Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/571515?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/571515?format=api", "purl": "pkg:deb/debian/bash@2.05a-11", "type": "deb", "namespace": "debian", "name": "bash", "version": "2.05a-11", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "5.2.15-2", "latest_non_vulnerable_version": "5.2.15-2", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38381?format=api", "vulnerability_id": "VCID-4c4h-9zpn-kkd2", "summary": "Multiple vulnerabilities were found in Bash, the worst of which may\n allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7543.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7543.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7543", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24351", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24477", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24512", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24295", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24362", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24406", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24423", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24381", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24324", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24341", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24331", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24304", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7543" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379630", "reference_id": "1379630", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1379630" }, { "reference_url": "https://security.gentoo.org/glsa/201701-02", "reference_id": "GLSA-201701-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0725", "reference_id": "RHSA-2017:0725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0725" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1931", "reference_id": "RHSA-2017:1931", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1931" }, { "reference_url": "https://usn.ubuntu.com/3294-1/", "reference_id": "USN-3294-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3294-1/" }, { "reference_url": "https://usn.ubuntu.com/3294-2/", "reference_id": "USN-3294-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3294-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051163?format=api", "purl": "pkg:deb/debian/bash@4.4-5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-556k-17z3-auc2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bash@4.4-5" } ], "aliases": [ "CVE-2016-7543" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4c4h-9zpn-kkd2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35773?format=api", "vulnerability_id": "VCID-556k-17z3-auc2", "summary": "A vulnerability in Bash may allow users to escalate privileges.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18276.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18276.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-18276", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.49613", "scoring_system": "epss", "scoring_elements": "0.97811", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.49613", "scoring_system": "epss", "scoring_elements": "0.9778", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.49613", "scoring_system": "epss", "scoring_elements": "0.97786", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.49613", "scoring_system": "epss", "scoring_elements": "0.97788", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.49613", "scoring_system": "epss", "scoring_elements": "0.97791", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.49613", "scoring_system": "epss", "scoring_elements": "0.97795", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.49613", "scoring_system": "epss", "scoring_elements": "0.97798", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.49613", "scoring_system": "epss", "scoring_elements": "0.978", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.49613", "scoring_system": "epss", "scoring_elements": "0.97802", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.49613", "scoring_system": "epss", "scoring_elements": "0.97803", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.49613", "scoring_system": "epss", "scoring_elements": "0.9781", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.49613", "scoring_system": "epss", "scoring_elements": "0.97812", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-18276" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18276" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778309", "reference_id": "1778309", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1778309" }, { "reference_url": "https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff", "reference_id": "951bdaad7a18cc0dc1036bba86b18b90874d39ff", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:50:29Z/" } ], "url": "https://github.com/bminor/bash/commit/951bdaad7a18cc0dc1036bba86b18b90874d39ff" }, { "reference_url": "http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html", "reference_id": "Bash-5.0-Patch-11-Privilege-Escalation.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:50:29Z/" } ], "url": "http://packetstormsecurity.com/files/155498/Bash-5.0-Patch-11-Privilege-Escalation.html" }, { "reference_url": "https://security.gentoo.org/glsa/202105-34", "reference_id": "GLSA-202105-34", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:50:29Z/" } ], "url": "https://security.gentoo.org/glsa/202105-34" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20200430-0003/", "reference_id": "ntap-20200430-0003", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:50:29Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20200430-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1679", "reference_id": "RHSA-2021:1679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1679" }, { "reference_url": "https://usn.ubuntu.com/5380-1/", "reference_id": "USN-5380-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5380-1/" }, { "reference_url": "https://www.youtube.com/watch?v=-wGtxJ8opa8", "reference_id": "watch?v=-wGtxJ8opa8", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-06-09T15:50:29Z/" } ], "url": "https://www.youtube.com/watch?v=-wGtxJ8opa8" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/586911?format=api", "purl": "pkg:deb/debian/bash@5.1-2%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-rc3z-84wf-pygu" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bash@5.1-2%252Bdeb11u1" } ], "aliases": [ "CVE-2019-18276" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-556k-17z3-auc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41390?format=api", "vulnerability_id": "VCID-az8z-jtp2-tyhj", "summary": "A parsing flaw related to functions and environments in Bash could\n allow attackers to inject code. The unaffected packages listed in GLSA\n 201409-09 had an incomplete fix.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7169.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7169.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7169", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.90108", "scoring_system": "epss", "scoring_elements": "0.99583", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.90108", "scoring_system": "epss", "scoring_elements": "0.99584", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.90108", "scoring_system": "epss", "scoring_elements": "0.99585", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.90108", "scoring_system": "epss", "scoring_elements": "0.99586", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.90108", "scoring_system": "epss", "scoring_elements": "0.99587", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.90108", "scoring_system": "epss", "scoring_elements": "0.99588", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.90108", "scoring_system": "epss", "scoring_elements": "0.99589", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.90108", "scoring_system": "epss", "scoring_elements": "0.9959", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7169" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319", "reference_id": "1146319", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319" }, { "reference_url": "https://access.redhat.com/articles/1200223", "reference_id": "1200223", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "https://access.redhat.com/articles/1200223" }, { "reference_url": "https://access.redhat.com/node/1200223", "reference_id": "1200223", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "https://access.redhat.com/node/1200223" }, { "reference_url": "http://www.kb.cert.org/vuls/id/252743", "reference_id": "252743", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://www.kb.cert.org/vuls/id/252743" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/09/24/32", "reference_id": "32", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2014/09/24/32" }, { "reference_url": "http://twitter.com/taviso/statuses/514887394294652929", "reference_id": "514887394294652929", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://twitter.com/taviso/statuses/514887394294652929" }, { "reference_url": "http://secunia.com/advisories/59272", "reference_id": "59272", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://secunia.com/advisories/59272" }, { "reference_url": "http://secunia.com/advisories/59737", "reference_id": "59737", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://secunia.com/advisories/59737" }, { "reference_url": "http://secunia.com/advisories/60947", "reference_id": "60947", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://secunia.com/advisories/60947" }, { "reference_url": "http://secunia.com/advisories/61619", "reference_id": "61619", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://secunia.com/advisories/61619" }, { "reference_url": "http://secunia.com/advisories/61626", "reference_id": "61626", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://secunia.com/advisories/61626" }, { "reference_url": "http://secunia.com/advisories/61676", "reference_id": "61676", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://secunia.com/advisories/61676" }, { "reference_url": "http://secunia.com/advisories/61700", "reference_id": "61700", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://secunia.com/advisories/61700" }, { "reference_url": "http://secunia.com/advisories/61715", "reference_id": "61715", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://secunia.com/advisories/61715" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762760", "reference_id": "762760", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=762760" }, { "reference_url": "http://support.novell.com/security/cve/CVE-2014-7169.html", "reference_id": "CVE-2014-7169.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://support.novell.com/security/cve/CVE-2014-7169.html" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3035", "reference_id": "dsa-3035", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://www.debian.org/security/2014/dsa-3035" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-1306.html", "reference_id": "ELSA-2014-1306.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://linux.oracle.com/errata/ELSA-2014-1306.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-3075.html", "reference_id": "ELSA-2014-3075.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://linux.oracle.com/errata/ELSA-2014-3075.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-3077.html", "reference_id": "ELSA-2014-3077.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://linux.oracle.com/errata/ELSA-2014-3077.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-3078.html", "reference_id": "ELSA-2014-3078.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://linux.oracle.com/errata/ELSA-2014-3078.html" }, { "reference_url": "https://security.gentoo.org/glsa/201409-10", "reference_id": "GLSA-201409-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201409-10" }, { "reference_url": "http://support.apple.com/kb/HT6495", "reference_id": "HT6495", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://support.apple.com/kb/HT6495" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141216207813411&w=2", "reference_id": "?l=bugtraq&m=141216207813411&w=2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141216207813411&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141216668515282&w=2", "reference_id": "?l=bugtraq&m=141216668515282&w=2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141216668515282&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141235957116749&w=2", "reference_id": "?l=bugtraq&m=141235957116749&w=2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141235957116749&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141319209015420&w=2", "reference_id": "?l=bugtraq&m=141319209015420&w=2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141319209015420&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141330425327438&w=2", "reference_id": "?l=bugtraq&m=141330425327438&w=2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141330425327438&w=2" }, { "reference_url": "http://advisories.mageia.org/MGASA-2014-0393.html", "reference_id": "MGASA-2014-0393.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://advisories.mageia.org/MGASA-2014-0393.html" }, { "reference_url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html", "reference_id": "quick-notes-about-bash-bug-its-impact.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1306", "reference_id": "RHSA-2014:1306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1306" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1306.html", "reference_id": "RHSA-2014-1306.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1306.