Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-2438

Опубликовано: 02 мая 2007
Источник: debian
EPSS Низкий

Описание

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
vimfixed1:7.1-022+1package
vimnot-affectedsargepackage

Примечания

  • Exploitable through modelines, needs to be used with care in any case

EPSS

Процентиль: 86%
0.03042
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

redhat
больше 18 лет назад

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

nvd
больше 18 лет назад

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

github
больше 3 лет назад

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

oracle-oval
около 18 лет назад

ELSA-2007-0346: Moderate: vim security update (MODERATE)

EPSS

Процентиль: 86%
0.03042
Низкий