Vulnerabilities > VIM > VIM > 5.3
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2009-01-28 | CVE-2009-0316 | Remote Command Execution vulnerability in Vim 'PySys_SetArgv' Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim before 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983), as demonstrated by an erroneous search path for plugin/bike.vim in bicyclerepair. local vim | 6.9 |
2008-09-18 | CVE-2008-4101 | Improper Input Validation vulnerability in VIM Vim 3.0 through 7.x before 7.2.010 does not properly escape characters, which allows user-assisted attackers to (1) execute arbitrary shell commands by entering a K keystroke on a line that contains a ";" (semicolon) followed by a command, or execute arbitrary Ex commands by entering an argument after a (2) "Ctrl-]" (control close-square-bracket) or (3) "g]" (g close-square-bracket) keystroke sequence, a different issue than CVE-2008-2712. | 9.3 |
2008-07-24 | CVE-2008-3294 | Code Injection vulnerability in VIM src/configure.in in Vim 5.0 through 7.1, when used for a build with Python support, does not ensure that the Makefile-conf temporary file has the intended ownership and permissions, which allows local users to execute arbitrary code by modifying this file during a time window, or by creating it ahead of time with permissions that prevent its modification by configure. | 3.7 |