Vulnerabilities > VIM > VIM > 5.4

DATE CVE VULNERABILITY TITLE RISK
2009-01-28 CVE-2009-0316 Remote Command Execution vulnerability in Vim 'PySys_SetArgv'
Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim before 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983), as demonstrated by an erroneous search path for plugin/bike.vim in bicyclerepair.
local
vim
6.9
2008-09-18 CVE-2008-4101 Improper Input Validation vulnerability in VIM
Vim 3.0 through 7.x before 7.2.010 does not properly escape characters, which allows user-assisted attackers to (1) execute arbitrary shell commands by entering a K keystroke on a line that contains a ";" (semicolon) followed by a command, or execute arbitrary Ex commands by entering an argument after a (2) "Ctrl-]" (control close-square-bracket) or (3) "g]" (g close-square-bracket) keystroke sequence, a different issue than CVE-2008-2712.
network
vim CWE-20
critical
9.3
2008-07-24 CVE-2008-3294 Code Injection vulnerability in VIM
src/configure.in in Vim 5.0 through 7.1, when used for a build with Python support, does not ensure that the Makefile-conf temporary file has the intended ownership and permissions, which allows local users to execute arbitrary code by modifying this file during a time window, or by creating it ahead of time with permissions that prevent its modification by configure.
local
high complexity
vim CWE-94
3.7