[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250039

 
 

909

 
 

195882

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

[3.7] vim: arbitrary command execution in getchar.c (CVE-2019-12735)

ID: oval:org.secpod.oval:def:1801470Date: (C)2019-06-27   (M)2023-11-10
Class: PATCHFamily: unix




getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.

Platform:
Alpine Linux 3.7
Product:
vim
Reference:
10562
CVE-2019-12735
CVE    1
CVE-2019-12735
CPE    7
cpe:/a:vim:vim:7.3
cpe:/a:vim:vim:7.2
cpe:/a:vim:vim:6.1
cpe:/a:vim:vim:6.3
...

© SecPod Technologies