Known Exploited Vulnerability
10.0
HIGH CVSS 2.0
CVE-2014-6278
GNU Bash OS Command Injection Vulnerability - [Actively Exploited]
Description

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.

INFO

Published Date :

Sept. 30, 2014, 10:55 a.m.

Last Modified :

April 22, 2026, 4:07 p.m.

Remotely Exploit :

Yes !
CISA Notification
CISA KEV (Known Exploited Vulnerabilities)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

Description :

GNU Bash contains an OS command injection vulnerability which allows remote attackers to execute arbitrary commands via a crafted environment.

Required Action :

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Known Ransomware Campaign Use:

Unknown

Notes :

This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: http://ftp.gnu.org/gnu/bash/bash-4.3-patches/bash43-027 ; https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/23467 ; https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash ; https://www.ibm.com/support/pages/security-bulletin-update-vulnerabilities-bash-affect-aix-toolbox-linux-applications-cve-2014-6271-cve-2014-6277-cve-2014-6278-cve-2014-7169-cve-2014-7186-and-cve-2014-7187 ; https://nvd.nist.gov/vuln/detail/CVE-2014-6278

Affected Products

The following products are affected by CVE-2014-6278 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Gnu bash
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 2.0 HIGH [email protected]
CVSS 3.1 HIGH 134c704f-9b21-4f2e-91b3-4a467353bcc0
Solution
This vulnerability can be remediated by updating the bash packages and applying the appropriate patches or upgrading to a patched version.
  • Update the affected bash packages.
  • Apply the relevant patch or upgrade to a non-vulnerable version.
Public PoC/Exploit Available at Github

CVE-2014-6278 has a 41 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2014-6278.

