CVE-2019-12735 log

Source
Severity High
Remote Yes
Type Arbitrary code execution
Description
getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.
Group Package Affected Fixed Severity Status Ticket
AVG-979 neovim 0.3.5-1 0.3.6-1 High Fixed
AVG-976 gvim 8.1.1186-1 8.1.1467-1 High Fixed
AVG-975 vim 8.1.1186-1 8.1.1467-1 High Fixed
Date Advisory Group Package Severity Type
11 Jun 2019 ASA-201906-9 AVG-976 gvim High arbitrary code execution
11 Jun 2019 ASA-201906-8 AVG-975 vim High arbitrary code execution
References
https://github.com/vim/vim/commit/53575521406739cf20bbe4e384d88e7dca11f040