[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Vim - (bulletinjul2019)

ID: oval:org.secpod.oval:def:2104940Date: (C)2019-12-31   (M)2023-12-20
Class: PATCHFamily: unix




getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.

Platform:
Sun Solaris 11
Product:
editor/vim
editor/vim/vim-core
editor/gvim
Reference:
bulletinjul2019
CVE-2019-12735
CVE    1
CVE-2019-12735
CPE    1
cpe:/o:oracle:solaris:11

© SecPod Technologies