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1311", "reference_id": "RHSA-2014:1311", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1311" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1312", "reference_id": "RHSA-2014:1312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1354", "reference_id": "RHSA-2014:1354", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1354" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1865", "reference_id": "RHSA-2014:1865", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1865" }, { "reference_url": "http://www.us-cert.gov/ncas/alerts/TA14-268A", "reference_id": "TA14-268A", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://www.us-cert.gov/ncas/alerts/TA14-268A" }, { "reference_url": "https://usn.ubuntu.com/2363-1/", "reference_id": "USN-2363-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2363-1/" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2363-1", "reference_id": "USN-2363-1", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://www.ubuntu.com/usn/USN-2363-1" }, { "reference_url": "https://usn.ubuntu.com/2363-2/", "reference_id": "USN-2363-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2363-2/" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2363-2", "reference_id": "USN-2363-2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:31:47Z/" } ], "url": "http://www.ubuntu.com/usn/USN-2363-2" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571521?format=api", "purl": "pkg:deb/debian/bash@4.2%2Bdfsg-0.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4c4h-9zpn-kkd2" }, { "vulnerability": "VCID-556k-17z3-auc2" }, { "vulnerability": "VCID-az8z-jtp2-tyhj" }, { "vulnerability": "VCID-ba3s-az62-fkdc" }, { "vulnerability": "VCID-hvf8-a8kf-qqbq" }, { "vulnerability": "VCID-hxgp-7aap-xqh6" }, { "vulnerability": "VCID-jqym-yvag-qfcz" }, { "vulnerability": "VCID-k9hm-bh92-qfan" }, { "vulnerability": "VCID-nm4t-6dw6-vbby" }, { "vulnerability": "VCID-sqj7-9htv-nbfn" }, { "vulnerability": "VCID-up13-8aex-7qfy" }, { "vulnerability": "VCID-yje9-sb3a-kubp" }, { "vulnerability": "VCID-yz3v-qgsz-53ew" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bash@4.2%252Bdfsg-0.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051161?format=api", "purl": "pkg:deb/debian/bash@4.3-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4c4h-9zpn-kkd2" }, { "vulnerability": "VCID-556k-17z3-auc2" }, { "vulnerability": "VCID-hvf8-a8kf-qqbq" }, { "vulnerability": "VCID-jqym-yvag-qfcz" }, { "vulnerability": "VCID-nm4t-6dw6-vbby" }, { "vulnerability": "VCID-up13-8aex-7qfy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bash@4.3-11" } ], "aliases": [ "CVE-2014-7169" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-az8z-jtp2-tyhj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57892?format=api", "vulnerability_id": "VCID-ba3s-az62-fkdc", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6271.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6271.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6271", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.94213", "scoring_system": "epss", "scoring_elements": "0.99923", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.9422", "scoring_system": "epss", "scoring_elements": "0.99924", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.9422", "scoring_system": "epss", "scoring_elements": "0.99925", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597", "reference_id": "1141597", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597" }, { "reference_url": "https://access.redhat.com/articles/1200223", "reference_id": "1200223", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "https://access.redhat.com/articles/1200223" }, { "reference_url": "https://access.redhat.com/node/1200223", "reference_id": "1200223", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "https://access.redhat.com/node/1200223" }, { "reference_url": "http://www.kb.cert.org/vuls/id/252743", "reference_id": "252743", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://www.kb.cert.org/vuls/id/252743" }, { "reference_url": "https://www.exploit-db.com/exploits/37816/", "reference_id": "37816", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "https://www.exploit-db.com/exploits/37816/" }, { "reference_url": "https://www.exploit-db.com/exploits/38849/", "reference_id": "38849", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "https://www.exploit-db.com/exploits/38849/" }, { "reference_url": "https://www.exploit-db.com/exploits/39918/", "reference_id": "39918", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "https://www.exploit-db.com/exploits/39918/" }, { "reference_url": "https://www.exploit-db.com/exploits/40619/", "reference_id": "40619", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "https://www.exploit-db.com/exploits/40619/" }, { "reference_url": "https://www.exploit-db.com/exploits/40938/", "reference_id": "40938", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "https://www.exploit-db.com/exploits/40938/" }, { "reference_url": "https://www.exploit-db.com/exploits/42938/", "reference_id": "42938", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "https://www.exploit-db.com/exploits/42938/" }, { "reference_url": "http://secunia.com/advisories/59272", "reference_id": "59272", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://secunia.com/advisories/59272" }, { "reference_url": "http://secunia.com/advisories/59737", "reference_id": "59737", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://secunia.com/advisories/59737" }, { "reference_url": "http://secunia.com/advisories/60947", "reference_id": "60947", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://secunia.com/advisories/60947" }, { "reference_url": "http://secunia.com/advisories/61542", "reference_id": "61542", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://secunia.com/advisories/61542" }, { "reference_url": "http://secunia.com/advisories/61547", "reference_id": "61547", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://secunia.com/advisories/61547" }, { "reference_url": "http://secunia.com/advisories/61676", "reference_id": "61676", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://secunia.com/advisories/61676" }, { "reference_url": "http://secunia.com/advisories/61700", "reference_id": "61700", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://secunia.com/advisories/61700" }, { "reference_url": "http://secunia.com/advisories/61715", "reference_id": "61715", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://secunia.com/advisories/61715" }, { "reference_url": "http://www.securityfocus.com/bid/70103", "reference_id": "70103", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://www.securityfocus.com/bid/70103" }, { "reference_url": "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html", "reference_id": "Apache-mod_cgi-Remote-Command-Execution.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html" }, { "reference_url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/", "reference_id": "bash-specially-crafted-environment-variables-code-injection-attack", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/" }, { "reference_url": "https://github.com/HackerFantastic/Public/blob/777a32d7277e778386e650632fdd9643f0d812ac/exploits/trendmicro_IWSVA_shellshock.py", "reference_id": "CVE-2014-6271", "reference_type": "exploit", "scores": [], "url": "https://github.com/HackerFantastic/Public/blob/777a32d7277e778386e650632fdd9643f0d812ac/exploits/trendmicro_IWSVA_shellshock.py" }, { "reference_url": "https://github.com/HackerFantastic/Public/blob/8f5283534c3868814afc66d9e72963eced49c27b/exploits/rsshellshock.py", "reference_id": "CVE-2014-6271", "reference_type": "exploit", "scores": [], "url": "https://github.com/HackerFantastic/Public/blob/8f5283534c3868814afc66d9e72963eced49c27b/exploits/rsshellshock.py" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/remote/39918.rb", "reference_id": "CVE-2014-6271", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/remote/39918.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/remote/40619.py", "reference_id": "CVE-2014-6271", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/remote/40619.py" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40938.py", "reference_id": "CVE-2014-6271", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40938.py" }, { "reference_url": "http://support.novell.com/security/cve/CVE-2014-6271.html", "reference_id": "CVE-2014-6271.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://support.novell.com/security/cve/CVE-2014-6271.html" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/42938.rb", "reference_id": "CVE-2014-6271;OSVDB-112004", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/42938.rb" }, { "reference_url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/9b75ef7c367fd41f8010f7de2cb32f35503ed5e4/modules/exploits/unix/smtp/qmail_bash_env_exec.rb", "reference_id": "CVE-2014-6271;OSVDB-112004", "reference_type": "exploit", "scores": [], "url": "https://raw.githubusercontent.com/rapid7/metasploit-framework/9b75ef7c367fd41f8010f7de2cb32f35503ed5e4/modules/exploits/unix/smtp/qmail_bash_env_exec.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/34900.py", "reference_id": "CVE-2014-6278;CVE-2014-6271", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/34900.py" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/remote/38849.rb", "reference_id": "CVE-2014-7196;OSVDB-112004;CVE-2014-6271", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/remote/38849.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/webapps/34839.py", "reference_id": "CVE-2014-7910;CVE-2014-7227;CVE-2014-7196;CVE-2014-7169;CVE-2014-62771;OSVDB-112004;CVE-2014-6271;CVE-2014-3671;CVE-2014-3659", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/webapps/34839.py" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/35115.rb", "reference_id": "CVE-2014-7910;CVE-2014-7227;CVE-2014-7196;CVE-2014-7169;CVE-2014-62771;OSVDB-112004;CVE-2014-6271;CVE-2014-3671;CVE-2014-3659", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/35115.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/35146.txt", "reference_id": "CVE-2014-7910;CVE-2014-7227;CVE-2014-7196;CVE-2014-7169;CVE-2014-62771;OSVDB-112004;CVE-2014-6271;CVE-2014-3671;CVE-2014-3659", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/35146.txt" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/webapps/34895.rb", "reference_id": "CVE-2014-7910;CVE-2014-7227;CVE-2014-7196;CVE-2014-7169;OSVDB-112004;CVE-2014-62771;CVE-2014-6271;CVE-2014-3671;CVE-2014-3659", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/webapps/34895.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/34879.txt", "reference_id": "CVE-2014-7910;CVE-2014-7227;CVE-2014-7196;CVE-2014-7169;OSVDB-112004;CVE-2014-62771;CVE-2014-6271;CVE-2014-3671;CVE-2014-3659", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/34879.txt" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/34896.py", "reference_id": "CVE-2014-7910;CVE-2014-7227;CVE-2014-7196;CVE-2014-7169;OSVDB-112004;CVE-2014-62771;CVE-2014-6271;CVE-2014-3671;CVE-2014-3659", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/34896.py" }, { "reference_url": "https://github.com/d3vpp/metasploit-modules", "reference_id": "CVE-2014-7910;OSVDB-112004;CVE-2014-7227;CVE-2014-7196;CVE-2014-7169;CVE-2014-62771;CVE-2014-6271;CVE-2014-3671;CVE-2014-3659", "reference_type": "exploit", "scores": [], "url": "https://github.com/d3vpp/metasploit-modules" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/remote/34777.rb", "reference_id": "CVE-2014-7910;OSVDB-112004;CVE-2014-7227;CVE-2014-7196;CVE-2014-7169;CVE-2014-62771;CVE-2014-6271;CVE-2014-3671;CVE-2014-3659", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/remote/34777.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/remote/36503.rb", "reference_id": "CVE-2014-7910;OSVDB-112004;CVE-2014-7227;CVE-2014-7196;CVE-2014-7169;CVE-2014-62771;CVE-2014-6271;CVE-2014-3671;CVE-2014-3659", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/remote/36503.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/remote/36504.rb", "reference_id": "CVE-2014-7910;OSVDB-112004;CVE-2014-7227;CVE-2014-7196;CVE-2014-7169;CVE-2014-62771;CVE-2014-6271;CVE-2014-3671;CVE-2014-3659", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/remote/36504.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/34765.txt", "reference_id": "CVE-2014-7910;OSVDB-112004;CVE-2014-7227;CVE-2014-7196;CVE-2014-7169;CVE-2014-62771;CVE-2014-6271;CVE-2014-3671;CVE-2014-3659", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/34765.txt" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/34766.php", "reference_id": "CVE-2014-7910;OSVDB-112004;CVE-2014-7227;CVE-2014-7196;CVE-2014-7169;CVE-2014-62771;CVE-2014-6271;CVE-2014-3671;CVE-2014-3659", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/34766.php" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/34862.rb", "reference_id": "CVE-2014-7910;OSVDB-112004;CVE-2014-7227;CVE-2014-7196;CVE-2014-7169;CVE-2014-62771;CVE-2014-6271;CVE-2014-3671;CVE-2014-3659", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/34862.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/37816.txt", "reference_id": "CVE-2014-8008;CVE-2014-6271;OSVDB-126132;OSVDB-126131;OSVDB-117422", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/37816.txt" }, { "reference_url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", "reference_id": "CVE-2014-8008;CVE-2014-6271;OSVDB-126132;OSVDB-126131;OSVDB-117422", "reference_type": "exploit", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3032", "reference_id": "dsa-3032", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://www.debian.org/security/2014/dsa-3032" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-1293.html", "reference_id": "ELSA-2014-1293.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://linux.oracle.com/errata/ELSA-2014-1293.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-1294.html", "reference_id": "ELSA-2014-1294.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://linux.oracle.com/errata/ELSA-2014-1294.html" }, { "reference_url": "https://security.gentoo.org/glsa/201409-09", "reference_id": "GLSA-201409-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201409-09" }, { "reference_url": "http://support.apple.com/kb/HT6495", "reference_id": "HT6495", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://support.apple.com/kb/HT6495" }, { "reference_url": "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html", "reference_id": "IPFire-Bash-Environment-Variable-Injection-Shellshock.