CVE-2021-3796
- EPSS 0.12%
- Veröffentlicht 15.09.2021 13:15:08
- Zuletzt bearbeitet 21.11.2024 06:22:27
vim is vulnerable to Use After Free
CVE-2021-3778
- EPSS 0.39%
- Veröffentlicht 15.09.2021 08:15:06
- Zuletzt bearbeitet 21.11.2024 06:22:24
vim is vulnerable to Heap-based Buffer Overflow
CVE-2021-3770
- EPSS 0.13%
- Veröffentlicht 06.09.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 06:22:23
vim is vulnerable to Heap-based Buffer Overflow
CVE-2019-20807
- EPSS 0.08%
- Veröffentlicht 28.05.2020 14:15:11
- Zuletzt bearbeitet 21.11.2024 04:39:24
In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).
CVE-2019-20079
- EPSS 0.33%
- Veröffentlicht 30.12.2019 01:15:12
- Zuletzt bearbeitet 21.11.2024 04:38:01
The autocmd feature in window.c in Vim before 8.1.2136 accesses freed memory.
CVE-2019-12735
- EPSS 56.63%
- Veröffentlicht 05.06.2019 14:29:11
- Zuletzt bearbeitet 21.11.2024 04:23:27
getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.
CVE-2017-17087
- EPSS 0.04%
- Veröffentlicht 01.12.2017 08:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp file to the editor's primary group (which may be different from the group ownership of the original file), which allows local users to obtain sensitive information by leveraging an ...
CVE-2017-1000382
- EPSS 0.06%
- Veröffentlicht 31.10.2017 20:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
VIM version 8.0.1187 (and other versions most likely) ignores umask when creating a swap file ("[ORIGINAL_FILENAME].swp") resulting in files that may be world readable or otherwise accessible in ways not intended by the user running the vi binary.
CVE-2017-11109
- EPSS 0.26%
- Veröffentlicht 08.07.2017 17:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Vim 8.0 allows attackers to cause a denial of service (invalid free) or possibly have unspecified other impact via a crafted source (aka -S) file. NOTE: there might be a limited number of scenarios in which this has security relevance.
CVE-2017-6349
- EPSS 0.62%
- Veröffentlicht 27.02.2017 07:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.