Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown
CVE-2021-4166
Disclosure Date: December 25, 2021 (last updated February 23, 2025)
vim is vulnerable to Out-of-bounds Read
0
Attacker Value
Unknown
CVE-2017-17087
Disclosure Date: December 01, 2017 (last updated November 26, 2024)
fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp file to the editor's primary group (which may be different from the group ownership of the original file), which allows local users to obtain sensitive information by leveraging an applicable group membership, as demonstrated by /etc/shadow owned by root:shadow mode 0640, but /etc/.shadow.swp owned by root:users mode 0640, a different vulnerability than CVE-2017-1000382.
0
Attacker Value
Unknown
CVE-2017-11109
Disclosure Date: July 08, 2017 (last updated November 26, 2024)
Vim 8.0 allows attackers to cause a denial of service (invalid free) or possibly have unspecified other impact via a crafted source (aka -S) file. NOTE: there might be a limited number of scenarios in which this has security relevance.
0
Attacker Value
Unknown
CVE-2016-1248
Disclosure Date: November 23, 2016 (last updated November 25, 2024)
vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.
0
Attacker Value
Unknown
CVE-2008-2712
Disclosure Date: June 16, 2008 (last updated October 04, 2023)
Vim 7.1.314, 6.4, and other versions allows user-assisted remote attackers to execute arbitrary commands via Vim scripts that do not properly sanitize inputs before invoking the execute or system functions, as demonstrated using (1) filetype.vim, (3) xpm.vim, (4) gzip_vim, and (5) netrw. NOTE: the originally reported version was 7.1.314, but the researcher actually found this set of issues in 7.1.298. NOTE: the zipplugin issue (originally vector 2 in this identifier) has been subsumed by CVE-2008-3075.
0