Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
vim vim 6.3 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-3432
Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted malicious users to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.
Vim Vim 6.3
Vim Vim 6.2
1 EDB exploit
NA
CVE-2008-3294
src/configure.in in Vim 5.0 up to and including 7.1, when used for a build with Python support, does not ensure that the Makefile-conf temporary file has the intended ownership and permissions, which allows local users to execute arbitrary code by modifying this file during a tim...
Vim Vim 6.3
Vim Vim 6.2
Vim Vim 5.4
Vim Vim 5.3
Vim Vim 5.8
Vim Vim 5.7
Vim Vim 5.0
Vim Vim 7.1
Vim Vim 7.0
Vim Vim 6.4
Vim Vim 5.6
Vim Vim 5.5
Vim Vim 6.1
Vim Vim 6.0
Vim Vim 5.2
Vim Vim 5.1
NA
CVE-2005-2368
vim 6.3 prior to 6.3.082, with modelines enabled, allows external user-assisted malicious users to execute arbitrary commands via shell metacharacters in the (1) glob or (2) expand commands of a foldexpr expression for calculating fold levels.
Vim Development Group Vim 6.3.081
Vim Development Group Vim 6.3
Vim Development Group Vim 6.3.011
Vim Development Group Vim 6.3.025
Vim Development Group Vim 6.3.030
Vim Development Group Vim 6.3.044
NA
CVE-2008-4101
Vim 3.0 up to and including 7.x prior to 7.2.010 does not properly escape characters, which allows user-assisted malicious users to (1) execute arbitrary shell commands by entering a K keystroke on a line that contains a ";" (semicolon) followed by a command, or execute...
Vim Vim 5.2
Vim Vim 5.3
Vim Vim 6.1
Vim Vim 6.2
Vim Vim 5.4
Vim Vim 5.5
Vim Vim 6.3
Vim Vim 6.4
Vim Vim 5.0
Vim Vim 5.1
Vim Vim 5.8
Vim Vim 6.0
Vim Vim
Vim Vim 3.0
Vim Vim 4.0
Vim Vim 5.6
Vim Vim 5.7
Vim Vim 7.0
Vim Vim 7.1
1 EDB exploit
NA
CVE-2009-0316
Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim prior to 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-...
Vim Vim 6.1
Vim Vim 6.0
Vim Vim 5.2
Vim Vim 5.1
Vim Vim 7.0
Vim Vim 6.4
Vim Vim 5.6
Vim Vim 5.5
Vim Vim 3.0
Vim Vim 1.22
Vim Vim 1.0
Vim Vim 6.3
Vim Vim 6.2
Vim Vim 5.4
Vim Vim 5.3
Vim Vim
Vim Vim 7.1
Vim Vim 5.8
Vim Vim 5.7
Vim Vim 5.0
Vim Vim 4.0
NA
CVE-2004-1138
VIM prior to 6.3 and gVim prior to 6.3 allow local users to execute arbitrary commands via a file containing a crafted modeline that is executed when the file is viewed using options such as (1) termcap, (2) printdevice, (3) titleold, (4) filetype, (5) syntax, (6) backupext, (7) ...
Vim Development Group Vim 5.6
Vim Development Group Vim 5.7
Vim Development Group Vim 5.8
Vim Development Group Vim 6.3.044
Vim Development Group Vim 5.2
Vim Development Group Vim 5.3
Vim Development Group Vim 6.2
Vim Development Group Vim 6.3.011
Vim Development Group Vim 5.4
Vim Development Group Vim 5.5
Vim Development Group Vim 6.3.025
Vim Development Group Vim 6.3.030
Vim Development Group Vim 5.0
Vim Development Group Vim 5.1
Vim Development Group Vim 6.0
Vim Development Group Vim 6.1
NA
CVE-2005-0069
The (1) tcltags or (2) vimspell.sh scripts in vim 6.3 allow local users to overwrite or create arbitrary files via a symlink attack on temporary files.
Vim Development Group Vim 6.3.011
Vim Development Group Vim 6.3.025
Vim Development Group Vim 6.3.030
Vim Development Group Vim 6.3.044
NA
CVE-2007-2953
Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and previous versions, and 7.x up to 7.1, allows user-assisted remote malicious users to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the help...
Vim Development Group Vim 7.1
Vim Development Group Vim 7.1.38
Vim Development Group Vim
Vim Development Group Vim 7.0
NA
CVE-2007-2438
The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted malicious users to execute shell commands and write files via modelines.
Vim Development Group Vim 7.0
3 Github repositories
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started