Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown

CVE-2021-4166

Disclosure Date: December 25, 2021 (last updated February 23, 2025)
vim is vulnerable to Out-of-bounds Read
Attacker Value
Unknown

CVE-2017-17087

Disclosure Date: December 01, 2017 (last updated November 26, 2024)
fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp file to the editor's primary group (which may be different from the group ownership of the original file), which allows local users to obtain sensitive information by leveraging an applicable group membership, as demonstrated by /etc/shadow owned by root:shadow mode 0640, but /etc/.shadow.swp owned by root:users mode 0640, a different vulnerability than CVE-2017-1000382.
Attacker Value
Unknown

CVE-2017-11109

Disclosure Date: July 08, 2017 (last updated November 26, 2024)
Vim 8.0 allows attackers to cause a denial of service (invalid free) or possibly have unspecified other impact via a crafted source (aka -S) file. NOTE: there might be a limited number of scenarios in which this has security relevance.
0
Attacker Value
Unknown

CVE-2016-1248

Disclosure Date: November 23, 2016 (last updated November 25, 2024)
vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.
0
Attacker Value
Unknown

CVE-2008-2712

Disclosure Date: June 16, 2008 (last updated October 04, 2023)
Vim 7.1.314, 6.4, and other versions allows user-assisted remote attackers to execute arbitrary commands via Vim scripts that do not properly sanitize inputs before invoking the execute or system functions, as demonstrated using (1) filetype.vim, (3) xpm.vim, (4) gzip_vim, and (5) netrw. NOTE: the originally reported version was 7.1.314, but the researcher actually found this set of issues in 7.1.298. NOTE: the zipplugin issue (originally vector 2 in this identifier) has been subsumed by CVE-2008-3075.
0