URL Resource
http://jvn.jp/en/jp/JVN55667175/index.html Third Party Advisory
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126 Third Party Advisory
http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html Patch Third Party Advisory
http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html Third Party Advisory
http://linux.oracle.com/errata/ELSA-2014-3093 Third Party Advisory
http://linux.oracle.com/errata/ELSA-2014-3094 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html Mailing List
http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html Mailing List
http://marc.info/?l=bugtraq&m=141330468527613&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141345648114150&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383026420882&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383081521087&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383196021590&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383244821813&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383304022067&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383353622268&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383465822787&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141450491804793&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141576728022234&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141577137423233&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141577241923505&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141577297623641&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141585637922673&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141879528318582&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=142118135300698&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=142358026505815&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=142358078406056&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=142721162228379&w=2 Third Party Advisory
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html Third Party Advisory
http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html Third Party Advisory
http://secunia.com/advisories/58200 Broken Link
http://secunia.com/advisories/59907 Broken Link
http://secunia.com/advisories/59961 Broken Link
http://secunia.com/advisories/60024 Broken Link
http://secunia.com/advisories/60034 Broken Link
http://secunia.com/advisories/60044 Broken Link
http://secunia.com/advisories/60055 Broken Link
http://secunia.com/advisories/60063 Broken Link
http://secunia.com/advisories/60193 Broken Link
http://secunia.com/advisories/60325 Broken Link
http://secunia.com/advisories/60433 Broken Link
http://secunia.com/advisories/61065 Broken Link
http://secunia.com/advisories/61128 Broken Link
http://secunia.com/advisories/61129 Broken Link
http://secunia.com/advisories/61283 Broken Link
http://secunia.com/advisories/61287 Broken Link
http://secunia.com/advisories/61291 Broken Link
http://secunia.com/advisories/61312 Broken Link
http://secunia.com/advisories/61313 Broken Link
http://secunia.com/advisories/61328 Broken Link
http://secunia.com/advisories/61442 Broken Link
http://secunia.com/advisories/61471 Broken Link
http://secunia.com/advisories/61485 Broken Link
http://secunia.com/advisories/61503 Broken Link
http://secunia.com/advisories/61550 Broken Link
http://secunia.com/advisories/61552 Broken Link
http://secunia.com/advisories/61565 Broken Link
http://secunia.com/advisories/61603 Broken Link
http://secunia.com/advisories/61633 Broken Link
http://secunia.com/advisories/61641 Broken Link
http://secunia.com/advisories/61643 Broken Link
http://secunia.com/advisories/61654 Broken Link
http://secunia.com/advisories/61703 Broken Link
http://secunia.com/advisories/61780 Broken Link
http://secunia.com/advisories/61816 Broken Link
http://secunia.com/advisories/61857 Broken Link
http://secunia.com/advisories/62312 Broken Link
http://secunia.com/advisories/62343 Third Party Advisory
http://support.novell.com/security/cve/CVE-2014-6278.html Third Party Advisory
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21685541 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21685604 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21685733 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21685749 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21685914 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21686131 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21686246 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21686445 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21686479 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21686494 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21687079 Third Party Advisory
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164 Third Party Advisory
http://www.novell.com/support/kb/doc.php?id=7015721 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html Third Party Advisory
http://www.qnap.com/i/en/support/con_show.php?cid=61 Third Party Advisory
http://www.ubuntu.com/usn/USN-2380-1 Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2014-0010.html Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1147414 Third Party Advisory
https://kb.bluecoat.com/index?page=content&id=SA82 Third Party Advisory
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648 Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10085 Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2014-6278 Third Party Advisory
https://support.citrix.com/article/CTX200217 Third Party Advisory
https://support.citrix.com/article/CTX200223 Third Party Advisory
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075 Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 Third Party Advisory
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts Third Party Advisory
https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006 Third Party Advisory
https://www.exploit-db.com/exploits/39568/ Third Party Advisory
https://www.exploit-db.com/exploits/39887/ Third Party Advisory
https://www.suse.com/support/shellshock/ Vendor Advisory
http://jvn.jp/en/jp/JVN55667175/index.html Third Party Advisory
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126 Third Party Advisory
http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html Patch Third Party Advisory
http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html Third Party Advisory
http://linux.oracle.com/errata/ELSA-2014-3093 Third Party Advisory
http://linux.oracle.com/errata/ELSA-2014-3094 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html Mailing List
http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html Mailing List
http://marc.info/?l=bugtraq&m=141330468527613&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141345648114150&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383026420882&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383081521087&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383196021590&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383244821813&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383304022067&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383353622268&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141383465822787&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141450491804793&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141576728022234&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141577137423233&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141577241923505&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141577297623641&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141585637922673&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=141879528318582&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=142118135300698&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=142358026505815&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=142358078406056&w=2 Third Party Advisory
http://marc.info/?l=bugtraq&m=142721162228379&w=2 Third Party Advisory
http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html Third Party Advisory
http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html Third Party Advisory
http://secunia.com/advisories/58200 Broken Link
http://secunia.com/advisories/59907 Broken Link
http://secunia.com/advisories/59961 Broken Link
http://secunia.com/advisories/60024 Broken Link
http://secunia.com/advisories/60034 Broken Link
http://secunia.com/advisories/60044 Broken Link
http://secunia.com/advisories/60055 Broken Link
http://secunia.com/advisories/60063 Broken Link
http://secunia.com/advisories/60193 Broken Link
http://secunia.com/advisories/60325 Broken Link
http://secunia.com/advisories/60433 Broken Link
http://secunia.com/advisories/61065 Broken Link
http://secunia.com/advisories/61128 Broken Link
http://secunia.com/advisories/61129 Broken Link
http://secunia.com/advisories/61283 Broken Link
http://secunia.com/advisories/61287 Broken Link
http://secunia.com/advisories/61291 Broken Link
http://secunia.com/advisories/61312 Broken Link
http://secunia.com/advisories/61313 Broken Link
http://secunia.com/advisories/61328 Broken Link
http://secunia.com/advisories/61442 Broken Link
http://secunia.com/advisories/61471 Broken Link
http://secunia.com/advisories/61485 Broken Link
http://secunia.com/advisories/61503 Broken Link
http://secunia.com/advisories/61550 Broken Link
http://secunia.com/advisories/61552 Broken Link
http://secunia.com/advisories/61565 Broken Link
http://secunia.com/advisories/61603 Broken Link
http://secunia.com/advisories/61633 Broken Link
http://secunia.com/advisories/61641 Broken Link
http://secunia.com/advisories/61643 Broken Link
http://secunia.com/advisories/61654 Broken Link
http://secunia.com/advisories/61703 Broken Link
http://secunia.com/advisories/61780 Broken Link
http://secunia.com/advisories/61816 Broken Link
http://secunia.com/advisories/61857 Broken Link
http://secunia.com/advisories/62312 Broken Link
http://secunia.com/advisories/62343 Third Party Advisory
http://support.novell.com/security/cve/CVE-2014-6278.html Third Party Advisory
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21685541 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21685604 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21685733 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21685749 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21685914 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21686131 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21686246 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21686445 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21686479 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21686494 Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21687079 Third Party Advisory
http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2015:164 Third Party Advisory
http://www.novell.com/support/kb/doc.php?id=7015721 Third Party Advisory
http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html Third Party Advisory
http://www.qnap.com/i/en/support/con_show.php?cid=61 Third Party Advisory
http://www.ubuntu.com/usn/USN-2380-1 Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2014-0010.html Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1147414 Third Party Advisory
https://kb.bluecoat.com/index?page=content&id=SA82 Third Party Advisory
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648 Third Party Advisory
https://kc.mcafee.com/corporate/index?page=content&id=SB10085 Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2014-6278 Third Party Advisory
https://support.citrix.com/article/CTX200217 Third Party Advisory
https://support.citrix.com/article/CTX200223 Third Party Advisory
https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075 Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 Third Party Advisory
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts Third Party Advisory
https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006 Third Party Advisory
https://www.exploit-db.com/exploits/39568/ Third Party Advisory
https://www.exploit-db.com/exploits/39887/ Third Party Advisory
https://www.suse.com/support/shellshock/ Vendor Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-6278 US Government Resource
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2014-6278 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

