CNNVD-ID编号 | CNNVD-202005-1381 |
CVE编号 | CVE-2019-20807 |
发布时间 | 2020-05-28 |
更新时间 | 2021-01-21 |
漏洞类型 | 操作系统命令注入 |
漏洞来源 | N/A |
危险等级 | 中危 |
威胁类型 | 本地 |
厂 商 | N/A |
Vim是一款基于UNIX平台的编辑器。
Vim 8.1.0881之前版本中存在操作系统命令注入漏洞。攻击者可借助脚本接口(例如Python,Ruby或Lua)利用该漏洞绕过rvim受限模式并执行任意操作系统命令。
目前厂商已发布升级了Vim 操作系统命令注入漏洞的补丁,Vim 操作系统命令注入漏洞的补丁获取链接:
https://github.com/vim/vim/releases/tag/v8.1.0881
来源:MISC
链接:https://github.com/vim/vim/commit/8c62a08faf89663e5633dc5036cd8695c80f1075
来源:UBUNTU
来源:FULLDISC
来源:MISC
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00018.html
来源:CONFIRM
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/158457/Apple-Security-Advisory-2020-07-15-2.html
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159827/Red-Hat-Security-Advisory-2020-4453-01.html
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159563/Ubuntu-Security-Notice-USN-4582-1.html
来源:www.auscert.org.au
来源:vigilance.fr
来源:support.apple.com
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:www.auscert.org.au
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160889/Red-Hat-Security-Advisory-2021-0050-01.html
暂无