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141216207813411&w=2", "reference_id": "?l=bugtraq&m=141216207813411&w=2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141216207813411&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141216668515282&w=2", "reference_id": "?l=bugtraq&m=141216668515282&w=2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141216668515282&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141235957116749&w=2", "reference_id": "?l=bugtraq&m=141235957116749&w=2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141235957116749&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141319209015420&w=2", "reference_id": "?l=bugtraq&m=141319209015420&w=2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141319209015420&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141330425327438&w=2", "reference_id": "?l=bugtraq&m=141330425327438&w=2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141330425327438&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142719845423222&w=2", "reference_id": "?l=bugtraq&m=142719845423222&w=2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://marc.info/?l=bugtraq&m=142719845423222&w=2" }, { "reference_url": "http://advisories.mageia.org/MGASA-2014-0388.html", "reference_id": "MGASA-2014-0388.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://advisories.mageia.org/MGASA-2014-0388.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html", "reference_id": "msg00028.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html", "reference_id": "msg00029.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html", "reference_id": "msg00034.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html", "reference_id": "msg00040.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html", "reference_id": "msg00049.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html" }, { "reference_url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html", "reference_id": "quick-notes-about-bash-bug-its-impact.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1293", "reference_id": "RHSA-2014:1293", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1293" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1293.html", "reference_id": "RHSA-2014-1293.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1293.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1294", "reference_id": "RHSA-2014:1294", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1294" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1294.html", "reference_id": "RHSA-2014-1294.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1294.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1295", "reference_id": "RHSA-2014:1295", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1295" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1295.html", "reference_id": "RHSA-2014-1295.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1295.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1354", "reference_id": "RHSA-2014:1354", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1354" }, { "reference_url": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html", "reference_id": "SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html" }, { "reference_url": "http://www.us-cert.gov/ncas/alerts/TA14-268A", "reference_id": "TA14-268A", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://www.us-cert.gov/ncas/alerts/TA14-268A" }, { "reference_url": "https://usn.ubuntu.com/2362-1/", "reference_id": "USN-2362-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2362-1/" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2362-1", "reference_id": "USN-2362-1", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:45:49Z/" } ], "url": "http://www.ubuntu.com/usn/USN-2362-1" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571521?format=api", "purl": "pkg:deb/debian/bash@4.2%2Bdfsg-0.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4c4h-9zpn-kkd2" }, { "vulnerability": "VCID-556k-17z3-auc2" }, { "vulnerability": "VCID-az8z-jtp2-tyhj" }, { "vulnerability": "VCID-ba3s-az62-fkdc" }, { "vulnerability": "VCID-hvf8-a8kf-qqbq" }, { "vulnerability": "VCID-hxgp-7aap-xqh6" }, { "vulnerability": "VCID-jqym-yvag-qfcz" }, { "vulnerability": "VCID-k9hm-bh92-qfan" }, { "vulnerability": "VCID-nm4t-6dw6-vbby" }, { "vulnerability": "VCID-sqj7-9htv-nbfn" }, { "vulnerability": "VCID-up13-8aex-7qfy" }, { "vulnerability": "VCID-yje9-sb3a-kubp" }, { "vulnerability": "VCID-yz3v-qgsz-53ew" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bash@4.2%252Bdfsg-0.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051161?format=api", "purl": "pkg:deb/debian/bash@4.3-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4c4h-9zpn-kkd2" }, { "vulnerability": "VCID-556k-17z3-auc2" }, { "vulnerability": "VCID-hvf8-a8kf-qqbq" }, { "vulnerability": "VCID-jqym-yvag-qfcz" }, { "vulnerability": "VCID-nm4t-6dw6-vbby" }, { "vulnerability": "VCID-up13-8aex-7qfy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bash@4.3-11" } ], "aliases": [ "CVE-2014-6271" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ba3s-az62-fkdc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38383?format=api", "vulnerability_id": "VCID-hvf8-a8kf-qqbq", "summary": "Multiple vulnerabilities were found in Bash, the worst of which may\n allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9401.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9401.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9401", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19094", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19173", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19307", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1936", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19077", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19157", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1921", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19217", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19171", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19116", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19075", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19086", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9401" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9401", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9401" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396383", "reference_id": "1396383", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1396383" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/11/17/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-06T21:11:48Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2016/11/17/5" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844727", "reference_id": "844727", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=844727" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/11/17/9", "reference_id": "9", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-06T21:11:48Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2016/11/17/9" }, { "reference_url": "http://www.securityfocus.com/bid/94398", "reference_id": "94398", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-06T21:11:48Z/" } ], "url": "http://www.securityfocus.com/bid/94398" }, { "reference_url": "https://security.gentoo.org/glsa/201701-02", "reference_id": "GLSA-201701-02", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-06T21:11:48Z/" } ], "url": "https://security.gentoo.org/glsa/201701-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0725", "reference_id": "RHSA-2017:0725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0725" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0725.html", "reference_id": "RHSA-2017-0725.html", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-06T21:11:48Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0725.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1931", "reference_id": "RHSA-2017:1931", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-06T21:11:48Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1931" }, { "reference_url": "https://usn.ubuntu.com/3294-1/", "reference_id": "USN-3294-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3294-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051163?format=api", "purl": "pkg:deb/debian/bash@4.4-5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-556k-17z3-auc2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bash@4.4-5" } ], "aliases": [ "CVE-2016-9401" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hvf8-a8kf-qqbq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39492?format=api", "vulnerability_id": "VCID-hxgp-7aap-xqh6", "summary": "Multiple parsing flaws in Bash could allow remote attackers to\n inject code or cause a Denial of Service condition.", "references": [ { "reference_url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", "reference_id": "", "reference_type": "", "scores": [], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "reference_url": "http://jvn.jp/en/jp/JVN55667175/index.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141330468527613&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141330468527613&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141345648114150&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141345648114150&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383026420882&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141383026420882&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383081521087&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141383081521087&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383138121313&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141383138121313&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383196021590&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141383196021590&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383244821813&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141383244821813&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383304022067&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141383304022067&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141450491804793&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141450491804793&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141576728022234&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141576728022234&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141577137423233&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141577137423233&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141577241923505&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141577241923505&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141577297623641&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141577297623641&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141585637922673&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141585637922673&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141694386919794&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141694386919794&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142113462216480&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=142113462216480&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142289270617409&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=142289270617409&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142358078406056&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=142358078406056&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2" }, { "reference_url": "http://openwall.com/lists/oss-security/2014/09/25/32", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "reference_url": "http://openwall.com/lists/oss-security/2014/09/26/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "reference_url": "http://openwall.com/lists/oss-security/2014/09/28/10", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "reference_url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "reference_url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7186.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7186.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7186", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.8935", "scoring_system": "epss", "scoring_elements": "0.99545", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.8935", "scoring_system": "epss", "scoring_elements": "0.99544", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.89872", "scoring_system": "epss", "scoring_elements": "0.99572", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.90174", "scoring_system": "epss", "scoring_elements": "0.99587", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.90174", "scoring_system": "epss", "scoring_elements": "0.9959", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.90174", "scoring_system": "epss", "scoring_elements": "0.99588", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.90174", "scoring_system": "epss", "scoring_elements": "0.99589", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7186" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187" }, { "reference_url": "http://seclists.org/fulldisclosure/2014/Oct/0", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "reference_url": "http://secunia.com/advisories/58200", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/58200" }, { "reference_url": "http://secunia.com/advisories/59907", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59907" }, { "reference_url": "http://secunia.com/advisories/60024", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60024" }, { "reference_url": "http://secunia.com/advisories/60034", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60034" }, { "reference_url": "http://secunia.com/advisories/60044", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60044" }, { "reference_url": "http://secunia.com/advisories/60055", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60055" }, { "reference_url": "http://secunia.com/advisories/60063", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60063" }, { "reference_url": "http://secunia.com/advisories/60193", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60193" }, { "reference_url": "http://secunia.com/advisories/60433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60433" }, { "reference_url": "http://secunia.com/