Show filters
246 Total Results
Displaying 31-40 of 246
Sort by:
Attacker Value
Unknown

CVE-2023-48232

Disclosure Date: November 16, 2023 (last updated January 26, 2024)
Vim is an open source command line text editor. A floating point exception may occur when calculating the line offset for overlong lines and smooth scrolling is enabled and the cpo-settings include the 'n' flag. This may happen when a window border is present and when the wrapped line continues on the next physical line directly in the window border because the 'cpo' setting includes the 'n' flag. Only users with non-default settings are affected and the exception should only result in a crash. This issue has been addressed in commit `cb0b99f0` which has been included in release version 9.0.2107. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Attacker Value
Unknown

CVE-2023-48231

Disclosure Date: November 16, 2023 (last updated December 29, 2023)
Vim is an open source command line text editor. When closing a window, vim may try to access already freed window structure. Exploitation beyond crashing the application has not been shown to be viable. This issue has been addressed in commit `25aabc2b` which has been included in release version 9.0.2106. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Attacker Value
Unknown

CVE-2023-41036

Disclosure Date: November 07, 2023 (last updated April 01, 2024)
Macvim is a text editor for MacOS. Prior to version 178, Macvim makes use of an insecure interprocess communication (IPC) mechanism which could lead to a privilege escalation. Distributed objects are a concept introduced by Apple which allow one program to vend an interface to another program. What is not made clear in the documentation is that this service can vend this interface to any other program on the machine. The impact of exploitation is a privilege escalation to root - this is likely to affect anyone who is not careful about the software they download and use MacVim to edit files that would require root privileges. Version 178 contains a fix for this issue.
Attacker Value
Unknown

CVE-2023-46246

Disclosure Date: October 27, 2023 (last updated February 14, 2025)
Vim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function `ga_grow_inner` in in the file `src/alloc.c` at line 748, which is freed in the file `src/ex_docmd.c` in the function `do_cmdline` at line 1010 and then used again in `src/cmdhist.c` at line 759. When using the `:history` command, it's possible that the provided argument overflows the accepted value. Causing an Integer Overflow and potentially later an use-after-free. This vulnerability has been patched in version 9.0.2068.
Attacker Value
Unknown

CVE-2023-5535

Disclosure Date: October 11, 2023 (last updated November 15, 2023)
Use After Free in GitHub repository vim/vim prior to v9.0.2010.
Attacker Value
Unknown

CVE-2023-5441

Disclosure Date: October 05, 2023 (last updated November 15, 2023)
NULL Pointer Dereference in GitHub repository vim/vim prior to 20d161ace307e28690229b68584f2d84556f8960.
Attacker Value
Unknown

CVE-2023-5344

Disclosure Date: October 02, 2023 (last updated October 21, 2023)
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1969.
Attacker Value
Unknown

CVE-2023-2848

Disclosure Date: September 14, 2023 (last updated October 08, 2023)
Movim prior to version 0.22 is affected by a Cross-Site WebSocket Hijacking vulnerability. This was the result of a missing header validation.
Attacker Value
Unknown

CVE-2023-4781

Disclosure Date: September 05, 2023 (last updated February 02, 2024)
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1873.
Attacker Value
Unknown

CVE-2023-4752

Disclosure Date: September 04, 2023 (last updated February 02, 2024)
Use After Free in GitHub repository vim/vim prior to 9.0.1858.