Vulnerabilities
Vulnerable Software
Zsh:  >> Zsh  >> 5.8  Security Vulnerabilities
In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
CVSS Score
7.8
EPSS Score
0.001
Published
2022-02-14


Contact Us

Shodan ® - All rights reserved