advisories/61065", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61065" }, { "reference_url": "http://secunia.com/advisories/61128", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61128" }, { "reference_url": "http://secunia.com/advisories/61129", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61129" }, { "reference_url": "http://secunia.com/advisories/61188", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61188" }, { "reference_url": "http://secunia.com/advisories/61283", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61283" }, { "reference_url": "http://secunia.com/advisories/61287", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61287" }, { "reference_url": "http://secunia.com/advisories/61291", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61291" }, { "reference_url": "http://secunia.com/advisories/61312", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61312" }, { "reference_url": "http://secunia.com/advisories/61313", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61313" }, { "reference_url": "http://secunia.com/advisories/61328", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61328" }, { "reference_url": "http://secunia.com/advisories/61442", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61442" }, { "reference_url": "http://secunia.com/advisories/61471", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61471" }, { "reference_url": "http://secunia.com/advisories/61479", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61479" }, { "reference_url": "http://secunia.com/advisories/61485", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61485" }, { "reference_url": "http://secunia.com/advisories/61503", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61503" }, { "reference_url": "http://secunia.com/advisories/61550", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61550" }, { "reference_url": "http://secunia.com/advisories/61552", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61552" }, { "reference_url": "http://secunia.com/advisories/61565", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61565" }, { "reference_url": "http://secunia.com/advisories/61603", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61603" }, { "reference_url": "http://secunia.com/advisories/61618", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61618" }, { "reference_url": "http://secunia.com/advisories/61622", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61622" }, { "reference_url": "http://secunia.com/advisories/61633", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61633" }, { "reference_url": "http://secunia.com/advisories/61636", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61636" }, { "reference_url": "http://secunia.com/advisories/61641", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61641" }, { "reference_url": "http://secunia.com/advisories/61643", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61643" }, { "reference_url": "http://secunia.com/advisories/61654", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61654" }, { "reference_url": "http://secunia.com/advisories/61703", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61703" }, { "reference_url": "http://secunia.com/advisories/61711", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61711" }, { "reference_url": "http://secunia.com/advisories/61780", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61780" }, { "reference_url": "http://secunia.com/advisories/61816", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61816" }, { "reference_url": "http://secunia.com/advisories/61873", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61873" }, { "reference_url": "http://secunia.com/advisories/62228", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62228" }, { "reference_url": "http://secunia.com/advisories/62312", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62312" }, { "reference_url": "http://secunia.com/advisories/62343", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62343" }, { "reference_url": "https://kb.bluecoat.com/index?page=content&id=SA82", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kb.bluecoat.com/index?page=content&id=SA82" }, { "reference_url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10085" }, { "reference_url": "https://support.apple.com/HT205267", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT205267" }, { "reference_url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", "reference_id": "", "reference_type": "", "scores": [], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts" }, { "reference_url": "https://support.citrix.com/article/CTX200217", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.citrix.com/article/CTX200217" }, { "reference_url": "https://support.citrix.com/article/CTX200223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.citrix.com/article/CTX200223" }, { "reference_url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183" }, { "reference_url": "http://support.apple.com/HT204244", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/HT204244" }, { "reference_url": "http://support.novell.com/security/cve/CVE-2014-7186.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.novell.com/security/cve/CVE-2014-7186.html" }, { "reference_url": "https://www.suse.com/support/shellshock/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.suse.com/support/shellshock/" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "reference_url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "reference_url": "http://www.novell.com/support/kb/doc.php?id=7015721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "reference_url": "http://www.qnap.com/i/en/support/con_show.php?cid=61", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "reference_url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2364-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2364-1" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146791", "reference_id": "1146791", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146791" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186", "reference_id": "CVE-2014-7186", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186" }, { "reference_url": "https://security.gentoo.org/glsa/201410-01", "reference_id": "GLSA-201410-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201410-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1306", "reference_id": "RHSA-2014:1306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1311", "reference_id": "RHSA-2014:1311", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1311" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1312", "reference_id": "RHSA-2014:1312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1354", "reference_id": "RHSA-2014:1354", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1354" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1865", "reference_id": "RHSA-2014:1865", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1865" }, { "reference_url": "https://usn.ubuntu.com/2364-1/", "reference_id": "USN-2364-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2364-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571521?format=api", "purl": "pkg:deb/debian/bash@4.2%2Bdfsg-0.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4c4h-9zpn-kkd2" }, { "vulnerability": "VCID-556k-17z3-auc2" }, { "vulnerability": "VCID-az8z-jtp2-tyhj" }, { "vulnerability": "VCID-ba3s-az62-fkdc" }, { "vulnerability": "VCID-hvf8-a8kf-qqbq" }, { "vulnerability": "VCID-hxgp-7aap-xqh6" }, { "vulnerability": "VCID-jqym-yvag-qfcz" }, { "vulnerability": "VCID-k9hm-bh92-qfan" }, { "vulnerability": "VCID-nm4t-6dw6-vbby" }, { "vulnerability": "VCID-sqj7-9htv-nbfn" }, { "vulnerability": "VCID-up13-8aex-7qfy" }, { "vulnerability": "VCID-yje9-sb3a-kubp" }, { "vulnerability": "VCID-yz3v-qgsz-53ew" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bash@4.2%252Bdfsg-0.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051161?format=api", "purl": "pkg:deb/debian/bash@4.3-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4c4h-9zpn-kkd2" }, { "vulnerability": "VCID-556k-17z3-auc2" }, { "vulnerability": "VCID-hvf8-a8kf-qqbq" }, { "vulnerability": "VCID-jqym-yvag-qfcz" }, { "vulnerability": "VCID-nm4t-6dw6-vbby" }, { "vulnerability": "VCID-up13-8aex-7qfy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bash@4.3-11" } ], "aliases": [ "CVE-2014-7186" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hxgp-7aap-xqh6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82740?format=api", "vulnerability_id": "VCID-jqym-yvag-qfcz", "summary": "bash: BASH_CMD is writable in restricted bash shells", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/bash.git/tree/CHANGES?h=bash-4.4-testing#n65", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/bash.git/tree/CHANGES?h=bash-4.4-testing#n65" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00049.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00049.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9924.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9924.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9924", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54394", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54501", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54504", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54483", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54524", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54472", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54495", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54463", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54515", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54509", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54521", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-9924" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1803441", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1803441" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9924" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00028.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190411-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190411-0001/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1691774", "reference_id": "1691774", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1691774" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.4:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.4:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.4:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9924", "reference_id": "CVE-2019-9924", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9924" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1113", "reference_id": "RHSA-2020:1113", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1113" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3474", "reference_id": "RHSA-2020:3474", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3474" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3592", "reference_id": "RHSA-2020:3592", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3592" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3803", "reference_id": "RHSA-2020:3803", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3803" }, { "reference_url": "https://usn.ubuntu.com/4058-1/", "reference_id": "USN-4058-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4058-1/" }, { "reference_url": "https://usn.ubuntu.com/4058-2/", "reference_id": "USN-4058-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4058-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051163?format=api", "purl": "pkg:deb/debian/bash@4.4-5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-556k-17z3-auc2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bash@4.4-5" } ], "aliases": [ "CVE-2019-9924" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jqym-yvag-qfcz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82478?format=api", "vulnerability_id": "VCID-k9hm-bh92-qfan", "summary": "bash: heap-based buffer overflow during echo of unsupported characters", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6711.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6711.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6711", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22779", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22811", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22824", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22819", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22963", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22756", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22831", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22884", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22905", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22867", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33145", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33014", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6711" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721071", "reference_id": "1721071", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721071" }, { "reference_url": "https://usn.ubuntu.com/4180-1/", "reference_id": "USN-4180-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4180-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051161?format=api", "purl": "pkg:deb/debian/bash@4.3-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4c4h-9zpn-kkd2" }, { "vulnerability": "VCID-556k-17z3-auc2" }, { "vulnerability": "VCID-hvf8-a8kf-qqbq" }, { "vulnerability": "VCID-jqym-yvag-qfcz" }, { "vulnerability": "VCID-nm4t-6dw6-vbby" }, { "vulnerability": "VCID-up13-8aex-7qfy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bash@4.3-11" } ], "aliases": [ "CVE-2012-6711" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k9hm-bh92-qfan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31734?format=api", "vulnerability_id": "VCID-m98m-wbj2-zbdk", "summary": "Two vulnerabilities have been found in Bash, the worst of which may\n allow execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.gnu.org/pub/gnu/bash/bash-4.2-patches/bash42-033", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.gnu.org/pub/gnu/bash/bash-4.2-patches/bash42-033" }, { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681278", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681278" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3410.