Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x2f5-352x-j9w7

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

EPSS

Процентиль: 86%
0.03042
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

redhat
больше 18 лет назад

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

nvd
больше 18 лет назад

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

debian
больше 18 лет назад

The sandbox for vim allows dangerous functions such as (1) writefile, ...

oracle-oval
около 18 лет назад

ELSA-2007-0346: Moderate: vim security update (MODERATE)

EPSS

Процентиль: 86%
0.03042
Низкий