C

Updated: 3 days, 17 hours ago
0 stars 0 fork 0 watcher
Born at : May 7, 2026, 9:27 p.m. This repo has been linked 2 different CVEs too.

Black-box penetration test against HackSudo Thor : CVE-2014-6271 Shellshock RCE through Apache mod_cgi, chained with sudo misconfiguration and bash eval injection for full privilege escalation. Includes custom CSRF-aware brute force tooling and Metasploit RPC automation.

Python

Updated: 1 week, 3 days ago
0 stars 0 fork 0 watcher
Born at : April 30, 2026, 9:58 p.m. This repo has been linked 4 different CVEs too.

None

Updated: 1 month ago
0 stars 0 fork 0 watcher
Born at : April 9, 2026, 4:23 a.m. This repo has been linked 6 different CVEs too.

CVE-2014-6271

Python

Updated: 2 months ago
0 stars 0 fork 0 watcher
Born at : March 6, 2026, 12:59 p.m. This repo has been linked 6 different CVEs too.

None

Updated: 3 months, 3 weeks ago
0 stars 0 fork 0 watcher
Born at : Jan. 19, 2026, 12:02 p.m. This repo has been linked 2 different CVEs too.

None

HTML JavaScript Shell Python PHP

Updated: 7 months, 1 week ago
0 stars 0 fork 0 watcher
Born at : Sept. 29, 2025, 1:36 p.m. This repo has been linked 6 different CVEs too.

None

Dockerfile

Updated: 11 months ago
0 stars 0 fork 0 watcher
Born at : June 6, 2025, 11:14 a.m. This repo has been linked 2 different CVEs too.

None

Updated: 11 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : May 26, 2025, 1:33 p.m. This repo has been linked 6 different CVEs too.

None

Updated: 1 year, 1 month ago
0 stars 0 fork 0 watcher
Born at : April 1, 2025, 3:52 a.m. This repo has been linked 2 different CVEs too.

a *VULNERABLE* docker image containing bash 4.1

Dockerfile Shell PHP

Updated: 1 year, 3 months ago
0 stars 0 fork 0 watcher
Born at : Jan. 12, 2025, 4:20 p.m. This repo has been linked 6 different CVEs too.

wgetCloud官网全球加速机场:手机能用优惠码

Updated: 1 year, 5 months ago
0 stars 0 fork 0 watcher
Born at : Nov. 26, 2024, 5:40 a.m. This repo has been linked 1 different CVEs too.

wgetCloud官网全球加速机场:手机能用优惠码

Updated: 1 year, 5 months ago
0 stars 0 fork 0 watcher
Born at : Nov. 26, 2024, 12:15 a.m. This repo has been linked 1 different CVEs too.

ShellShock Attack vulnerability on “Bitcoin” & “Ethereum” server discovered in GNU Bash cryptocurrency exchange

attack bash bitcoin bitcoin-wallet gnu gnu-linux hacking shell vulnerability blockchain blockchain-technology

Shell Python PHP HTML JavaScript

Updated: 1 year, 6 months ago
5 stars 2 fork 2 watcher
Born at : Sept. 9, 2023, 11:56 a.m. This repo has been linked 6 different CVEs too.

We want to see whether ChatGPT or other AI-LLM (Microsoft New_Bing or Google Bard) are able to help the user to go to some test environment to run cmds to solve the CTF problems (Whether the AI large language models can understand the challenge question and capture the question flags)

Python

Updated: 3 months, 2 weeks ago
49 stars 6 fork 6 watcher
Born at : May 19, 2023, 1:05 a.m. This repo has been linked 2 different CVEs too.

An automated repo to track Nuclei template scanning capabilities against the CISA KEV.

cisa-kev nuclei scanning vulnerabilities cisa

Makefile Python Shell

Updated: 2 weeks, 2 days ago
2 stars 0 fork 0 watcher
Born at : April 27, 2023, 6:25 p.m. This repo has been linked 593 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2014-6278 vulnerability anywhere in the article.

  • TheCyberThrone
CISA KEV Catalog Update October 2025 – Part I

October 3, 2025CISA recently updated its Known Exploited Vulnerabilities (KEV) catalog with critical vulnerabilities across GNU Bash, Juniper, Samsung, Jenkins, and Meteobridge products as follows:GNU ... Read more

Published Date: Oct 03, 2025 (7 months, 1 week ago)
  • The Hacker News
CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild

Oct 03, 2025Ravie LakshmananVulnerability / IoT Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Smartbedded Meteob ... Read more

Published Date: Oct 03, 2025 (7 months, 1 week ago)

The following table lists the changes that have been made to the CVE-2014-6278 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Modified Analysis by [email protected]

    Apr. 22, 2026

    Action Type Old Value New Value
    Added Reference Type Debian GNU/Linux: http://jvn.jp/en/jp/JVN55667175/index.html Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126 Types: Third Party Advisory
    Changed Reference Type Debian GNU/Linux: http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html Types: Patch Debian GNU/Linux: http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html Types: Patch, Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://linux.oracle.com/errata/ELSA-2014-3093 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://linux.oracle.com/errata/ELSA-2014-3094 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html Types: Mailing List
    Added Reference Type Debian GNU/Linux: http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html Types: Mailing List
    Added Reference Type Debian GNU/Linux: http://marc.info/?l=bugtraq&m=141330468527613&w=2 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://marc.info/?l=bugtraq&m=141345648114150&w=2 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://marc.info/?l=bugtraq&m=141383026420882&w=2 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://marc.info/?l=bugtraq&m=141383081521087&w=2 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://marc.info/?l=bugtraq&m=141383196021590&w=2 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://marc.info/?l=bugtraq&m=141383244821813&w=2 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://marc.info/?l=bugtraq&m=141383304022067&w=2 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://marc.info/?l=bugtraq&m=141383353622268&w=2 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://marc.info/?l=bugtraq&m=141383465822787&w=2 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://marc.info/?l=bugtraq&m=141450491804793&w=2 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://marc.info/?l=bugtraq&m=141576728022234&w=2 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://marc.info/?l=bugtraq&m=141577137423233&w=2 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://marc.info/?l=bugtraq&m=141577241923505&w=2 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://marc.info/?l=bugtraq&m=141577297623641&w=2 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://marc.info/?l=bugtraq&m=141585637922673&w=2 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://marc.info/?l=bugtraq&m=141879528318582&w=2 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://marc.info/?l=bugtraq&m=142118135300698&w=2 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://marc.info/?l=bugtraq&m=142358026505815&w=2 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://marc.info/?l=bugtraq&m=142358078406056&w=2 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://marc.info/?l=bugtraq&m=142721162228379&w=2 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/58200 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/59907 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/59961 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/60024 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/60034 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/60044 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/60055 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/60063 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/60193 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/60325 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/60433 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61065 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61128 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61129 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61283 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61287 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61291 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61312 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61313 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61328 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61442 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61471 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61485 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61503 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61550 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61552 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61565 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61603 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61633 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61641 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61643 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61654 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61703 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61780 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61816 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/61857 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/62312 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://secunia.com/advisories/62343 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://support.novell.com/security/cve/CVE-2014-6278.html Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www.mandriva.com/security/advisories?name=MDVSA-2015:164 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www.novell.com/support/kb/doc.php?id=7015721 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www.qnap.com/i/en/support/con_show.php?cid=61 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www.ubuntu.com/usn/USN-2380-1 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www.vmware.com/security/advisories/VMSA-2014-0010.html Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www-01.ibm.com/support/docview.wss?uid=swg21685541 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www-01.ibm.com/support/docview.wss?uid=swg21685604 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www-01.ibm.com/support/docview.wss?uid=swg21685733 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www-01.ibm.com/support/docview.wss?uid=swg21685749 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www-01.ibm.com/support/docview.wss?uid=swg21685914 Types: Third Party Advisory
