Reputation: 28212
I read some articles (article1, article2, article3) about the Shellshock Bash bug (CVE-2014-6271 reported Sep 24, 2014) and have a general idea of what the vulnerability is and how it could be exploited. To better understand the implications of the bug, what would be a simple and specific example of how some software could exploit the bug?
Upvotes: 3
Views: 6620