Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3g8f-84mq-ghvw

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.

vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.

EPSS

Процентиль: 24%
0.00077
Низкий

Связанные уязвимости

redhat
больше 22 лет назад

vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.

nvd
больше 22 лет назад

vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.

debian
больше 22 лет назад

vim 6.0 and 6.1, and possibly other versions, allows attackers to exec ...

EPSS

Процентиль: 24%
0.00077
Низкий