Lucene search

K
GnuBash

6 matches found

CVE
CVE
added 2019/03/22 8:29 a.m.412 views

CVE-2019-9924

rbash in Bash before 4.4-beta2 did not prevent the shell user from modifying BASH_CMDS, thus allowing the user to execute any command with the permissions of the shell.

7.8CVSS7.8AI score0.002EPSS
CVE
CVE
added 2019/11/28 1:15 a.m.321 views

CVE-2019-18276

An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems th...

7.8CVSS7.5AI score0.40022EPSS
CVE
CVE
added 2023/01/05 3:15 p.m.267 views

CVE-2022-3715

A flaw was found in the bash package, where a heap-buffer overflow can occur in valid parameter_transform. This issue may lead to memory problems.

7.8CVSS7.4AI score0.00048EPSS
CVE
CVE
added 2019/06/18 6:15 p.m.217 views

CVE-2012-6711

A heap-based buffer overflow exists in GNU Bash before 4.3 when wide characters, not supported by the current locale set in the LC_CTYPE environment variable, are printed through the echo built-in function. A local attacker, who can provide data to print through the "echo -e" built-in function, may...

7.8CVSS7.6AI score0.00107EPSS
CVE
CVE
added 2017/08/28 3:29 p.m.162 views

CVE-2016-0634

The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.

7.5CVSS6.8AI score0.03183EPSS
CVE
CVE
added 2017/03/27 3:59 p.m.91 views

CVE-2017-5932

The path autocompletion feature in Bash 4.4 allows local users to gain privileges via a crafted filename starting with a " (double quote) character and a command substitution metacharacter.

7.8CVSS6.3AI score0.00213EPSS