Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vim vim 5.7 vulnerabilities and exploits
(subscribe to this query)
935
VMScore
CVE-2008-4101
Vim 3.0 up to and including 7.x prior to 7.2.010 does not properly escape characters, which allows user-assisted malicious users to (1) execute arbitrary shell commands by entering a K keystroke on a line that contains a ";" (semicolon) followed by a command, or execute...
Vim Vim 5.2
Vim Vim 5.3
Vim Vim 6.1
Vim Vim 6.2
Vim Vim 5.4
Vim Vim 5.5
Vim Vim 6.3
Vim Vim 6.4
Vim Vim 5.0
Vim Vim 5.1
Vim Vim 5.8
Vim Vim 6.0
Vim Vim
Vim Vim 3.0
Vim Vim 4.0
Vim Vim 5.6
Vim Vim 5.7
Vim Vim 7.0
Vim Vim 7.1
1 EDB exploit
641
VMScore
CVE-2004-1138
VIM prior to 6.3 and gVim prior to 6.3 allow local users to execute arbitrary commands via a file containing a crafted modeline that is executed when the file is viewed using options such as (1) termcap, (2) printdevice, (3) titleold, (4) filetype, (5) syntax, (6) backupext, (7) ...
Vim Development Group Vim 5.6
Vim Development Group Vim 5.7
Vim Development Group Vim 5.8
Vim Development Group Vim 6.3.044
Vim Development Group Vim 5.2
Vim Development Group Vim 5.3
Vim Development Group Vim 6.2
Vim Development Group Vim 6.3.011
Vim Development Group Vim 5.4
Vim Development Group Vim 5.5
Vim Development Group Vim 6.3.025
Vim Development Group Vim 6.3.030
Vim Development Group Vim 5.0
Vim Development Group Vim 5.1
Vim Development Group Vim 6.0
Vim Development Group Vim 6.1
614
VMScore
CVE-2009-0316
Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim prior to 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-...
Vim Vim 6.1
Vim Vim 6.0
Vim Vim 5.2
Vim Vim 5.1
Vim Vim 7.0
Vim Vim 6.4
Vim Vim 5.6
Vim Vim 5.5
Vim Vim 3.0
Vim Vim 1.22
Vim Vim 1.0
Vim Vim 6.3
Vim Vim 6.2
Vim Vim 5.4
Vim Vim 5.3
Vim Vim
Vim Vim 7.1
Vim Vim 5.8
Vim Vim 5.7
Vim Vim 5.0
Vim Vim 4.0
454
VMScore
CVE-2001-0408
vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow malicious users to execute arbitrary commands when another user opens a file containing malicious VIM control codes.
Vim Development Group Vim 5.7
409
VMScore
CVE-2002-1377
vim 6.0 and 6.1, and possibly other versions, allows malicious users to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt.
Vim Development Group Vim 5.0
Vim Development Group Vim 5.1
Vim Development Group Vim 5.8
Vim Development Group Vim 6.0
Vim Development Group Vim 6.1
Vim Development Group Vim 5.2
Vim Development Group Vim 5.3
Vim Development Group Vim 5.4
Vim Development Group Vim 5.5
Vim Development Group Vim 5.6
Vim Development Group Vim 5.7
329
VMScore
CVE-2008-3294
src/configure.in in Vim 5.0 up to and including 7.1, when used for a build with Python support, does not ensure that the Makefile-conf temporary file has the intended ownership and permissions, which allows local users to execute arbitrary code by modifying this file during a tim...
Vim Vim 6.3
Vim Vim 6.2
Vim Vim 5.4
Vim Vim 5.3
Vim Vim 5.8
Vim Vim 5.7
Vim Vim 5.0
Vim Vim 7.1
Vim Vim 7.0
Vim Vim 6.4
Vim Vim 5.6
Vim Vim 5.5
Vim Vim 6.1
Vim Vim 6.0
Vim Vim 5.2
Vim Vim 5.1
215
VMScore
CVE-2001-0409
vim (aka gvim) allows local users to modify files being edited by other users via a symlink attack on the backup and swap files, when the victim is editing the file in a world writable directory.
Vim Development Group Vim 5.7
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started