Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vim netrw 122 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2008-3074
The shellescape function in Vim 7.0 up to and including 7.2, including 7.2a.10, allows user-assisted malicious users to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a tar archive and possibly (2) the filename of the f...
Vim Vim 7.2
Vim Tar.vim V.12
Vim Tar.vim V.13
Vim Tar.vim V.20
Vim Tar.vim V.21
Vim Vim 7.1
Vim Vim 7.0
Vim Tar.vim V.16
Vim Tar.vim V.17
Vim Vim 7.1.314
Vim Vim 7.1.266
Vim Tar.vim V.14
Vim Tar.vim V.15
Vim Tar.vim V.22
Vim Tar.vim V.10
Vim Tar.vim V.11
Vim Tar.vim V.18
Vim Tar.vim V.19
9.3
CVSSv2
CVE-2008-3075
The shellescape function in Vim 7.0 up to and including 7.2, including 7.2a.10, allows user-assisted malicious users to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a ZIP archive and possibly (2) the filename of the f...
Vim Vim 7.1.266
Vim Vim 7.1
Vim Vim 7.2
Vim Vim 7.1.314
Vim Zipplugin.vim V.19
Vim Zipplugin.vim V.18
Vim Vim 7.0
Vim Vim 7.2a.10
Vim Zipplugin.vim V.15
Vim Zipplugin.vim V.14
Vim Zipplugin.vim V.13
Vim Zipplugin.vim V.17
Vim Zipplugin.vim V.16
Vim Zipplugin.vim V.21
Vim Zipplugin.vim V.20
Vim Zipplugin.vim V.12
Vim Zipplugin.vim V.11
9.3
CVSSv2
CVE-2008-3076
The Netrw plugin 125 in netrw.vim in Vim 7.2a.10 allows user-assisted malicious users to execute arbitrary code via shell metacharacters in filenames used by the execute and system functions within the (1) mz and (2) mc commands, as demonstrated by the netrw.v2 and netrw.v3 test ...
Vim Vim 7.2a.10
1 EDB exploit
4.3
CVSSv2
CVE-2008-4677
autoload/netrw.vim (aka the Netrw Plugin) 109, 131, and other versions prior to 133k for Vim 7.1.266, other 7.1 versions, and 7.2 stores credentials for an FTP session, and sends those credentials when attempting to establish subsequent FTP sessions to servers on different hosts,...
Vim Netrw 109
Vim Netrw 131
Vim Netrw 116
Vim Netrw 118
Vim Netrw 112
Vim Netrw 113
Vim Netrw 122
Vim Netrw 123
Vim Netrw 114
Vim Netrw 115
Vim Netrw 128
Vim Netrw 110
Vim Netrw 111
Vim Netrw 120
Vim Netrw 121
9.3
CVSSv2
CVE-2008-4101
Vim 3.0 up to and including 7.x prior to 7.2.010 does not properly escape characters, which allows user-assisted malicious users to (1) execute arbitrary shell commands by entering a K keystroke on a line that contains a ";" (semicolon) followed by a command, or execute...
Vim Vim 5.2
Vim Vim 5.3
Vim Vim 6.1
Vim Vim 6.2
Vim Vim 5.4
Vim Vim 5.5
Vim Vim 6.3
Vim Vim 6.4
Vim Vim 5.0
Vim Vim 5.1
Vim Vim 5.8
Vim Vim 6.0
Vim Vim
Vim Vim 3.0
Vim Vim 4.0
Vim Vim 5.6
Vim Vim 5.7
Vim Vim 7.0
Vim Vim 7.1
1 EDB exploit
9.3
CVSSv2
CVE-2008-2712
Vim 7.1.314, 6.4, and other versions allows user-assisted remote malicious users to execute arbitrary commands via Vim scripts that do not properly sanitize inputs before invoking the execute or system functions, as demonstrated using (1) filetype.vim, (3) xpm.vim, (4) gzip_vim, ...
Vim Vim
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 7.10
Canonical Ubuntu Linux 6.06
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-21991
CVE-2024-32674
path traversal
CVE-2023-21987
denial of service
dos
CVE-2024-4647
CVE-2024-25519
CVE-2024-33612
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started