Vulnerabilities > GNU > Bash > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-08-28 | CVE-2016-0634 | OS Command Injection vulnerability in GNU Bash 4.3 The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine. | 6.0 |
2017-03-27 | CVE-2017-5932 | Improper Input Validation vulnerability in GNU Bash 4.4 The path autocompletion feature in Bash 4.4 allows local users to gain privileges via a crafted filename starting with a " (double quote) character and a command substitution metacharacter. | 4.6 |
2012-08-27 | CVE-2012-3410 | Buffer Errors vulnerability in GNU Bash 4.2 Stack-based buffer overflow in lib/sh/eaccess.c in GNU Bash before 4.2 patch 33 might allow local users to bypass intended restricted shell access via a long filename in /dev/fd, which is not properly handled when expanding the /dev/fd prefix. | 4.6 |
1996-09-13 | CVE-1999-1383 | Permissions, Privileges, and Access Controls vulnerability in multiple products (1) bash before 1.14.7, and (2) tcsh 6.05 allow local users to gain privileges via directory names that contain shell metacharacters (` back-tick), which can cause the commands enclosed in the directory name to be executed when the shell expands filenames using the \w option in the PS1 variable. | 4.6 |