GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, allowing remote attackers to execute arbitrary code via crafted environment
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
Palo Alto Networks | Bash Shell remote code execution (CVE-2014-6271, CVE-2014-7169) | 24 Sep 201400:00 | – | paloalto |
Tenable Nessus | Palo Alto Networks PAN-OS < 5.0.15 / 5.1.x < 5.1.10 / 6.0.x < 6.0.6 / 6.1.x < 6.1.1 Bash Shell Remote Code Execution (Shellshock) | 20 Oct 201400:00 | – | nessus |
Tenable Nessus | Solaris 9 (x86) : 149080-02 | 9 Oct 201400:00 | – | nessus |
Tenable Nessus | GNU Bash Local Environment Variable Handling Command Injection (Mac OS X) (Shellshock) | 30 Sep 201400:00 | – | nessus |
Tenable Nessus | Qnap QTS Bash OS Command Injection (CVE-2014-7169) | 16 Oct 202400:00 | – | nessus |
Tenable Nessus | Solaris 9 (sparc) : 149079-03 | 9 Oct 201400:00 | – | nessus |
Tenable Nessus | Solaris 9 (x86) : 149080-01 | 26 Sep 201400:00 | – | nessus |
Tenable Nessus | Fedora 21 : bash-4.3.25-2.fc21 (2014-11718) (Shellshock) | 29 Sep 201400:00 | – | nessus |
Tenable Nessus | Qmail Remote Command Execution via Shellshock | 29 Sep 201400:00 | – | nessus |
Tenable Nessus | GLSA-201409-10 : Bash: Code Injection (Updated fix for GLSA 201409-09) | 26 Sep 201400:00 | – | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo