CVE-2021-45444
- EPSS 0.11%
- Veröffentlicht 14.02.2022 12:15:15
- Zuletzt bearbeitet 21.11.2024 06:32:13
In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
CVE-2019-20044
- EPSS 0.09%
- Veröffentlicht 24.02.2020 14:15:11
- Zuletzt bearbeitet 21.11.2024 04:37:56
In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload wit...
CVE-2018-0502
- EPSS 1.18%
- Veröffentlicht 05.09.2018 08:29:00
- Zuletzt bearbeitet 21.11.2024 03:38:22
An issue was discovered in zsh before 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the second line.
CVE-2018-13259
- EPSS 1.18%
- Veröffentlicht 05.09.2018 08:29:00
- Zuletzt bearbeitet 21.11.2024 03:46:44
An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program name that is a substring of the intended one.
CVE-2018-1100
- EPSS 0.1%
- Veröffentlicht 11.04.2018 19:29:01
- Zuletzt bearbeitet 21.11.2024 03:59:10
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.
CVE-2018-1083
- EPSS 0.12%
- Veröffentlicht 28.03.2018 13:29:00
- Zuletzt bearbeitet 21.11.2024 03:59:08
Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to ...
CVE-2018-1071
- EPSS 0.07%
- Veröffentlicht 09.03.2018 15:29:00
- Zuletzt bearbeitet 21.11.2024 03:59:07
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.
CVE-2014-10071
- EPSS 0.26%
- Veröffentlicht 27.02.2018 22:29:00
- Zuletzt bearbeitet 21.11.2024 02:03:27
In exec.c in zsh before 5.0.7, there is a buffer overflow for very long fds in the ">& fd" syntax.
CVE-2016-10714
- EPSS 0.22%
- Veröffentlicht 27.02.2018 22:29:00
- Zuletzt bearbeitet 21.11.2024 02:44:34
In zsh before 5.3, an off-by-one error resulted in undersized buffers that were intended to support PATH_MAX characters.
CVE-2017-18206
- EPSS 0.64%
- Veröffentlicht 27.02.2018 22:29:00
- Zuletzt bearbeitet 21.11.2024 03:19:33
In utils.c in zsh before 5.4, symlink expansion had a buffer overflow.