CVE-2018-13259 |
AVG-764 |
Low |
No |
Insufficient validation |
An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program name... |
CVE-2018-7549 |
AVG-642 |
Medium |
No |
Denial of service |
In params.c in zsh through 5.4.2, there is a crash during a copy of an empty hash table, as demonstrated by typeset -p. |
CVE-2018-7548 |
AVG-642 |
Medium |
No |
Denial of service |
In subst.c in zsh through 5.4.2, there is a NULL pointer dereference when using ${(PA)...} on an empty array result. |
CVE-2018-1100 |
AVG-669 |
High |
No |
Arbitrary code execution |
A stack-based buffer overflow has been found in zsh <= 5.4.2, in the checkmailpath() function, where unchecked strings from the MAILCHECK variable are... |
CVE-2018-1071 |
AVG-652 |
Low |
No |
Denial of service |
zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the exec.c:hashcmd() function. A local attacker could exploit this to cause a... |
CVE-2018-0502 |
AVG-764 |
Low |
No |
Insufficient validation |
An issue was discovered in zsh before 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the... |