Lucene search

K

7 matches found

CVE
CVE
added 2008/06/16 9:41 p.m.84 views

CVE-2008-2712

Vim 7.1.314, 6.4, and other versions allows user-assisted remote attackers to execute arbitrary commands via Vim scripts that do not properly sanitize inputs before invoking the execute or system functions, as demonstrated using (1) filetype.vim, (3) xpm.vim, (4) gzip_vim, and (5) netrw. NOTE: the ...

9.3CVSS9.2AI score0.09987EPSS
CVE
CVE
added 2009/01/28 11:30 a.m.75 views

CVE-2009-0316

Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim before 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983), as demonstrate...

6.9CVSS7.8AI score0.00156EPSS
Web
CVE
CVE
added 2008/09/18 5:59 p.m.74 views

CVE-2008-4101

Vim 3.0 through 7.x before 7.2.010 does not properly escape characters, which allows user-assisted attackers to (1) execute arbitrary shell commands by entering a K keystroke on a line that contains a ";" (semicolon) followed by a command, or execute arbitrary Ex commands by entering an argument af...

9.3CVSS9.8AI score0.10725EPSS
CVE
CVE
added 2009/02/21 10:30 p.m.73 views

CVE-2008-3075

The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a ZIP archive and possibly (2) the filename of the first file in a ZIP archive, which is not proper...

9.3CVSS8AI score0.09987EPSS
CVE
CVE
added 2009/02/21 10:30 p.m.65 views

CVE-2008-3074

The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a tar archive and possibly (2) the filename of the first file in a tar archive, which is not proper...

9.3CVSS8AI score0.09987EPSS
CVE
CVE
added 2009/02/21 11:30 p.m.46 views

CVE-2008-6235

The Netrw plugin (netrw.vim) in Vim 7.0 and 7.1 allows user-assisted attackers to execute arbitrary commands via shell metacharacters in a filename used by the (1) "D" (delete) command or (2) b:netrw_curdir variable, as demonstrated using the netrw.v4 and netrw.v5 test cases.

9.3CVSS7.8AI score0.02553EPSS
CVE
CVE
added 2008/07/24 6:41 p.m.43 views

CVE-2008-3294

src/configure.in in Vim 5.0 through 7.1, when used for a build with Python support, does not ensure that the Makefile-conf temporary file has the intended ownership and permissions, which allows local users to execute arbitrary code by modifying this file during a time window, or by creating it ahe...

3.7CVSS7.1AI score0.00132EPSS