Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w427-f3fp-6x6x

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels.

vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels.

EPSS

Процентиль: 81%
0.01518
Низкий

Дефекты

CWE-78

Связанные уязвимости

ubuntu
около 20 лет назад

vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels.

redhat
около 20 лет назад

vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels.

nvd
около 20 лет назад

vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels.

debian
около 20 лет назад

vim 6.3 before 6.3.082, with modelines enabled, allows external user-a ...

EPSS

Процентиль: 81%
0.01518
Низкий

Дефекты

CWE-78