{"vulnerability": "CVE-2014-7169", "sightings": [{"uuid": "9be2be1c-b22b-48e6-85f4-cf9d4d5facb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7169", "type": "seen", "source": "MISP/552f547d-caf8-4b2b-860b-5e0ed54b8056", "content": "", "creation_timestamp": "2015-04-16T06:39:01.000000Z"}, {"uuid": "def7da5b-dfe5-409f-a210-7f4af151c0f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7169", "type": "seen", "source": "MISP/5535ffbe-a498-4c31-9974-3fc0d54b8056", "content": "", "creation_timestamp": "2015-04-21T07:45:29.000000Z"}, {"uuid": "94dc6f34-e327-4617-915f-aed3e891f1d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7169", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:03.000000Z"}, {"uuid": "20e839ee-00f5-4250-8bf1-1b2bfa4149dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7169", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971228", "content": "", "creation_timestamp": "2024-12-24T20:26:11.641279Z"}, {"uuid": "bdc27a62-af39-4038-b333-8e0128c9c930", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7169", "type": "seen", "source": "https://bsky.app/profile/daffyduke.bsky.social/post/3lg3xaao26m2a", "content": "", "creation_timestamp": "2025-01-19T13:41:19.768805Z"}, {"uuid": "cb881a6b-c15c-49ac-abb0-cb4c7a5b16fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2014-7169", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/e02d5cfc-4230-499d-9e85-011b20e81242", "content": "", "creation_timestamp": "2026-02-02T12:28:26.423773Z"}, {"uuid": "fbe54b31-d908-4ca7-9e3b-6d3800064a51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7169", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:07.000000Z"}, {"uuid": "5f7e779b-83d5-4017-9234-2a5e75946876", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7169", "type": "seen", "source": "https://gist.github.com/edgarcosta/934eb264e54da84a497ce3f607ba247b", "content": "", "creation_timestamp": "2025-05-27T19:35:23.000000Z"}, {"uuid": "5feebde1-2ecb-428d-a34b-dc0954ef41f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7169", "type": "published-proof-of-concept", "source": "https://github.com/google/tsunami-security-scanner-plugins/tree/master/doyensec/detectors/CVE_2014_6271", "content": "", "creation_timestamp": "2025-09-16T08:34:13.000000Z"}, {"uuid": "e31674d9-5dd9-4006-b4fd-dbf9a31e2436", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "db99543d-496c-4eef-ad0a-2df2093364df", "vulnerability": "CVE-2014-7169", "type": "confirmed", "source": "https://www.exploit-db.com/exploits/35115", "content": "", "creation_timestamp": "2014-10-29T00:00:00.000000Z"}, {"uuid": "72a6dbb9-cdab-4457-a751-bb3bfa9e9b12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "db99543d-496c-4eef-ad0a-2df2093364df", "vulnerability": "CVE-2014-7169", "type": "confirmed", "source": "https://www.exploit-db.com/exploits/34765", "content": "", "creation_timestamp": "2014-09-25T00:00:00.000000Z"}, {"uuid": "182c71ac-9e39-4aff-9b8a-eed9ddcfbba4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "db99543d-496c-4eef-ad0a-2df2093364df", "vulnerability": "CVE-2014-7169", "type": "confirmed", "source": "https://www.exploit-db.com/exploits/34896", "content": "", "creation_timestamp": "2014-10-06T00:00:00.000000Z"}, {"uuid": "7349e533-fc11-48b8-854c-8ecd19e0ebd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "db99543d-496c-4eef-ad0a-2df2093364df", "vulnerability": "CVE-2014-7169", "type": "confirmed", "source": "https://www.exploit-db.com/exploits/36933", "content": "", "creation_timestamp": "2014-09-29T00:00:00.000000Z"}, {"uuid": "9f5ab999-0cb6-4105-909e-a5bd1e09683a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "db99543d-496c-4eef-ad0a-2df2093364df", "vulnerability": "CVE-2014-7169", "type": "confirmed", "source": "https://www.exploit-db.com/exploits/34862", "content": "", "creation_timestamp": "2014-10-02T00:00:00.000000Z"}, {"uuid": "eba0700e-4202-4965-82bd-2d18b8e0c4d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "db99543d-496c-4eef-ad0a-2df2093364df", "vulnerability": "CVE-2014-7169", "type": "confirmed", "source": "https://www.exploit-db.com/exploits/34839", "content": "", "creation_timestamp": "2014-10-01T00:00:00.000000Z"}, {"uuid": "a52492e2-97e8-40fc-a5f0-40b49c7ce056", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "db99543d-496c-4eef-ad0a-2df2093364df", "vulnerability": "CVE-2014-7169", "type": "confirmed", "source": "https://www.exploit-db.com/exploits/34766", "content": "", "creation_timestamp": "2014-09-25T00:00:00.000000Z"}, {"uuid": "c4a8e281-20f7-44ed-b8ab-212a11e8f566", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "db99543d-496c-4eef-ad0a-2df2093364df", "vulnerability": "CVE-2014-7169", "type": "confirmed", "source": "https://www.exploit-db.com/exploits/34777", "content": "", "creation_timestamp": "2014-09-25T00:00:00.000000Z"}, {"uuid": "46846b5a-b74c-4b0d-acb5-236731244490", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "db99543d-496c-4eef-ad0a-2df2093364df", "vulnerability": "CVE-2014-7169", "type": "confirmed", "source": "https://www.exploit-db.com/exploits/34895", "content": "", "creation_timestamp": "2014-10-06T00:00:00.000000Z"}, {"uuid": "d1d2a41a-430e-4268-8746-f3912ba2933e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7169", "type": "exploited", "source": "Telegram/yVJNyXeSsFnnTlXDbJzDwv8EPdIujynRVvoJjLOyi6FDMcAA", "content": "", "creation_timestamp": "2025-02-14T10:00:30.000000Z"}, {"uuid": "70f3e70f-0a12-4b89-bdfe-37074a21e1af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7169", "type": "seen", "source": "https://t.me/arpsyndicate/1911", "content": "#ExploitObserverAlert\n\nCVE-2014-6277\n\nDESCRIPTION: Exploit Observer has 127 entries related to CVE-2014-6277. GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.\n\nFIRST-EPSS: 0.973120000\nNVD-IS: 10.0\nNVD-ES: 10.0", "creation_timestamp": "2023-12-18T04:29:01.000000Z"}, {"uuid": "ab7f45c6-6df3-40fa-ab1e-72d219798dd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7169", "type": "seen", "source": "https://t.me/arpsyndicate/863", "content": "#ExploitObserverAlert\n\nCVE-2014-6271\n\nDESCRIPTION: Exploit Observer has 751 entries related to CVE-2014-6271. GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\"  NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.\n\nFIRST-EPSS: 0.975680000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-02T00:20:21.000000Z"}, {"uuid": "035f2c45-9662-4a8e-949c-3ffce277c772", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7169", "type": "seen", "source": "https://t.me/arpsyndicate/1882", "content": "#ExploitObserverAlert\n\nCVE-2014-6271\n\nDESCRIPTION: Exploit Observer has 751 entries related to CVE-2014-6271. GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\"  NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.\n\nFIRST-EPSS: 0.975640000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-18T01:35:53.000000Z"}, {"uuid": "77700248-de78-4d2e-ad72-5969b5f49905", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7169", "type": "seen", "source": "https://t.me/arpsyndicate/1926", "content": "#ExploitObserverAlert\n\nCVE-2014-6278\n\nDESCRIPTION: Exploit Observer has 142 entries related to CVE-2014-6278. GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.\n\nFIRST-EPSS: 0.973450000\nNVD-IS: 10.0\nNVD-ES: 10.0", "creation_timestamp": "2023-12-18T06:11:35.000000Z"}, {"uuid": "625c35db-f667-4203-84b8-649b91cd632e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7169", "type": "seen", "source": "https://t.me/arpsyndicate/1499", "content": "#ExploitObserverAlert\n\nCVE-2014-6271\n\nDESCRIPTION: Exploit Observer has 751 entries related to CVE-2014-6271. GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\"  NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.\n\nFIRST-EPSS: 0.975680000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-06T15:07:45.000000Z"}, {"uuid": "112383da-5288-42a9-9e02-5a86868a8bcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7169", "type": "seen", "source": "https://t.me/arpsyndicate/90", "content": "#ExploitObserverAlert\n\nCVE-2014-6271\n\nDESCRIPTION: Exploit Observer has 740 entries related to CVE-2014-6271. GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\"  NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.\n\nFIRST-EPSS: 0.975680000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-11-11T18:06:24.000000Z"}, {"uuid": "5054fde6-72d8-4180-bdfc-c0df00b56b91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7169", "type": "seen", "source": "https://t.me/arpsyndicate/1552", "content": "#ExploitObserverAlert\n\nCVE-2014-6271\n\nDESCRIPTION: Exploit Observer has 751 entries related to CVE-2014-6271. GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\"  NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.\n\nFIRST-EPSS: 0.975680000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-08T11:54:24.000000Z"}, {"uuid": "f0fc14a6-2711-4875-ab28-661a4c3d2e9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-7169", "type": "seen", "source": "https://t.me/arpsyndicate/1451", "content": "#ExploitObserverAlert\n\nCVE-2014-6271\n\nDESCRIPTION: Exploit Observer has 751 entries related to CVE-2014-6271. GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\"  NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.\n\nFIRST-EPSS: 0.975680000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-05T10:07:27.000000Z"}]}