Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5x93-92vm-jw5m

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.

getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.

EPSS

Процентиль: 98%
0.56629
Средний

Связанные уязвимости

CVSS3: 8.6
ubuntu
больше 6 лет назад

getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.

CVSS3: 5.3
redhat
больше 6 лет назад

getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.

CVSS3: 8.6
nvd
больше 6 лет назад

getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.

CVSS3: 8.6
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 8.6
debian
больше 6 лет назад

getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote ...

EPSS

Процентиль: 98%
0.56629
Средний