    Added Reference Type CVE: http://www-01.ibm.com/support/docview.wss?uid=swg21686131 Types: Third Party Advisory
    Added Reference Type CVE: http://www-01.ibm.com/support/docview.wss?uid=swg21685914 Types: Third Party Advisory
    Added Reference Type CVE: http://www-01.ibm.com/support/docview.wss?uid=swg21685749 Types: Third Party Advisory
    Added Reference Type CVE: http://www-01.ibm.com/support/docview.wss?uid=swg21685733 Types: Third Party Advisory
    Added Reference Type CVE: http://www-01.ibm.com/support/docview.wss?uid=swg21685604 Types: Third Party Advisory
    Added Reference Type CVE: http://www-01.ibm.com/support/docview.wss?uid=swg21685541 Types: Third Party Advisory
    Added Reference Type CVE: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915 Types: Third Party Advisory
    Added Reference Type CVE: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898 Types: Third Party Advisory
    Added Reference Type CVE: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897 Types: Third Party Advisory
    Added Reference Type CVE: http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879 Types: Third Party Advisory
    Added Reference Type CVE: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361 Types: Third Party Advisory
    Added Reference Type CVE: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279 Types: Third Party Advisory
    Added Reference Type CVE: http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272 Types: Third Party Advisory
    Added Reference Type CVE: http://www.vmware.com/security/advisories/VMSA-2014-0010.html Types: Third Party Advisory
    Added Reference Type CVE: http://www.ubuntu.com/usn/USN-2380-1 Types: Third Party Advisory
    Added Reference Type CVE: http://www.qnap.com/i/en/support/con_show.php?cid=61 Types: Third Party Advisory
    Added Reference Type CVE: http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html Types: Third Party Advisory
    Added Reference Type CVE: http://www.novell.com/support/kb/doc.php?id=7015721 Types: Third Party Advisory
    Added Reference Type CVE: http://www.mandriva.com/security/advisories?name=MDVSA-2015:164 Types: Third Party Advisory
    Added Reference Type CVE: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash Types: Third Party Advisory
    Added Reference Type CVE: http://support.novell.com/security/cve/CVE-2014-6278.html Types: Third Party Advisory
    Added Reference Type CVE: http://secunia.com/advisories/62343 Types: Third Party Advisory
    Added Reference Type CVE: http://secunia.com/advisories/62312 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61857 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61816 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61780 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61703 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61654 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61643 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61641 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61633 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61603 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61565 Types: Broken Link
    Added Reference Type Debian GNU/Linux: http://www-01.ibm.com/support/docview.wss?uid=swg21686131 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www-01.ibm.com/support/docview.wss?uid=swg21686246 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www-01.ibm.com/support/docview.wss?uid=swg21686445 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www-01.ibm.com/support/docview.wss?uid=swg21686479 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www-01.ibm.com/support/docview.wss?uid=swg21686494 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www-01.ibm.com/support/docview.wss?uid=swg21687079 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: https://bugzilla.redhat.com/show_bug.cgi?id=1147414 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: https://kb.bluecoat.com/index?page=content&id=SA82 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: https://kc.mcafee.com/corporate/index?page=content&id=SB10085 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: https://security-tracker.debian.org/tracker/CVE-2014-6278 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: https://support.citrix.com/article/CTX200217 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: https://support.citrix.com/article/CTX200223 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006 Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: https://www.exploit-db.com/exploits/39568/ Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: https://www.exploit-db.com/exploits/39887/ Types: Third Party Advisory
    Added Reference Type Debian GNU/Linux: https://www.suse.com/support/shellshock/ Types: Vendor Advisory
    Added Reference Type CISA-ADP: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-6278 Types: US Government Resource
    Added Reference Type CVE: https://www.suse.com/support/shellshock/ Types: Vendor Advisory
    Added Reference Type CVE: https://www.exploit-db.com/exploits/39887/ Types: Third Party Advisory
    Added Reference Type CVE: https://www.exploit-db.com/exploits/39568/ Types: Third Party Advisory
    Added Reference Type CVE: https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006 Types: Third Party Advisory
    Added Reference Type CVE: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts Types: Third Party Advisory
    Added Reference Type CVE: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 Types: Third Party Advisory
    Added Reference Type CVE: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075 Types: Third Party Advisory
    Added Reference Type CVE: https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html Types: Third Party Advisory
