Fishshell

Fish

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.09%
  • Veröffentlicht 05.12.2023 00:15:08
  • Zuletzt bearbeitet 21.11.2024 08:33:11

fish is a smart and user-friendly command line shell for macOS, Linux, and the rest of the family. fish shell uses certain Unicode non-characters internally for marking wildcards and expansions. It will incorrectly allow these markers to be read on c...

  • EPSS 0.49%
  • Veröffentlicht 14.03.2022 19:15:11
  • Zuletzt bearbeitet 21.11.2024 06:41:55

fish is a command line shell. fish version 3.1.0 through version 3.3.1 is vulnerable to arbitrary code execution. git repositories can contain per-repository configuration that change the behavior of git, including running arbitrary commands. When us...

  • EPSS 0.11%
  • Veröffentlicht 28.01.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 02:07:10

The psub function in fish (aka fish-shell) 1.16.0 before 2.1.1 does not properly create temporary files, which allows local users to execute arbitrary commands via a temporary file with a predictable name.

  • EPSS 2.48%
  • Veröffentlicht 28.01.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 02:07:11

fish (aka fish-shell) 2.0.0 before 2.1.1 does not restrict access to the configuration service (aka fish_config), which allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by set_prompt.

  • EPSS 0.11%
  • Veröffentlicht 28.01.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 02:08:59

The funced function in fish (aka fish-shell) 1.23.0 before 2.1.1 does not properly create temporary files, which allows local users to gain privileges via a temporary file with a predictable name.

  • EPSS 0.04%
  • Veröffentlicht 09.02.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 02:07:42

fish before 2.1.1 allows local users to write to arbitrary files via a symlink attack on (1) /tmp/fishd.log.%s, (2) /tmp/.pac-cache.$USER, (3) /tmp/.yum-cache.$USER, or (4) /tmp/.rpm-cache.$USER.

  • EPSS 0.04%
  • Veröffentlicht 02.05.2014 14:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

fish (aka fish-shell) 1.16.0 before 2.1.1 does not properly check the credentials, which allows local users to gain privileges via the universal variable socket, related to /tmp/fishd.socket.user permissions.