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3410.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3410", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24306", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24354", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2448", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24514", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24297", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24364", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24409", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24425", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24383", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24327", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24344", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24334", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3410" }, { "reference_url": "http://secunia.com/advisories/51086", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/51086" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201210-05.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201210-05.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77551" }, { "reference_url": "https://hermes.opensuse.org/messages/15227834", "reference_id": "", "reference_type": "", "scores": [], "url": "https://hermes.opensuse.org/messages/15227834" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:128", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:128" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/07/11/11", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/07/11/11" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/07/11/22", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/07/11/22" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/07/12/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/07/12/4" }, { "reference_url": "http://www.securityfocus.com/bid/54937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/54937" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681278", "reference_id": "681278", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681278" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840091", "reference_id": "840091", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840091" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3410", "reference_id": "CVE-2012-3410", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3410" }, { "reference_url": "https://security.gentoo.org/glsa/201210-05", "reference_id": "GLSA-201210-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201210-05" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571521?format=api", "purl": "pkg:deb/debian/bash@4.2%2Bdfsg-0.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4c4h-9zpn-kkd2" }, { "vulnerability": "VCID-556k-17z3-auc2" }, { "vulnerability": "VCID-az8z-jtp2-tyhj" }, { "vulnerability": "VCID-ba3s-az62-fkdc" }, { "vulnerability": "VCID-hvf8-a8kf-qqbq" }, { "vulnerability": "VCID-hxgp-7aap-xqh6" }, { "vulnerability": "VCID-jqym-yvag-qfcz" }, { "vulnerability": "VCID-k9hm-bh92-qfan" }, { "vulnerability": "VCID-nm4t-6dw6-vbby" }, { "vulnerability": "VCID-sqj7-9htv-nbfn" }, { "vulnerability": "VCID-up13-8aex-7qfy" }, { "vulnerability": "VCID-yje9-sb3a-kubp" }, { "vulnerability": "VCID-yz3v-qgsz-53ew" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bash@4.2%252Bdfsg-0.1%252Bdeb7u3" } ], "aliases": [ "CVE-2012-3410" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m98m-wbj2-zbdk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40737?format=api", "vulnerability_id": "VCID-nm4t-6dw6-vbby", "summary": "A vulnerability in Bash could potentially lead to arbitrary code\n execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0634.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0634.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0634", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02219", "scoring_system": "epss", "scoring_elements": "0.84512", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02219", "scoring_system": "epss", "scoring_elements": "0.84417", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02219", "scoring_system": "epss", "scoring_elements": "0.84433", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02219", "scoring_system": "epss", "scoring_elements": "0.84452", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02219", "scoring_system": "epss", "scoring_elements": "0.84453", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02219", "scoring_system": "epss", "scoring_elements": "0.84475", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02219", "scoring_system": "epss", "scoring_elements": "0.84481", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02219", "scoring_system": "epss", "scoring_elements": "0.84499", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02219", "scoring_system": "epss", "scoring_elements": "0.84493", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02219", "scoring_system": "epss", "scoring_elements": "0.84489", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02219", "scoring_system": "epss", "scoring_elements": "0.8451", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/09/20/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:15Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2016/09/20/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/09/18/11", "reference_id": "11", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:15Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2016/09/18/11" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/09/16/12", "reference_id": "12", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:15Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2016/09/16/12" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377613", "reference_id": "1377613", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:15Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377613" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/09/29/27", "reference_id": "27", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:15Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2016/09/29/27" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/10/10/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:15Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2016/10/10/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/10/10/4", "reference_id": "4", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:15Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2016/10/10/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/10/07/6", "reference_id": "6", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:15Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2016/10/07/6" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/09/19/7", "reference_id": "7", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:15Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2016/09/19/7" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/09/16/8", "reference_id": "8", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:15Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2016/09/16/8" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/09/27/9", "reference_id": "9", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:15Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2016/09/27/9" }, { "reference_url": "http://www.securityfocus.com/bid/92999", "reference_id": "92999", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:15Z/" } ], "url": "http://www.securityfocus.com/bid/92999" }, { "reference_url": "https://security.gentoo.org/glsa/201612-39", "reference_id": "GLSA-201612-39", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:15Z/" } ], "url": "https://security.gentoo.org/glsa/201612-39" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0725", "reference_id": "RHSA-2017:0725", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0725" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0725.html", "reference_id": "RHSA-2017-0725.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:15Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0725.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1931", "reference_id": "RHSA-2017:1931", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-04T15:39:15Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1931" }, { "reference_url": "https://usn.ubuntu.com/3294-1/", "reference_id": "USN-3294-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3294-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051163?format=api", "purl": "pkg:deb/debian/bash@4.4-5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-556k-17z3-auc2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bash@4.4-5" } ], "aliases": [ "CVE-2016-0634" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nm4t-6dw6-vbby" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39490?format=api", "vulnerability_id": "VCID-sqj7-9htv-nbfn", "summary": "Multiple parsing flaws in Bash could allow remote attackers to\n inject code or cause a Denial of Service condition.", "references": [ { "reference_url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", "reference_id": "", "reference_type": "", "scores": [], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "reference_url": "http://jvn.jp/en/jp/JVN55667175/index.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "reference_url": "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html" }, { "reference_url": "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-3093", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-3093" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-3094", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-3094" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141330468527613&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141330468527613&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141345648114150&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141345648114150&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383026420882&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141383026420882&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383081521087&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141383081521087&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383196021590&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141383196021590&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383244821813&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141383244821813&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383304022067&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141383304022067&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383353622268&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141383353622268&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383465822787&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141383465822787&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141450491804793&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141450491804793&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141576728022234&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141576728022234&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141577137423233&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141577137423233&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141577241923505&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141577241923505&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141577297623641&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141577297623641&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141585637922673&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141585637922673&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142289270617409&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=142289270617409&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142358078406056&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=142358078406056&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2" }, { "reference_url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6277.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6277.