First published: Tue Jul 26 2005(Updated: )
vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Vim Development Group Vim | =6.3 | |
Vim Development Group Vim | =6.3.011 | |
Vim Development Group Vim | =6.3.081 | |
Vim Development Group Vim | =6.3.025 | |
Vim Development Group Vim | =6.3.044 | |
Vim Development Group Vim | =6.3.030 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.