Vim Development Group Vim vulnerabilities
8 known vulnerabilities affecting vim_development_group/vim.
Total CVEs
8
CISA KEV
0
Public exploits
2
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH2MEDIUM4LOW1
Vulnerabilities
Page 1 of 1
CVE-2007-2953MEDIUMCVSS 6.8≤ 6.4v7.0+2 more2007-07-31
CVE-2007-2953 [MEDIUM] CVE-2007-2953: Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, an
Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the helptags command.
nvd
CVE-2007-2438HIGHCVSS 7.6v7.02007-05-02
CVE-2007-2438 [HIGH] CVE-2007-2438: The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system,
The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.
nvd
CVE-2005-2368CRITICALCVSS 9.3v6.3v6.3.011+4 more2005-07-26
CVE-2005-2368 [CRITICAL] CWE-78 CVE-2005-2368: vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute a
vim 6.3 before 6.3.082, with modelines enabled, allows external user-assisted attackers to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels.
nvd
CVE-2005-0069MEDIUMCVSS 4.6v6.3.011v6.3.025+2 more2005-01-13
CVE-2005-0069 [MEDIUM] CVE-2005-0069: The (1) tcltags or (2) vimspell.sh scripts in vim 6.3 allow local users to overwrite or create arbit
The (1) tcltags or (2) vimspell.sh scripts in vim 6.3 allow local users to overwrite or create arbitrary files via a symlink attack on temporary files.
nvd
CVE-2004-1138HIGHCVSS 7.2v5.0v5.1+14 more2005-01-10
CVE-2004-1138 [HIGH] CVE-2004-1138: VIM before 6.3 and gVim before 6.3 allow local users to execute arbitrary commands via a file contai
VIM before 6.3 and gVim before 6.3 allow local users to execute arbitrary commands via a file containing a crafted modeline that is executed when the file is viewed using options such as (1) termcap, (2) printdevice, (3) titleold, (4) filetype, (5) syntax, (6) backupext, (7) keymap, (8) patchmode, or (9) langmenu.
nvd
CVE-2002-1377MEDIUMCVSS 4.6PoCv5.0v5.1+9 more2002-12-23
CVE-2002-1377 [MEDIUM] CVE-2002-1377: vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using t
vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.
nvd
CVE-2001-0408MEDIUMCVSS 5.1v5.72001-06-18
CVE-2001-0408 [MEDIUM] CVE-2001-0408: vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers
vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes.
nvd
CVE-2001-0409LOWCVSS 2.1PoCv5.72001-06-18
CVE-2001-0409 [LOW] CVE-2001-0409: vim (aka gvim) allows local users to modify files being edited by other users via a symlink attack o
vim (aka gvim) allows local users to modify files being edited by other users via a symlink attack on the backup and swap files, when the victim is editing the file in a world writable directory.
nvd