    Added Reference Type CVE: https://support.citrix.com/article/CTX200223 Types: Third Party Advisory
    Added Reference Type CVE: https://support.citrix.com/article/CTX200217 Types: Third Party Advisory
    Added Reference Type CVE: https://security-tracker.debian.org/tracker/CVE-2014-6278 Types: Third Party Advisory
    Added Reference Type CVE: https://kc.mcafee.com/corporate/index?page=content&id=SB10085 Types: Third Party Advisory
    Added Reference Type CVE: https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648 Types: Third Party Advisory
    Added Reference Type CVE: https://kb.bluecoat.com/index?page=content&id=SA82 Types: Third Party Advisory
    Added Reference Type CVE: https://bugzilla.redhat.com/show_bug.cgi?id=1147414 Types: Third Party Advisory
    Added Reference Type CVE: http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315 Types: Third Party Advisory
    Added Reference Type CVE: http://www-01.ibm.com/support/docview.wss?uid=swg21687079 Types: Third Party Advisory
    Added Reference Type CVE: http://www-01.ibm.com/support/docview.wss?uid=swg21686494 Types: Third Party Advisory
    Added Reference Type CVE: http://www-01.ibm.com/support/docview.wss?uid=swg21686479 Types: Third Party Advisory
    Added Reference Type CVE: http://www-01.ibm.com/support/docview.wss?uid=swg21686445 Types: Third Party Advisory
    Added Reference Type CVE: http://www-01.ibm.com/support/docview.wss?uid=swg21686246 Types: Third Party Advisory
    Added Reference Type CVE: http://marc.info/?l=bugtraq&m=141383353622268&w=2 Types: Third Party Advisory
    Added Reference Type CVE: http://marc.info/?l=bugtraq&m=141383304022067&w=2 Types: Third Party Advisory
    Added Reference Type CVE: http://marc.info/?l=bugtraq&m=141383244821813&w=2 Types: Third Party Advisory
    Added Reference Type CVE: http://marc.info/?l=bugtraq&m=141383196021590&w=2 Types: Third Party Advisory
    Added Reference Type CVE: http://marc.info/?l=bugtraq&m=141383081521087&w=2 Types: Third Party Advisory
    Added Reference Type CVE: http://marc.info/?l=bugtraq&m=141383026420882&w=2 Types: Third Party Advisory
    Added Reference Type CVE: http://marc.info/?l=bugtraq&m=141345648114150&w=2 Types: Third Party Advisory
    Added Reference Type CVE: http://marc.info/?l=bugtraq&m=141330468527613&w=2 Types: Third Party Advisory
    Added Reference Type CVE: http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html Types: Mailing List
    Added Reference Type CVE: http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html Types: Mailing List
    Added Reference Type CVE: http://linux.oracle.com/errata/ELSA-2014-3094 Types: Third Party Advisory
    Added Reference Type CVE: http://linux.oracle.com/errata/ELSA-2014-3093 Types: Third Party Advisory
    Added Reference Type CVE: http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html Types: Third Party Advisory
    Changed Reference Type CVE: http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html Types: Patch CVE: http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html Types: Patch, Third Party Advisory
    Added Reference Type CVE: http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126 Types: Third Party Advisory
    Added Reference Type CVE: http://jvn.jp/en/jp/JVN55667175/index.html Types: Third Party Advisory
    Added Reference Type CVE: http://secunia.com/advisories/61552 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61550 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61503 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61485 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61471 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61442 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61328 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61313 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61312 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61291 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61287 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61283 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61129 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61128 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/61065 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/60433 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/60325 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/60193 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/60063 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/60055 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/60044 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/60034 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/60024 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/59961 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/59907 Types: Broken Link
    Added Reference Type CVE: http://secunia.com/advisories/58200 Types: Broken Link
    Added Reference Type CVE: http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html Types: Third Party Advisory
    Added Reference Type CVE: http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html Types: Third Party Advisory
    Added Reference Type CVE: http://marc.info/?l=bugtraq&m=142721162228379&w=2 Types: Third Party Advisory
    Added Reference Type CVE: http://marc.info/?l=bugtraq&m=142358078406056&w=2 Types: Third Party Advisory
    Added Reference Type CVE: http://marc.info/?l=bugtraq&m=142358026505815&w=2 Types: Third Party Advisory
    Added Reference Type CVE: http://marc.info/?l=bugtraq&m=142118135300698&w=2 Types: Third Party Advisory
    Added Reference Type CVE: http://marc.info/?l=bugtraq&m=141879528318582&w=2 Types: Third Party Advisory
    Added Reference Type CVE: http://marc.info/?l=bugtraq&m=141585637922673&w=2 Types: Third Party Advisory
    Added Reference Type CVE: http://marc.info/?l=bugtraq&m=141577297623641&w=2 Types: Third Party Advisory
    Added Reference Type CVE: http://marc.info/?l=bugtraq&m=141577241923505&w=2 Types: Third Party Advisory
    Added Reference Type CVE: http://marc.info/?l=bugtraq&m=141577137423233&w=2 Types: Third Party Advisory
    Added Reference Type CVE: http://marc.info/?l=bugtraq&m=141576728022234&w=2 Types: Third Party Advisory
    Added Reference Type CVE: http://marc.info/?l=bugtraq&m=141450491804793&w=2 Types: Third Party Advisory
    Added Reference Type CVE: http://marc.info/?l=bugtraq&m=141383465822787&w=2 Types: Third Party Advisory
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Oct. 22, 2025

