Bash Exploits

459 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-114731 EXPLOITDB bash VERIFIED
Solaris 2.5.1 lp / lpsched - Symlink
by Chris Sheldon
CVE-1999-0301 EXPLOITDB bash VERIFIED
SUN Solaris - Buffer Overflow
Buffer overflow in SunOS/Solaris ps command.
by Joe Zbiciak
CVE-1999-0130 EXPLOITDB bash VERIFIED
Sendmail <daemon mode - Privilege Escalation
Local users can start Sendmail in daemon mode and gain root privileges.
by Leshka Zakharoff
CVE-1999-1399 EXPLOITDB bash VERIFIED
SpaceWare 7.3 v1.0 - Privilege Escalation
spaceball program in SpaceWare 7.3 v1.0 in IRIX 6.2 allows local users to gain root privileges by setting the HOSTNAME environmental variable to contain the commands to be executed.
by J.A. Guitierrez
CVE-1999-1491 EXPLOITDB bash VERIFIED
Red Hat 2.1 - Command Injection
abuse.console in Red Hat 2.1 uses relative pathnames to find and execute the undrv program, which allows local users to execute arbitrary commands via a path that points to a Trojan horse program.
by David J Meltzer
EIP-2026-102825 EXPLOITDB bash VERIFIED
Elm 2.4 - 'filter' Arbitrary Mail Disclosure
by David J Meltzer
EIP-2026-100008 EXPLOITDB bash VERIFIED
IBM AIX 3.2.5 - 'IFS' Local Privilege Escalation
by anonymous
CVE-1999-0204 EXPLOITDB bash VERIFIED
Sendmail 8.6.9 - Command Injection
Sendmail 8.6.9 allows remote attackers to execute root commands, using ident.
by CIAC
CVE-1999-1022 EXPLOITDB bash VERIFIED
IRIX 4.x-5.x - Privilege Escalation
serial_ports administrative program in IRIX 4.x and 5.x trusts the user's PATH environmental variable to find and execute the ls program, which allows local users to gain root privileges via a Trojan horse ls program.
by transit