Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vim development group vim 6.3 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2005-2368
vim 6.3 prior to 6.3.082, with modelines enabled, allows external user-assisted malicious users to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels.
Vim Development Group Vim 6.3.081
Vim Development Group Vim 6.3
Vim Development Group Vim 6.3.011
Vim Development Group Vim 6.3.025
Vim Development Group Vim 6.3.030
Vim Development Group Vim 6.3.044
7.2
CVSSv2
CVE-2004-1138
VIM prior to 6.3 and gVim prior to 6.3 allow local users to execute arbitrary commands via a file containing a crafted modeline that is executed when the file is viewed using options such as (1) termcap, (2) printdevice, (3) titleold, (4) filetype, (5) syntax, (6) backupext, (7) ...
Vim Development Group Vim 5.6
Vim Development Group Vim 5.7
Vim Development Group Vim 5.8
Vim Development Group Vim 6.3.044
Vim Development Group Vim 5.2
Vim Development Group Vim 5.3
Vim Development Group Vim 6.2
Vim Development Group Vim 6.3.011
Vim Development Group Vim 5.4
Vim Development Group Vim 5.5
Vim Development Group Vim 6.3.025
Vim Development Group Vim 6.3.030
Vim Development Group Vim 5.0
Vim Development Group Vim 5.1
Vim Development Group Vim 6.0
Vim Development Group Vim 6.1
6.8
CVSSv2
CVE-2007-2953
Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and previous versions, and 7.x up to 7.1, allows user-assisted remote malicious users to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the help...
Vim Development Group Vim 7.1
Vim Development Group Vim 7.1.38
Vim Development Group Vim
Vim Development Group Vim 7.0
4.6
CVSSv2
CVE-2005-0069
The (1) tcltags or (2) vimspell.sh scripts in vim 6.3 allow local users to overwrite or create arbitrary files via a symlink attack on temporary files.
Vim Development Group Vim 6.3.011
Vim Development Group Vim 6.3.025
Vim Development Group Vim 6.3.030
Vim Development Group Vim 6.3.044
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started