    Action Type Old Value New Value
    Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-6278
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Oct. 21, 2025

    Action Type Old Value New Value
    Removed Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-6278
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Oct. 21, 2025

    Action Type Old Value New Value
    Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-6278
  • CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725

    Oct. 03, 2025

    Action Type Old Value New Value
    Added Date Added 2025-10-02
    Added Due Date 2025-10-23
    Added Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
    Added Vulnerability Name GNU Bash OS Command Injection Vulnerability
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Oct. 01, 2025

    Action Type Old Value New Value
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
    Added CWE CWE-78
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference http://jvn.jp/en/jp/JVN55667175/index.html
    Added Reference http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126
    Added Reference http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html
    Added Reference http://lcamtuf.blogspot.com/2014/10/bash-bug-how-we-finally-cracked.html
    Added Reference http://linux.oracle.com/errata/ELSA-2014-3093
    Added Reference http://linux.oracle.com/errata/ELSA-2014-3094
    Added Reference http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html
    Added Reference http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html
    Added Reference http://marc.info/?l=bugtraq&m=141330468527613&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141345648114150&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141383026420882&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141383081521087&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141383196021590&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141383244821813&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141383304022067&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141383353622268&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141383465822787&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141450491804793&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141576728022234&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141577137423233&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141577241923505&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141577297623641&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141585637922673&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141879528318582&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141879528318582&w=2
    Added Reference http://marc.info/?l=bugtraq&m=142118135300698&w=2
    Added Reference http://marc.info/?l=bugtraq&m=142118135300698&w=2
    Added Reference http://marc.info/?l=bugtraq&m=142118135300698&w=2
    Added Reference http://marc.info/?l=bugtraq&m=142358026505815&w=2
    Added Reference http://marc.info/?l=bugtraq&m=142358026505815&w=2
    Added Reference http://marc.info/?l=bugtraq&m=142358078406056&w=2
    Added Reference http://marc.info/?l=bugtraq&m=142721162228379&w=2
    Added Reference http://marc.info/?l=bugtraq&m=142721162228379&w=2
    Added Reference http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html
    Added Reference http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html
    Added Reference http://secunia.com/advisories/58200
    Added Reference http://secunia.com/advisories/59907
    Added Reference http://secunia.com/advisories/59961
    Added Reference http://secunia.com/advisories/60024
    Added Reference http://secunia.com/advisories/60034
    Added Reference http://secunia.com/advisories/60044
    Added Reference http://secunia.com/advisories/60055
    Added Reference http://secunia.com/advisories/60063
    Added Reference http://secunia.com/advisories/60193
    Added Reference http://secunia.com/advisories/60325
    Added Reference http://secunia.com/advisories/60433
    Added Reference http://secunia.com/advisories/61065
    Added Reference http://secunia.com/advisories/61128
    Added Reference http://secunia.com/advisories/61129
    Added Reference http://secunia.com/advisories/61283
    Added Reference http://secunia.com/advisories/61287
    Added Reference http://secunia.com/advisories/61291
    Added Reference http://secunia.com/advisories/61312
    Added Reference http://secunia.com/advisories/61313
    Added Reference http://secunia.com/advisories/61328
    Added Reference http://secunia.com/advisories/61442
    Added Reference http://secunia.com/advisories/61471
    Added Reference http://secunia.com/advisories/61485
    Added Reference http://secunia.com/advisories/61503
    Added Reference http://secunia.com/advisories/61550
    Added Reference http://secunia.com/advisories/61552
    Added Reference http://secunia.com/advisories/61565
    Added Reference http://secunia.com/advisories/61603
    Added Reference http://secunia.com/advisories/61633
    Added Reference http://secunia.com/advisories/61641
    Added Reference http://secunia.com/advisories/61643
    Added Reference http://secunia.com/advisories/61654
    Added Reference http://secunia.com/advisories/61703
    Added Reference http://secunia.com/advisories/61780
    Added Reference http://secunia.com/advisories/61816
    Added Reference http://secunia.com/advisories/61857
    Added Reference http://secunia.com/advisories/62312
    Added Reference http://secunia.com/advisories/62343
    Added Reference http://support.novell.com/security/cve/CVE-2014-6278.html
    Added Reference http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash
    Added Reference http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
    Added Reference http://www.novell.com/support/kb/doc.php?id=7015721
    Added Reference http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html
    Added Reference http://www.qnap.com/i/en/support/con_show.php?cid=61
    Added Reference http://www.ubuntu.com/usn/USN-2380-1
    Added Reference http://www.vmware.com/security/advisories/VMSA-2014-0010.html
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=swg21685541
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=swg21685604
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=swg21685733
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=swg21685749
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=swg21685914
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=swg21686131
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=swg21686246
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=swg21686445
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=swg21686479
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=swg21686494
    Added Reference http://www-01.ibm.com/support/docview.wss?uid=swg21687079
    Added Reference http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315
    Added Reference https://bugzilla.redhat.com/show_bug.cgi?id=1147414
    Added Reference https://kb.bluecoat.com/index?page=content&id=SA82
    Added Reference https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648
    Added Reference https://kc.mcafee.com/corporate/index?page=content&id=SB10085
    Added Reference https://security-tracker.debian.org/tracker/CVE-2014-6278
    Added Reference https://support.citrix.com/article/CTX200217
    Added Reference https://support.citrix.com/article/CTX200223
    Added Reference https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html
    Added Reference https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075
    Added Reference https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183
    Added Reference https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts
    Added Reference https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006
    Added Reference https://www.exploit-db.com/exploits/39568/
    Added Reference https://www.exploit-db.com/exploits/39887/
    Added Reference https://www.suse.com/support/shellshock/
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Nov. 17, 2021

    Action Type Old Value New Value
    Added Reference https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006 [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 10, 2021

    Action Type Old Value New Value
    Removed Reference https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006 [No Types Assigned]
  • CVE Modified by [email protected]

    Nov. 05, 2021

    Action Type Old Value New Value
    Added Reference https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006 [No Types Assigned]
  • CVE Modified by [email protected]

    Aug. 09, 2018

    Action Type Old Value New Value
    Added Reference https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 [No Types Assigned]
    Added Reference https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075 [No Types Assigned]
  • CVE Modified by [email protected]

    Sep. 08, 2017

    Action Type Old Value New Value
    Added Reference https://www.exploit-db.com/exploits/39568/ [No Types Assigned]
  • CVE Modified by [email protected]

    Jan. 03, 2017

    Action Type Old Value New Value
    Added Reference https://kc.mcafee.com/corporate/index?page=content&id=SB10085 [No Types Assigned]
  • CVE Modified by [email protected]

    Jun. 15, 2016

    Action Type Old Value New Value
    Added Reference https://www.exploit-db.com/exploits/39887/
  • CVE Modified by [email protected]

    Jun. 11, 2016

    Action Type Old Value New Value
    Added Reference http://packetstormsecurity.com/files/137344/Sun-Secure-Global-Desktop-Oracle-Global-Desktop-Shellshock.html
  • CVE Modified by [email protected]

    May. 12, 2015

    Action Type Old Value New Value
    Added Reference http://www.mandriva.com/security/advisories?name=MDVSA-2015:164
  • CVE Modified by [email protected]

    Mar. 27, 2015

    Action Type Old Value New Value
    Added Reference http://marc.info/?l=bugtraq&m=142721162228379&w=2
  • CVE Modified by [email protected]

    Mar. 18, 2015

    Action Type Old Value New Value
    Added Reference http://marc.info/?l=bugtraq&m=142118135300698&w=2
  • CVE Modified by [email protected]

    Mar. 12, 2015

    Action Type Old Value New Value
    Added Reference http://marc.info/?l=bugtraq&m=142358026505815&w=2
    Added Reference http://marc.info/?l=bugtraq&m=142358078406056&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141879528318582&w=2
  • CVE Modified by [email protected]

    Dec. 24, 2014

    Action Type Old Value New Value
    Added Reference http://secunia.com/advisories/62312
    Added Reference http://secunia.com/advisories/59961
    Added Reference http://secunia.com/advisories/62343
    Added Reference http://linux.oracle.com/errata/ELSA-2014-3093
    Added Reference http://linux.oracle.com/errata/ELSA-2014-3094
  • CVE Modified by [email protected]

    Nov. 20, 2014

    Action Type Old Value New Value
    Added Reference http://marc.info/?l=bugtraq&m=141577137423233&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141577241923505&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141576728022234&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141577297623641&w=2
    Added Reference http://marc.info/?l=bugtraq&m=141585637922673&w=2
  • CVE Modified by [email protected]

    Nov. 14, 2014

    Action Type Old Value New Value
    Added Reference http://marc.info/?l=bugtraq&m=141383465822787&w=2
  • Initial Analysis by [email protected]

    Sep. 30, 2014

    Action Type Old Value New Value
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.