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6277", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.86544", "scoring_system": "epss", "scoring_elements": "0.99416", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.86752", "scoring_system": "epss", "scoring_elements": "0.99427", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.86752", "scoring_system": "epss", "scoring_elements": "0.99426", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.87816", "scoring_system": "epss", "scoring_elements": "0.99468", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.87816", "scoring_system": "epss", "scoring_elements": "0.99474", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.87816", "scoring_system": "epss", "scoring_elements": "0.99475", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.87816", "scoring_system": "epss", "scoring_elements": "0.99473", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.87816", "scoring_system": "epss", "scoring_elements": "0.9947", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.87816", "scoring_system": "epss", "scoring_elements": "0.99471", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277" }, { "reference_url": "http://secunia.com/advisories/58200", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/58200" }, { "reference_url": "http://secunia.com/advisories/59907", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59907" }, { "reference_url": "http://secunia.com/advisories/59961", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59961" }, { "reference_url": "http://secunia.com/advisories/60024", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60024" }, { "reference_url": "http://secunia.com/advisories/60034", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60034" }, { "reference_url": "http://secunia.com/advisories/60044", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60044" }, { "reference_url": "http://secunia.com/advisories/60055", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60055" }, { "reference_url": "http://secunia.com/advisories/60063", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60063" }, { "reference_url": "http://secunia.com/advisories/60193", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60193" }, { "reference_url": "http://secunia.com/advisories/60325", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60325" }, { "reference_url": "http://secunia.com/advisories/60433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60433" }, { "reference_url": "http://secunia.com/advisories/61065", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61065" }, { "reference_url": "http://secunia.com/advisories/61128", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61128" }, { "reference_url": "http://secunia.com/advisories/61129", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61129" }, { "reference_url": "http://secunia.com/advisories/61283", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61283" }, { "reference_url": "http://secunia.com/advisories/61287", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61287" }, { "reference_url": "http://secunia.com/advisories/61291", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61291" }, { "reference_url": "http://secunia.com/advisories/61312", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61312" }, { "reference_url": "http://secunia.com/advisories/61313", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61313" }, { "reference_url": "http://secunia.com/advisories/61328", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61328" }, { "reference_url": "http://secunia.com/advisories/61442", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61442" }, { "reference_url": "http://secunia.com/advisories/61471", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61471" }, { "reference_url": "http://secunia.com/advisories/61485", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61485" }, { "reference_url": "http://secunia.com/advisories/61503", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61503" }, { "reference_url": "http://secunia.com/advisories/61550", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61550" }, { "reference_url": "http://secunia.com/advisories/61552", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61552" }, { "reference_url": "http://secunia.com/advisories/61565", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61565" }, { "reference_url": "http://secunia.com/advisories/61603", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61603" }, { "reference_url": "http://secunia.com/advisories/61633", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61633" }, { "reference_url": "http://secunia.com/advisories/61641", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61641" }, { "reference_url": "http://secunia.com/advisories/61643", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61643" }, { "reference_url": "http://secunia.com/advisories/61654", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61654" }, { "reference_url": "http://secunia.com/advisories/61703", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61703" }, { "reference_url": "http://secunia.com/advisories/61780", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61780" }, { "reference_url": "http://secunia.com/advisories/61816", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61816" }, { "reference_url": "http://secunia.com/advisories/61857", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61857" }, { "reference_url": "http://secunia.com/advisories/62312", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62312" }, { "reference_url": "http://secunia.com/advisories/62343", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62343" }, { "reference_url": "https://kb.bluecoat.com/index?page=content&id=SA82", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kb.bluecoat.com/index?page=content&id=SA82" }, { "reference_url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10085" }, { "reference_url": "https://support.apple.com/HT205267", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT205267" }, { "reference_url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", "reference_id": "", "reference_type": "", "scores": [], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts" }, { "reference_url": "https://support.citrix.com/article/CTX200217", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.citrix.com/article/CTX200217" }, { "reference_url": "https://support.citrix.com/article/CTX200223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.citrix.com/article/CTX200223" }, { "reference_url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183" }, { "reference_url": "http://support.apple.com/HT204244", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/HT204244" }, { "reference_url": "http://support.novell.com/security/cve/CVE-2014-6277.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.novell.com/security/cve/CVE-2014-6277.html" }, { "reference_url": "https://www.suse.com/support/shellshock/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.suse.com/support/shellshock/" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "reference_url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "reference_url": "http://www.novell.com/support/kb/doc.php?id=7015721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "reference_url": "http://www.qnap.com/i/en/support/con_show.php?cid=61", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2380-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2380-1" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1147189", "reference_id": "1147189", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1147189" }, { "reference_url": "https://security.archlinux.org/AVG-924", "reference_id": "AVG-924", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-924" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35081.txt", "reference_id": "CVE-2014-6277", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35081.txt" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6277", "reference_id": "CVE-2014-6277", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6277" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36933.py", "reference_id": "CVE-2014-7187;CVE-2014-7186;CVE-2014-7169;CVE-2014-6278;CVE-2014-6277", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36933.py" }, { "reference_url": "https://security.gentoo.org/glsa/201410-01", "reference_id": "GLSA-201410-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201410-01" }, { "reference_url": "https://usn.ubuntu.com/2380-1/", "reference_id": "USN-2380-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2380-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051161?format=api", "purl": "pkg:deb/debian/bash@4.3-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4c4h-9zpn-kkd2" }, { "vulnerability": "VCID-556k-17z3-auc2" }, { "vulnerability": "VCID-hvf8-a8kf-qqbq" }, { "vulnerability": "VCID-jqym-yvag-qfcz" }, { "vulnerability": "VCID-nm4t-6dw6-vbby" }, { "vulnerability": "VCID-up13-8aex-7qfy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bash@4.3-11" } ], "aliases": [ "CVE-2014-6277" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sqj7-9htv-nbfn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31733?format=api", "vulnerability_id": "VCID-twyf-cbfd-hka1", "summary": "Two vulnerabilities have been found in Bash, the worst of which may\n allow execution of arbitrary code.", "references": [ { "reference_url": "http://lists.debian.org/debian-devel/2008/08/msg00347.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.debian.org/debian-devel/2008/08/msg00347.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5374.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5374.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5374", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17068", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.1707", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17244", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17294", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17074", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17165", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17222", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17198", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.1715", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17091", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17028", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17033", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5374" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5374", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5374" }, { "reference_url": "http://secunia.com/advisories/43365", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/43365" }, { "reference_url": "http://secunia.com/advisories/51086", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/51086" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201210-05.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201210-05.xml" }, { "reference_url": "http://uvw.ru/report.sid.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://uvw.ru/report.sid.txt" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:004", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:004" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-0261.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-0261.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2011-1073.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2011-1073.html" }, { "reference_url": "http://www.securityfocus.com/bid/32733", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32733" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0414", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0414" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=475474", "reference_id": "475474", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=475474" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=509279", "reference_id": "509279", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=509279" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:matthias_klose:bash-doc:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:matthias_klose:bash-doc:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:matthias_klose:bash-doc:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5374", "reference_id": "CVE-2008-5374", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5374" }, { "reference_url": "https://security.gentoo.org/glsa/201210-05", "reference_id": "GLSA-201210-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201210-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:0261", "reference_id": "RHSA-2011:0261", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:0261" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1073", "reference_id": "RHSA-2011:1073", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1073" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571519?format=api", "purl": "pkg:deb/debian/bash@4.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4c4h-9zpn-kkd2" }, { "vulnerability": "VCID-556k-17z3-auc2" }, { "vulnerability": "VCID-az8z-jtp2-tyhj" }, { "vulnerability": "VCID-ba3s-az62-fkdc" }, { "vulnerability": "VCID-hvf8-a8kf-qqbq" }, { "vulnerability": "VCID-hxgp-7aap-xqh6" }, { "vulnerability": "VCID-jqym-yvag-qfcz" }, { "vulnerability": "VCID-k9hm-bh92-qfan" }, { "vulnerability": "VCID-m98m-wbj2-zbdk" }, { "vulnerability": "VCID-nm4t-6dw6-vbby" }, { "vulnerability": "VCID-sqj7-9htv-nbfn" }, { "vulnerability": "VCID-up13-8aex-7qfy" }, { "vulnerability": "VCID-yje9-sb3a-kubp" }, { "vulnerability": "VCID-yz3v-qgsz-53ew" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bash@4.1-3" } ], "aliases": [ "CVE-2008-5374" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-twyf-cbfd-hka1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84633?format=api", "vulnerability_id": "VCID-up13-8aex-7qfy", "summary": "bash: Code execution in bash autocompletion", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/bash.git/commit/?id=4f747edc625815f449048579f6e65869914dd715", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/bash.git/commit/?id=4f747edc625815f449048579f6e65869914dd715" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5932.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5932.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5932", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.4383", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43828", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43874", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43897", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43878", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43881", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00213", "scoring_system": "epss", "scoring_elements": "0.43899", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45774", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.4578", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.45722", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00229", "scoring_system": "epss", "scoring_elements": "0.4573", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5932" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5932" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.gnu.org/archive/html/bug-bash/2017-01/msg00034.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.gnu.org/archive/html/bug-bash/2017-01/msg00034.