Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Zsh
(Zsh)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 13 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-02-14 | CVE-2021-45444 | In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion. | Mac_os_x, Macos, Debian_linux, Fedora, Zsh | 7.8 | ||
2018-03-09 | CVE-2018-1071 | zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service. | Ubuntu_linux, Debian_linux, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_workstation, Zsh | 5.5 | ||
2018-09-05 | CVE-2018-13259 | An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program name that is a substring of the intended one. | Ubuntu_linux, Zsh | 9.8 | ||
2018-09-05 | CVE-2018-0502 | An issue was discovered in zsh before 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the second line. | Ubuntu_linux, Zsh | 9.8 | ||
2018-02-27 | CVE-2017-18206 | In utils.c in zsh before 5.4, symlink expansion had a buffer overflow. | Ubuntu_linux, Zsh | 9.8 | ||
2018-02-27 | CVE-2016-10714 | In zsh before 5.3, an off-by-one error resulted in undersized buffers that were intended to support PATH_MAX characters. | Ubuntu_linux, Zsh | 9.8 | ||
2018-02-27 | CVE-2014-10071 | In exec.c in zsh before 5.0.7, there is a buffer overflow for very long fds in the ">& fd" syntax. | Ubuntu_linux, Zsh | 9.8 | ||
2018-02-27 | CVE-2018-7549 | In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as demonstrated by typeset -p. | Ubuntu_linux, Enterprise_linux_desktop, Enterprise_linux_server, Enterprise_linux_workstation, Zsh | 7.5 | ||
2018-02-27 | CVE-2018-7548 | In subst.c in zsh through 5.4.2, there is a NULL pointer dereference when using ${(PA)...} on an empty array result. | Ubuntu_linux, Zsh | 9.8 | ||
2007-12-03 | CVE-2007-6209 | Util/difflog.pl in zsh 4.3.4 allows local users to overwrite arbitrary files via a symlink attack on temporary files. | Zsh | N/A |