Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

astral-sh — Vulnerabilities & Security Advisories 5

Browse all 5 CVE security advisories affecting astral-sh. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Astral-sh is a shell implementation primarily used for Unix-like environments, offering command-line interface capabilities. Historically, it has been associated with multiple remote code execution vulnerabilities, cross-site scripting issues, and privilege escalation flaws. The project maintains five CVE records, with several RCE vulnerabilities allowing attackers to execute arbitrary code through crafted input or environment variables. While no major public security incidents have been documented, the consistent discovery of critical flaws suggests potential risks in environments where astral-sh handles untrusted input. Its lightweight design introduces security considerations similar to other shell implementations, particularly when processing complex command structures or network-derived data.

Top products by astral-sh: tokio-tar uv

This page lists every published CVE security advisory associated with astral-sh. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.