On Tue, Apr 04, 2023 at 06:29:50PM +0100, debian-u...@howorth.org.uk wrote:
> But cropping and ignoring the actual point of Stefan's mail rather
> misses the point and insults him. For example, three CVEs chosen at
> random from the 'vim' list:
> 
> CVE-2010-3481         Multiple SQL injection vulnerabilities in
> login.php in ApPHP PHP MicroCMS 1.0.1, when magic_quotes_gpc is
> disabled, allow remote attackers to execute arbitrary SQL commands via
> the (1) user_name and (2) password variables, possibly related to
> include/classes/Login.php. NOTE: some of these details are obtained
> from third party information. NOTE: the password vector might not be
> vulnerable.
> 
> CVE-2010-2704         Buffer overflow in HP OpenView
> Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to
> execute arbitrary code via a long HTTP request to nnmrptconfig.exe.
> 
> CVE-2010-2703         Stack-based buffer overflow in the execvp_nc
> function in the ov.dll module in HP OpenView Network Node Manager (OV
> NNM) 7.51 and 7.53, when running on Windows, allows remote attackers to
> execute arbitrary code via a long HTTP request to webappmon.exe. 
> 
> FWIW, the word SQL appears 127 times in the 'vim' CVEs, and the word
> 'vim' doesn't appear in most so I'm not sure how helpful these numbers
> actually are.

The word "via" appears in all three of your selections.  That makes me
think that the web site is using some kind of a "close-enough match"
heuristic, and is (unhelpfully) matching "via" as close enough to "vim".

Reply via email to