CVE-2021-3796
- EPSS 0.12%
- Published 15.09.2021 13:15:08
- Last modified 21.11.2024 06:22:27
vim is vulnerable to Use After Free
CVE-2021-3778
- EPSS 0.39%
- Published 15.09.2021 08:15:06
- Last modified 21.11.2024 06:22:24
vim is vulnerable to Heap-based Buffer Overflow
CVE-2021-3770
- EPSS 0.13%
- Published 06.09.2021 12:15:08
- Last modified 21.11.2024 06:22:23
vim is vulnerable to Heap-based Buffer Overflow
CVE-2019-20807
- EPSS 0.08%
- Published 28.05.2020 14:15:11
- Last modified 21.11.2024 04:39:24
In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).
CVE-2019-20079
- EPSS 0.33%
- Published 30.12.2019 01:15:12
- Last modified 21.11.2024 04:38:01
The autocmd feature in window.c in Vim before 8.1.2136 accesses freed memory.
CVE-2019-12735
- EPSS 56.63%
- Published 05.06.2019 14:29:11
- Last modified 21.11.2024 04:23:27
getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.
CVE-2017-17087
- EPSS 0.04%
- Published 01.12.2017 08:29:00
- Last modified 20.04.2025 01:37:25
fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp file to the editor's primary group (which may be different from the group ownership of the original file), which allows local users to obtain sensitive information by leveraging an ...
CVE-2017-1000382
- EPSS 0.06%
- Published 31.10.2017 20:29:00
- Last modified 20.04.2025 01:37:25
VIM version 8.0.1187 (and other versions most likely) ignores umask when creating a swap file ("[ORIGINAL_FILENAME].swp") resulting in files that may be world readable or otherwise accessible in ways not intended by the user running the vi binary.
CVE-2017-11109
- EPSS 0.26%
- Published 08.07.2017 17:29:00
- Last modified 20.04.2025 01:37:25
Vim 8.0 allows attackers to cause a denial of service (invalid free) or possibly have unspecified other impact via a crafted source (aka -S) file. NOTE: there might be a limited number of scenarios in which this has security relevance.
CVE-2017-6349
- EPSS 0.62%
- Published 27.02.2017 07:59:00
- Last modified 20.04.2025 01:37:25
An integer overflow at a u_read_undo memory allocation site would occur for vim before patch 8.0.0377, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows.