Show filters
18 Total Results
Displaying 1-10 of 18
Sort by:
Attacker Value
Unknown

CVE-2021-45444

Disclosure Date: February 14, 2022 (last updated October 07, 2023)
In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
Attacker Value
Unknown

CVE-2019-20044

Disclosure Date: February 24, 2020 (last updated February 21, 2025)
In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().
Attacker Value
Unknown

CVE-2018-13259

Disclosure Date: September 05, 2018 (last updated November 27, 2024)
An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program name that is a substring of the intended one.
0
Attacker Value
Unknown

CVE-2018-0502

Disclosure Date: September 05, 2018 (last updated November 27, 2024)
An issue was discovered in zsh before 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the second line.
0
Attacker Value
Unknown

CVE-2018-1100

Disclosure Date: April 11, 2018 (last updated November 08, 2023)
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user.
Attacker Value
Unknown

CVE-2018-1083

Disclosure Date: March 28, 2018 (last updated November 08, 2023)
Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.
0
Attacker Value
Unknown

CVE-2018-1071

Disclosure Date: March 09, 2018 (last updated November 26, 2024)
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a denial of service.
Attacker Value
Unknown

CVE-2014-10071

Disclosure Date: February 27, 2018 (last updated November 26, 2024)
In exec.c in zsh before 5.0.7, there is a buffer overflow for very long fds in the ">& fd" syntax.
0
Attacker Value
Unknown

CVE-2017-18206

Disclosure Date: February 27, 2018 (last updated November 26, 2024)
In utils.c in zsh before 5.4, symlink expansion had a buffer overflow.
0
Attacker Value
Unknown

CVE-2018-7549

Disclosure Date: February 27, 2018 (last updated November 26, 2024)
In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as demonstrated by typeset -p.
0