Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2fqm-grvm-7h89

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.

Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.

EPSS

Процентиль: 95%
0.17207
Средний

Дефекты

CWE-119

Связанные уязвимости

ubuntu
почти 17 лет назад

Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.

redhat
больше 20 лет назад

Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.

nvd
почти 17 лет назад

Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.

debian
почти 17 лет назад

Heap-based buffer overflow in the mch_expand_wildcards function in os_ ...

EPSS

Процентиль: 95%
0.17207
Средний

Дефекты

CWE-119