Логотип exploitDog
bind:CVE-2002-1377
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2002-1377

Количество 4

Количество 4

redhat логотип

CVE-2002-1377

больше 22 лет назад

vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.

EPSS: Низкий
nvd логотип

CVE-2002-1377

больше 22 лет назад

vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.

CVSS2: 4.6
EPSS: Низкий
debian логотип

CVE-2002-1377

больше 22 лет назад

vim 6.0 and 6.1, and possibly other versions, allows attackers to exec ...

CVSS2: 4.6
EPSS: Низкий
github логотип

GHSA-3g8f-84mq-ghvw

около 3 лет назад

vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2002-1377

vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.

0%
Низкий
больше 22 лет назад
nvd логотип
CVE-2002-1377

vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.

CVSS2: 4.6
0%
Низкий
больше 22 лет назад
debian логотип
CVE-2002-1377

vim 6.0 and 6.1, and possibly other versions, allows attackers to exec ...

CVSS2: 4.6
0%
Низкий
больше 22 лет назад
github логотип
GHSA-3g8f-84mq-ghvw

vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.

0%
Низкий
около 3 лет назад

Уязвимостей на страницу