Show filters
246 Total Results
Displaying 201-210 of 246
Sort by:
Attacker Value
Unknown
CVE-2021-3875
Disclosure Date: October 15, 2021 (last updated February 23, 2025)
vim is vulnerable to Heap-based Buffer Overflow
0
Attacker Value
Unknown
CVE-2021-3796
Disclosure Date: September 15, 2021 (last updated February 23, 2025)
vim is vulnerable to Use After Free
0
Attacker Value
Unknown
CVE-2021-3778
Disclosure Date: September 15, 2021 (last updated February 23, 2025)
vim is vulnerable to Heap-based Buffer Overflow
0
Attacker Value
Unknown
CVE-2021-3770
Disclosure Date: September 06, 2021 (last updated February 23, 2025)
vim is vulnerable to Heap-based Buffer Overflow
0
Attacker Value
Unknown
CVE-2021-28832
Disclosure Date: April 05, 2021 (last updated November 28, 2024)
VSCodeVim before 1.19.0 allows attackers to execute arbitrary code via a crafted workspace configuration.
0
Attacker Value
Unknown
CVE-2020-27623
Disclosure Date: November 16, 2020 (last updated November 28, 2024)
JetBrains IdeaVim before version 0.58 might have caused an information leak in limited circumstances.
0
Attacker Value
Unknown
CVE-2019-20807
Disclosure Date: May 28, 2020 (last updated February 21, 2025)
In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).
0
Attacker Value
Unknown
CVE-2019-20079
Disclosure Date: December 30, 2019 (last updated November 27, 2024)
The autocmd feature in window.c in Vim before 8.1.2136 accesses freed memory.
0
Attacker Value
Unknown
CVE-2019-14957
Disclosure Date: October 01, 2019 (last updated November 27, 2024)
The JetBrains Vim plugin before version 0.52 was storing individual project data in the global vim_settings.xml file. This xml file could be synchronized to a publicly accessible GitHub repository.
0
Attacker Value
Unknown
CVE-2019-12735
Disclosure Date: June 05, 2019 (last updated November 08, 2023)
getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.
0