This document summarizes the Shellshock vulnerability in the Bash shell. It describes how the vulnerability works, its impact, timeline of events, and examples of attacks exploiting Shellshock through CGI scripts, DHCP, SSH, SMTP, and SUID programs. It also discusses botnets, worms, and attacks on Yahoo that used Shellshock. The document provides resources for further information on Shellshock.