Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Vim: OS Command Injection via 'path' completion
Vulnerability Description
Vim is an open source, command line text editor. Prior to version 9.2.0435, an OS command injection vulnerability exists in Vim's :find command-line completion. When the path option contains backtick-enclosed shell commands, those commands are executed during file name completion. Because the path option lacks the P_SECURE flag, it can be set from a modeline, allowing an attacker who controls the contents of a file to execute arbitrary shell commands when the user opens that file in Vim and triggers :find completion. This issue has been patched in version 9.2.0435.
CVSS Information
N/A
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
Vim 操作系统命令注入漏洞
Vulnerability Description
Vim是Vim开源的一款跨平台的文本编辑器。 Vim 9.2.0435之前版本存在操作系统命令注入漏洞,该漏洞源于:find命令补全中的OS命令注入,可能导致攻击者执行任意shell命令。
CVSS Information
N/A
Vulnerability Type
N/A