{"id":"AZL-78497","summary":"CVE-2026-28417 affecting package vim 9.1.1616-1","details":"Vim is an open source, command line text editor. Prior to version 9.2.0073, an OS command injection vulnerability exists in the `netrw` standard plugin bundled with Vim. By inducing a user to open a crafted URL (e.g., using the `scp://` protocol handler), an attacker can execute arbitrary shell commands with the privileges of the Vim process. Version 9.2.0073 fixes the issue.","modified":"2026-04-01T05:23:15.781598Z","published":"2026-02-27T22:16:24Z","upstream":["CVE-2026-28417"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-28417"}],"affected":[{"package":{"name":"vim","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/vim"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"last_affected":"9.1.1616-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-78497.json"}}],"schema_version":"1.7.5"}