Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-2438

Опубликовано: 02 мая 2007
Источник: debian
EPSS Низкий

Описание

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
vimfixed1:7.1-022+1package
vimnot-affectedsargepackage

Примечания

  • Exploitable through modelines, needs to be used with care in any case

EPSS

Процентиль: 88%
0.03505
Низкий

Связанные уязвимости

ubuntu
почти 19 лет назад

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

redhat
почти 19 лет назад

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

nvd
почти 19 лет назад

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

github
почти 4 года назад

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

oracle-oval
почти 19 лет назад

ELSA-2007-0346: Moderate: vim security update (MODERATE)

EPSS

Процентиль: 88%
0.03505
Низкий