Логотип exploitDog
bind:CVE-2001-0408
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2001-0408

Количество 3

Количество 3

redhat логотип

CVE-2001-0408

около 24 лет назад

vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes.

EPSS: Низкий
nvd логотип

CVE-2001-0408

около 24 лет назад

vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes.

CVSS2: 5.1
EPSS: Низкий
github логотип

GHSA-j8qm-vm5m-59fw

около 3 лет назад

vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2001-0408

vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes.

1%
Низкий
около 24 лет назад
nvd логотип
CVE-2001-0408

vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes.

CVSS2: 5.1
1%
Низкий
около 24 лет назад
github логотип
GHSA-j8qm-vm5m-59fw

vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes.

1%
Низкий
около 3 лет назад

Уязвимостей на страницу