8||CRITICAL
EPSS-28.95% / 96.40%
||
7 Day CHG~0.00%
Published-24 Feb, 2020 | 15:35
Updated-17 Sep, 2024 | 00:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Spectrum Protect Plus 10.1.0 and 10.1.5 could allow a remote attacker to execute arbitrary code on the system. By using a specially crafted HTTP command, an attacker could exploit this vulnerability to execute arbitrary command on the system. IBM X-Force ID: 175091.

Action-Not Available
Vendor-IBM Corporation
Product-spectrum_protectSpectrum Protect Plus
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-4210
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-9.8||CRITICAL
EPSS-28.95% / 96.40%
||
7 Day CHG~0.00%
Published-24 Feb, 2020 | 15:35
Updated-16 Sep, 2024 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Spectrum Protect Plus 10.1.0 and 10.1.5 could allow a remote attacker to execute arbitrary code on the system. By using a specially crafted HTTP command, an attacker could exploit this vulnerability to execute arbitrary command on the system. IBM X-Force ID: 175020.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, Inc
Product-spectrum_protectlinux_kernelSpectrum Protect Plus
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-35851
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-8.1||HIGH
EPSS-0.77% / 72.50%
||
7 Day CHG~0.00%
Published-31 Dec, 2020 | 07:45
Updated-17 Sep, 2024 | 04:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HGiga MailSherlock - Command Injection

HGiga MailSherlock does not validate specific parameters properly. Attackers can use the vulnerability to launch Command inject attacks remotely and execute arbitrary commands of the system.

Action-Not Available
Vendor-hgigaHGiga
Product-msr45_isherlock-userssr45_isherlock-userMailSherlock MSR45/SSR45
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-35458
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-12.99% / 93.81%
||
7 Day CHG~0.00%
Published-12 Jan, 2021 | 14:21
Updated-04 Aug, 2024 | 17:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote attackers to execute code as hauser.

Action-Not Available
Vendor-clusterlabsn/a
Product-hawkn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-35665
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-89.37% / 99.52%
||
7 Day CHG~0.00%
Published-23 Dec, 2020 | 00:00
Updated-04 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An unauthenticated command-execution vulnerability exists in TerraMaster TOS through 4.2.06 via shell metacharacters in the Event parameter in include/makecvs.php during CSV creation.

Action-Not Available
Vendor-terra-mastern/a
Product-terramaster_operating_systemn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-3586
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.4||CRITICAL
EPSS-2.23% / 83.88%
||
7 Day CHG~0.00%
Published-18 Nov, 2020 | 17:41
Updated-13 Nov, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco DNA Spaces Connector Command Injection Vulnerability

A vulnerability in the web-based management interface of Cisco DNA Spaces Connector could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insufficient validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on the underling operating system with privileges of the web-based management application, which is running as a restricted user. This could result in changes being made to pages served by the web-based management application impacting the integrity or availability of the web-based management application.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-dna_spaces\Cisco DNA Spaces Connector
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-29495
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-10||CRITICAL
EPSS-15.49% / 94.40%
||
7 Day CHG~0.00%
Published-14 Jan, 2021 | 21:10
Updated-16 Sep, 2024 | 16:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DELL EMC Avamar Server, versions 19.1, 19.2, 19.3, contain an OS Command Injection Vulnerability in Fitness Analyzer. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS with high privileges. This vulnerability is considered critical as it can be leveraged to completely compromise the vulnerable application as well as the underlying operating system. Dell recommends customers to upgrade at the earliest opportunity.

Action-Not Available
Vendor-Dell Inc.
Product-emc_integrated_data_protection_applianceemc_avamar_serverAvamar
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-1235
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-9.8||CRITICAL
EPSS-52.85% / 97.86%
||
7 Day CHG-3.59%
Published-29 May, 2018 | 17:00
Updated-16 Sep, 2024 | 19:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell EMC RecoverPoint versions prior to 5.1.2 and RecoverPoint for VMs versions prior to 5.1.1.3, contain a command injection vulnerability. An unauthenticated remote attacker may potentially exploit this vulnerability to execute arbitrary commands on the affected system with root privilege.

Action-Not Available
Vendor-Dell Inc.ELAN Microelectronics Corporation
Product-recoverpoint_for_virtual_machinesrecoverpointDell EMC RecoverPointDell EMC RecoverPoint Virtual Machine (VM)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-1000043
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.19% / 83.74%
||
7 Day CHG-0.11%
Published-09 Feb, 2018 | 23:00
Updated-05 Aug, 2024 | 12:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Security Onion Solutions Squert version 1.0.1 through 1.6.7 contains a CWE-78: Improper Neutralization of Special Elements used in an OS Command (OS Command Injection) vulnerability in .inc/callback.php that can result in execution of OS Commands. This attack appear to be exploitable via Web request to .inc/callback.php with the payload in the txdata parameter, used in tx()/transcript(), or the catdata parameter, used in cat(). This vulnerability appears to have been fixed in 1.7.0.

Action-Not Available
Vendor-securityonionn/a
Product-squertn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-29552
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-8.78% / 92.17%
||
7 Day CHG~0.00%
Published-23 Dec, 2020 | 15:12
Updated-04 Aug, 2024 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in URVE Build 24.03.2020. By using the _internal/pc/vpro.php?mac=0&ip=0&operation=0&usr=0&pass=0%3bpowershell+-c+" substring, it is possible to execute a Powershell command and redirect its output to a file under the web root.

Action-Not Available
Vendor-urven/a
Product-urven/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-29381
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.70% / 85.30%
||
7 Day CHG~0.00%
Published-29 Nov, 2020 | 00:46
Updated-04 Aug, 2024 | 16:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. Command injection can occur in "upload tftp syslog" and "upload tftp configuration" in the CLI via a crafted filename.

Action-Not Available
Vendor-vsolcnn/a
Product-v1600d-miniv1600d_firmwarev1600g2v1600g1v1600d-mini_firmwarev1600g2_firmwarev1600g1_firmwarev1600dv1600d4lv1600d4l_firmwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2020-29056
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.45% / 62.87%
||
7 Day CHG~0.00%
Published-24 Nov, 2020 | 21:00
Updated-04 Aug, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on CDATA 72408A, 9008A, 9016A, 92408A, 92416A, 9288, 97016, 97024P, 97028P, 97042P, 97084P, 97168P, FD1002S, FD1104, FD1104B, FD1104S, FD1104SN, FD1108S, FD1204S-R2, FD1204SN, FD1204SN-R2, FD1208S-R2, FD1216S-R1, FD1608GS, FD1608SN, FD1616GS, FD1616SN, and FD8000 devices. One can escape from a shell and acquire root privileges by leveraging the TFTP download configuration.

Action-Not Available
Vendor-n/aC-DATA Technologies Co., Ltd.CData Software, Inc.
Product-fd1216s-r197168p_firmwarefd1208s-r2fd1204s-r2_firmwarefd1616gsfd1002s9016afd1104fd1204sn-r2fd1616sn_firmwarefd1104sfd1204sn_firmwarefd1608gs97168pfd1002s_firmware97084p92416a_firmware9016a_firmwarefd1616gs_firmware97028p9288_firmwarefd1608gs_firmwarefd1104sn_firmwarefd1608sn_firmwarefd1608sn9008a_firmwarefd1204sn-r2_firmwarefd1104b_firmware72408a97028p_firmwarefd1104bfd1204snfd8000_firmware92408afd1104s_firmware97042p_firmware92416afd1104snfd1204s-r297024p97016_firmware928897024p_firmware97084p_firmwarefd1104_firmwarefd1208s-r2_firmwarefd80009008afd1108s72408a_firmware97042pfd1216s-r1_firmware92408a_firmwarefd1108s_firmwarefd1616sn97016n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-1143
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-47.11% / 97.60%
||
7 Day CHG~0.00%
Published-19 Apr, 2018 | 13:00
Updated-17 Sep, 2024 | 04:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote unauthenticated user can execute commands as root in the Belkin N750 using firmware version 1.10.22 by sending a crafted HTTP request to twonky_command.cgi.

Action-Not Available
Vendor-Belkin International, Inc.
Product-n750_firmwaren750N750 DB Wi-Fi Dual-Band N+ Gigabit Router (F9K1103)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-14495
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-18.80% / 95.05%
||
7 Day CHG~0.00%
Published-10 Jul, 2019 | 13:20
Updated-05 Aug, 2024 | 09:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vivotek FD8136 devices allow Remote Command Injection, aka "another command injection vulnerability in our target device," a different issue than CVE-2018-14494. NOTE: The vendor has disputed this as a vulnerability and states that the issue does not cause a web server crash or have any other affect on it's performance

Action-Not Available
Vendor-vivotekn/a
Product-fd8136_firmwarefd8136n/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 11
  • 12
  • Next
Details not found