CVE-2023-49284
- EPSS 0.09%
- Veröffentlicht 05.12.2023 00:15:08
- Zuletzt bearbeitet 21.11.2024 08:33:11
fish is a smart and user-friendly command line shell for macOS, Linux, and the rest of the family. fish shell uses certain Unicode non-characters internally for marking wildcards and expansions. It will incorrectly allow these markers to be read on c...
CVE-2022-20001
- EPSS 0.49%
- Veröffentlicht 14.03.2022 19:15:11
- Zuletzt bearbeitet 21.11.2024 06:41:55
fish is a command line shell. fish version 3.1.0 through version 3.3.1 is vulnerable to arbitrary code execution. git repositories can contain per-repository configuration that change the behavior of git, including running arbitrary commands. When us...
- EPSS 0.11%
- Veröffentlicht 28.01.2020 16:15:12
- Zuletzt bearbeitet 21.11.2024 02:07:10
The psub function in fish (aka fish-shell) 1.16.0 before 2.1.1 does not properly create temporary files, which allows local users to execute arbitrary commands via a temporary file with a predictable name.
CVE-2014-2914
- EPSS 2.48%
- Veröffentlicht 28.01.2020 16:15:12
- Zuletzt bearbeitet 21.11.2024 02:07:11
fish (aka fish-shell) 2.0.0 before 2.1.1 does not restrict access to the configuration service (aka fish_config), which allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by set_prompt.
- EPSS 0.11%
- Veröffentlicht 28.01.2020 16:15:12
- Zuletzt bearbeitet 21.11.2024 02:08:59
The funced function in fish (aka fish-shell) 1.23.0 before 2.1.1 does not properly create temporary files, which allows local users to gain privileges via a temporary file with a predictable name.
CVE-2014-3219
- EPSS 0.04%
- Veröffentlicht 09.02.2018 22:29:00
- Zuletzt bearbeitet 21.11.2024 02:07:42
fish before 2.1.1 allows local users to write to arbitrary files via a symlink attack on (1) /tmp/fishd.log.%s, (2) /tmp/.pac-cache.$USER, (3) /tmp/.yum-cache.$USER, or (4) /tmp/.rpm-cache.$USER.
CVE-2014-2905
- EPSS 0.04%
- Veröffentlicht 02.05.2014 14:55:07
- Zuletzt bearbeitet 12.04.2025 10:46:40
fish (aka fish-shell) 1.16.0 before 2.1.1 does not properly check the credentials, which allows local users to gain privileges via the universal variable socket, related to /tmp/fishd.socket.user permissions.