Search CVE reports


Toggle filters

211 – 220 of 223 results


CVE-2008-3075

Medium priority
Not affected

The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a ZIP archive and possibly (2)...

1 affected package

vim

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
vim
Show less packages

CVE-2008-3074

Medium priority
Not affected

The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a tar archive and possibly (2)...

1 affected package

vim

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
vim
Show less packages

CVE-2009-0316

Low priority
Ignored

Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim before 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a...

1 affected package

vim

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
vim
Show less packages

CVE-2008-4677

Negligible priority
Ignored

autoload/netrw.vim (aka the Netrw Plugin) 109, 131, and other versions before 133k for Vim 7.1.266, other 7.1 versions, and 7.2 stores credentials for an FTP session, and sends those credentials when attempting to establish...

1 affected package

vim

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
vim
Show less packages

CVE-2008-3432

Low priority
Not affected

Heap-based buffer overflow in the mch_expand_wildcards function in os_unix.c in Vim 6.2 and 6.3 allows user-assisted attackers to execute arbitrary code via shell metacharacters in filenames, as demonstrated by the netrw.v3 test case.

1 affected package

vim

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
vim
Show less packages

CVE-2008-4101

Low priority

Some fixes available 4 of 5

Vim 3.0 through 7.x before 7.2.010 does not properly escape characters, which allows user-assisted attackers to (1) execute arbitrary shell commands by entering a K keystroke on a line that contains a ";" (semicolon) followed by a...

1 affected package

vim

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
vim
Show less packages

CVE-2008-3294

Medium priority
Not affected

src/configure.in in Vim 5.0 through 7.1, when used for a build with Python support, does not ensure that the Makefile-conf temporary file has the intended ownership and permissions, which allows local users to execute arbitrary...

1 affected package

vim

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
vim
Show less packages

CVE-2008-2712

Medium priority

Some fixes available 4 of 5

Vim 7.1.314, 6.4, and other versions allows user-assisted remote attackers to execute arbitrary commands via Vim scripts that do not properly sanitize inputs before invoking the execute or system functions, as demonstrated using...

1 affected package

vim

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
vim
Show less packages

CVE-2007-2953

Medium priority
Fixed

Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag...

1 affected package

vim

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
vim
Show less packages

CVE-2007-2438

Medium priority
Fixed

The sandbox for vim allows dangerous functions such as (1) writefile, (2) feedkeys, and (3) system, which might allow user-assisted attackers to execute shell commands and write files via modelines.

1 affected package

vim

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
vim
Show less packages