Логотип exploitDog
bind:CVE-2002-1377
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2002-1377

Количество 4

Количество 4

redhat логотип

CVE-2002-1377

почти 23 года назад

vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.

EPSS: Низкий
nvd логотип

CVE-2002-1377

почти 23 года назад

vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.

CVSS2: 4.6
EPSS: Низкий
debian логотип

CVE-2002-1377

почти 23 года назад

vim 6.0 and 6.1, and possibly other versions, allows attackers to exec ...

CVSS2: 4.6
EPSS: Низкий
github логотип

GHSA-3g8f-84mq-ghvw

больше 3 лет назад

vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2002-1377

vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.

0%
Низкий
почти 23 года назад
nvd логотип
CVE-2002-1377

vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.

CVSS2: 4.6
0%
Низкий
почти 23 года назад
debian логотип
CVE-2002-1377

vim 6.0 and 6.1, and possibly other versions, allows attackers to exec ...

CVSS2: 4.6
0%
Низкий
почти 23 года назад
github логотип
GHSA-3g8f-84mq-ghvw

vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу