This document discusses the Shellshock vulnerability in the Bash shell. It provides background on Bash and describes how the vulnerability allows remote code execution. It then summarizes the timeline of vulnerability discovery and patches. Potential attack vectors like CGI scripts, DHCP, SSH, and SMTP are explained. Examples of known attacks from botnets, worms, and against Yahoo servers are also mentioned.