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/02/08/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/02/08/3" }, { "reference_url": "http://www.securityfocus.com/bid/96136", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/96136" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420674", "reference_id": "1420674", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1420674" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5932", "reference_id": "CVE-2017-5932", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5932" }, { "reference_url": "https://usn.ubuntu.com/3294-1/", "reference_id": "USN-3294-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3294-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051163?format=api", "purl": "pkg:deb/debian/bash@4.4-5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-556k-17z3-auc2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bash@4.4-5" } ], "aliases": [ "CVE-2017-5932" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-up13-8aex-7qfy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39493?format=api", "vulnerability_id": "VCID-yje9-sb3a-kubp", "summary": "Multiple parsing flaws in Bash could allow remote attackers to\n inject code or cause a Denial of Service condition.", "references": [ { "reference_url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", "reference_id": "", "reference_type": "", "scores": [], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "reference_url": "http://jvn.jp/en/jp/JVN55667175/index.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00038.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00041.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00042.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00048.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141330468527613&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141330468527613&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141345648114150&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141345648114150&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383026420882&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141383026420882&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383081521087&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141383081521087&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383138121313&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141383138121313&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383196021590&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141383196021590&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383244821813&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141383244821813&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383304022067&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141383304022067&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141450491804793&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141450491804793&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141576728022234&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141576728022234&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141577137423233&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141577137423233&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141577241923505&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141577241923505&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141577297623641&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141577297623641&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141585637922673&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141585637922673&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141694386919794&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141694386919794&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142289270617409&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=142289270617409&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142358078406056&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=142358078406056&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2" }, { "reference_url": "http://openwall.com/lists/oss-security/2014/09/25/32", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2014/09/25/32" }, { "reference_url": "http://openwall.com/lists/oss-security/2014/09/26/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2014/09/26/2" }, { "reference_url": "http://openwall.com/lists/oss-security/2014/09/28/10", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2014/09/28/10" }, { "reference_url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html" }, { "reference_url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1311.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1312.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7187.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7187.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7187", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.89861", "scoring_system": "epss", "scoring_elements": "0.99576", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.89861", "scoring_system": "epss", "scoring_elements": "0.99574", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.89861", "scoring_system": "epss", "scoring_elements": "0.99573", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.89874", "scoring_system": "epss", "scoring_elements": "0.99573", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.90343", "scoring_system": "epss", "scoring_elements": "0.99603", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.90614", "scoring_system": "epss", "scoring_elements": "0.99614", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.90614", "scoring_system": "epss", "scoring_elements": "0.99616", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.90614", "scoring_system": "epss", "scoring_elements": "0.99615", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-7187" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187" }, { "reference_url": "http://seclists.org/fulldisclosure/2014/Oct/0", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2014/Oct/0" }, { "reference_url": "http://secunia.com/advisories/58200", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/58200" }, { "reference_url": "http://secunia.com/advisories/59907", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/59907" }, { "reference_url": "http://secunia.com/advisories/60024", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60024" }, { "reference_url": "http://secunia.com/advisories/60034", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60034" }, { "reference_url": "http://secunia.com/advisories/60044", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60044" }, { "reference_url": "http://secunia.com/advisories/60055", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60055" }, { "reference_url": "http://secunia.com/advisories/60063", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60063" }, { "reference_url": "http://secunia.com/advisories/60193", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60193" }, { "reference_url": "http://secunia.com/advisories/60433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60433" }, { "reference_url": "http://secunia.com/advisories/61065", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61065" }, { "reference_url": "http://secunia.com/advisories/61128", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61128" }, { "reference_url": "http://secunia.com/advisories/61129", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61129" }, { "reference_url": "http://secunia.com/advisories/61188", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61188" }, { "reference_url": "http://secunia.com/advisories/61283", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61283" }, { "reference_url": "http://secunia.com/advisories/61287", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61287" }, { "reference_url": "http://secunia.com/advisories/61291", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61291" }, { "reference_url": "http://secunia.com/advisories/61312", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61312" }, { "reference_url": "http://secunia.com/advisories/61313", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61313" }, { "reference_url": "http://secunia.com/advisories/61328", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61328" }, { "reference_url": "http://secunia.com/advisories/61442", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61442" }, { "reference_url": "http://secunia.com/advisories/61479", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61479" }, { "reference_url": "http://secunia.com/advisories/61485", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61485" }, { "reference_url": "http://secunia.com/advisories/61503", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61503" }, { "reference_url": "http://secunia.com/advisories/61550", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61550" }, { "reference_url": "http://secunia.com/advisories/61552", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61552" }, { "reference_url": "http://secunia.com/advisories/61565", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61565" }, { "reference_url": "http://secunia.com/advisories/61603", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61603" }, { "reference_url": "http://secunia.com/advisories/61618", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61618" }, { "reference_url": "http://secunia.com/advisories/61622", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61622" }, { "reference_url": "http://secunia.com/advisories/61633", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61633" }, { "reference_url": "http://secunia.com/advisories/61636", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61636" }, { "reference_url": "http://secunia.com/advisories/61641", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61641" }, { "reference_url": "http://secunia.com/advisories/61643", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61643" }, { "reference_url": "http://secunia.com/advisories/61654", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61654" }, { "reference_url": "http://secunia.com/advisories/61703", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61703" }, { "reference_url": "http://secunia.com/advisories/61816", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61816" }, { "reference_url": "http://secunia.com/advisories/61855", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61855" }, { "reference_url": "http://secunia.com/advisories/61857", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61857" }, { "reference_url": "http://secunia.com/advisories/61873", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61873" }, { "reference_url": "http://secunia.com/advisories/62312", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62312" }, { "reference_url": "http://secunia.com/advisories/62343", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62343" }, { "reference_url": "https://kb.bluecoat.com/index?page=content&id=SA82", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kb.bluecoat.com/index?page=content&id=SA82" }, { "reference_url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10085" }, { "reference_url": "https://support.apple.com/HT205267", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.apple.com/HT205267" }, { "reference_url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", "reference_id": "", "reference_type": "", "scores": [], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts" }, { "reference_url": "https://support.citrix.com/article/CTX200217", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.citrix.com/article/CTX200217" }, { "reference_url": "https://support.citrix.com/article/CTX200223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.citrix.com/article/CTX200223" }, { "reference_url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183" }, { "reference_url": "http://support.apple.com/HT204244", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/HT204244" }, { "reference_url": "http://support.novell.com/security/cve/CVE-2014-7187.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.novell.com/security/cve/CVE-2014-7187.html" }, { "reference_url": "https://www.suse.com/support/shellshock/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.suse.com/support/shellshock/" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "reference_url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "reference_url": "http://www.novell.com/support/kb/doc.php?id=7015721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "reference_url": "http://www.qnap.com/i/en/support/con_show.php?cid=61", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "reference_url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2364-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2364-1" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146804", "reference_id": "1146804", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146804" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187", "reference_id": "CVE-2014-7187", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187" }, { "reference_url": "https://security.gentoo.org/glsa/201410-01", "reference_id": "GLSA-201410-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201410-01" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1306", "reference_id": "RHSA-2014:1306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1311", "reference_id": "RHSA-2014:1311", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1311" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1312", "reference_id": "RHSA-2014:1312", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1312" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1354", "reference_id": "RHSA-2014:1354", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1354" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1865", "reference_id": "RHSA-2014:1865", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1865" }, { "reference_url": "https://usn.ubuntu.com/2364-1/", "reference_id": "USN-2364-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2364-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571521?format=api", "purl": "pkg:deb/debian/bash@4.2%2Bdfsg-0.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4c4h-9zpn-kkd2" }, { "vulnerability": "VCID-556k-17z3-auc2" }, { "vulnerability": "VCID-az8z-jtp2-tyhj" }, { "vulnerability": "VCID-ba3s-az62-fkdc" }, { "vulnerability": "VCID-hvf8-a8kf-qqbq" }, { "vulnerability": "VCID-hxgp-7aap-xqh6" }, { "vulnerability": "VCID-jqym-yvag-qfcz" }, { "vulnerability": "VCID-k9hm-bh92-qfan" }, { "vulnerability": "VCID-nm4t-6dw6-vbby" }, { "vulnerability": "VCID-sqj7-9htv-nbfn" }, { "vulnerability": "VCID-up13-8aex-7qfy" }, { "vulnerability": "VCID-yje9-sb3a-kubp" }, { "vulnerability": "VCID-yz3v-qgsz-53ew" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bash@4.2%252Bdfsg-0.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051161?format=api", "purl": "pkg:deb/debian/bash@4.3-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4c4h-9zpn-kkd2" }, { "vulnerability": "VCID-556k-17z3-auc2" }, { "vulnerability": "VCID-hvf8-a8kf-qqbq" }, { "vulnerability": "VCID-jqym-yvag-qfcz" }, { "vulnerability": "VCID-nm4t-6dw6-vbby" }, { "vulnerability": "VCID-up13-8aex-7qfy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bash@4.3-11" } ], "aliases": [ "CVE-2014-7187" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yje9-sb3a-kubp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39491?format=api", "vulnerability_id": "VCID-yz3v-qgsz-53ew", "summary": "Multiple parsing flaws in Bash could allow remote attackers to\n inject code or cause a Denial of Service condition.", "references": [ { "reference_url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126" }, { "reference_url": "http://jvn.jp/en/jp/JVN55667175/index.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://jvn.jp/en/jp/JVN55667175/index.html" }, { "reference_url": "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html" }, { "reference_url": "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-3093", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://linux.oracle.com/errata/ELSA-2014-3093" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-3094", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://linux.oracle.com/errata/ELSA-2014-3094" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141330468527613&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141330468527613&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141345648114150&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141345648114150&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383026420882&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141383026420882&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383081521087&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141383081521087&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383196021590&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141383196021590&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383244821813&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141383244821813&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383304022067&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141383304022067&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383353622268&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141383353622268&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141383465822787&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141383465822787&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141450491804793&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141450491804793&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141576728022234&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141576728022234&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141577137423233&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141577137423233&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141577241923505&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141577241923505&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141577297623641&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141577297623641&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141585637922673&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141585637922673&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://marc.info/?l=bugtraq&m=141879528318582&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://marc.info/?l=bugtraq&m=142118135300698&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://marc.info/?l=bugtraq&m=142358026505815&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142358078406056&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://marc.info/?l=bugtraq&m=142358078406056&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://marc.info/?l=bugtraq&m=142721162228379&w=2" }, { "reference_url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html" }, { "reference_url": "http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6278.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6278.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6278", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.90105", "scoring_system": "epss", "scoring_elements": "0.99583", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.90105", "scoring_system": "epss", "scoring_elements": "0.99584", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.90105", "scoring_system": "epss", "scoring_elements": "0.99585", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.90105", "scoring_system": "epss", "scoring_elements": "0.99586", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.90105", "scoring_system": "epss", "scoring_elements": "0.99587", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.90105", "scoring_system": "epss", "scoring_elements": "0.99589", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6278" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278" }, { "reference_url": "http://secunia.com/advisories/58200", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/58200" }, { "reference_url": "http://secunia.com/advisories/59907", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/59907" }, { "reference_url": "http://secunia.com/advisories/59961", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/59961" }, { "reference_url": "http://secunia.com/advisories/60024", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/60024" }, { "reference_url": "http://secunia.com/advisories/60034", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/60034" }, { "reference_url": "http://secunia.com/advisories/60044", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/60044" }, { "reference_url": "http://secunia.com/advisories/60055", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/60055" }, { "reference_url": "http://secunia.com/advisories/60063", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/60063" }, { "reference_url": "http://secunia.com/advisories/60193", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/60193" }, { "reference_url": "http://secunia.com/advisories/60325", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/60325" }, { "reference_url": "http://secunia.com/advisories/60433", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/60433" }, { "reference_url": "http://secunia.com/advisories/61065", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61065" }, { "reference_url": "http://secunia.com/advisories/61128", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61128" }, { "reference_url": "http://secunia.com/advisories/61129", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61129" }, { "reference_url": "http://secunia.com/advisories/61283", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61283" }, { "reference_url": "http://secunia.com/advisories/61287", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61287" }, { "reference_url": "http://secunia.com/advisories/61291", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61291" }, { "reference_url": "http://secunia.com/advisories/61312", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61312" }, { "reference_url": "http://secunia.com/advisories/61313", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61313" }, { "reference_url": "http://secunia.com/advisories/61328", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61328" }, { "reference_url": "http://secunia.com/advisories/61442", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61442" }, { "reference_url": "http://secunia.com/advisories/61471", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61471" }, { "reference_url": "http://secunia.com/advisories/61485", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61485" }, { "reference_url": "http://secunia.com/advisories/61503", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61503" }, { "reference_url": "http://secunia.com/advisories/61550", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61550" }, { "reference_url": "http://secunia.com/advisories/61552", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61552" }, { "reference_url": "http://secunia.com/advisories/61565", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61565" }, { "reference_url": "http://secunia.com/advisories/61603", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61603" }, { "reference_url": "http://secunia.com/advisories/61633", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61633" }, { "reference_url": "http://secunia.com/advisories/61641", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61641" }, { "reference_url": "http://secunia.com/advisories/61643", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61643" }, { "reference_url": "http://secunia.com/advisories/61654", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61654" }, { "reference_url": "http://secunia.com/advisories/61703", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61703" }, { "reference_url": "http://secunia.com/advisories/61780", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61780" }, { "reference_url": "http://secunia.com/advisories/61816", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61816" }, { "reference_url": "http://secunia.com/advisories/61857", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/61857" }, { "reference_url": "http://secunia.com/advisories/62312", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/62312" }, { "reference_url": "http://secunia.com/advisories/62343", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://secunia.com/advisories/62343" }, { "reference_url": "https://kb.bluecoat.com/index?page=content&id=SA82", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "https://kb.bluecoat.com/index?page=content&id=SA82" }, { "reference_url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10085", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10085" }, { "reference_url": "https://security-tracker.debian.org/tracker/CVE-2014-6278", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "https://security-tracker.debian.org/tracker/CVE-2014-6278" }, { "reference_url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts" }, { "reference_url": "https://support.citrix.com/article/CTX200217", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "https://support.citrix.com/article/CTX200217" }, { "reference_url": "https://support.citrix.com/article/CTX200223", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "https://support.citrix.com/article/CTX200223" }, { "reference_url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183" }, { "reference_url": "http://support.novell.com/security/cve/CVE-2014-6278.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://support.novell.com/security/cve/CVE-2014-6278.html" }, { "reference_url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006" }, { "reference_url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-6278", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-6278" }, { "reference_url": "https://www.exploit-db.com/exploits/39568/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "https://www.exploit-db.com/exploits/39568/" }, { "reference_url": "https://www.exploit-db.com/exploits/39887/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "https://www.exploit-db.com/exploits/39887/" }, { "reference_url": "https://www.suse.com/support/shellshock/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "https://www.suse.com/support/shellshock/" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079" }, { "reference_url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164" }, { "reference_url": "http://www.novell.com/support/kb/doc.php?id=7015721", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www.novell.com/support/kb/doc.php?id=7015721" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html" }, { "reference_url": "http://www.qnap.com/i/en/support/con_show.php?cid=61", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www.qnap.com/i/en/support/con_show.php?cid=61" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2380-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www.ubuntu.com/usn/USN-2380-1" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1147414", "reference_id": "1147414", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-02T03:55:45Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1147414" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/webapps/39887.txt", "reference_id": "CVE-2014-6278", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/cgi/webapps/39887.txt" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/remote/39568.py", "reference_id": "CVE-2014-6278", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/remote/39568.py" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6278", "reference_id": "CVE-2014-6278", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6278" }, { "reference_url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash", "reference_id": "CVE-2014-6278", "reference_type": "exploit", "scores": [], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash" }, { "reference_url": "https://security.gentoo.org/glsa/201410-01", "reference_id": "GLSA-201410-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201410-01" }, { "reference_url": "https://usn.ubuntu.com/2380-1/", "reference_id": "USN-2380-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2380-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051161?format=api", "purl": "pkg:deb/debian/bash@4.3-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4c4h-9zpn-kkd2" }, { "vulnerability": "VCID-556k-17z3-auc2" }, { "vulnerability": "VCID-hvf8-a8kf-qqbq" }, { "vulnerability": "VCID-jqym-yvag-qfcz" }, { "vulnerability": "VCID-nm4t-6dw6-vbby" }, { "vulnerability": "VCID-up13-8aex-7qfy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bash@4.3-11" } ], "aliases": [ "CVE-2014-6278" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yz3v-qgsz-53ew" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bash@2.05a-11" }