Filtered by vendor Vim
Subscriptions
Total
210 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-53906 | 1 Vim | 1 Vim | 2025-07-18 | 4.1 Medium |
Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim’s zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability. | ||||
CVE-2025-53905 | 1 Vim | 1 Vim | 2025-07-18 | 4.1 Medium |
Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim’s tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability. | ||||
CVE-2025-1215 | 1 Vim | 1 Vim | 2025-07-13 | 2.8 Low |
A vulnerability classified as problematic was found in vim up to 9.1.1096. This vulnerability affects unknown code of the file src/main.c. The manipulation of the argument --log leads to memory corruption. It is possible to launch the attack on the local host. Upgrading to version 9.1.1097 is able to address this issue. The patch is identified as c5654b84480822817bb7b69ebc97c174c91185e9. It is recommended to upgrade the affected component. | ||||
CVE-2025-27423 | 1 Vim | 1 Vim | 2025-07-12 | 7.1 High |
Vim is an open source, command line text editor. Vim is distributed with the tar.vim plugin, that allows easy editing and viewing of (compressed or uncompressed) tar files. Starting with 9.1.0858, the tar.vim plugin uses the ":read" ex command line to append below the cursor position, however the is not sanitized and is taken literally from the tar archive. This allows to execute shell commands via special crafted tar archives. Whether this really happens, depends on the shell being used ('shell' option, which is set using $SHELL). The issue has been fixed as of Vim patch v9.1.1164 | ||||
CVE-2023-4738 | 2 Apple, Vim | 2 Macos, Vim | 2025-06-25 | 7.8 High |
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1848. | ||||
CVE-2023-5344 | 2 Fedoraproject, Vim | 2 Fedora, Vim | 2025-06-18 | 7.5 High |
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1969. | ||||
CVE-2022-3256 | 3 Debian, Fedoraproject, Vim | 3 Debian Linux, Fedora, Vim | 2025-05-23 | 7.8 High |
Use After Free in GitHub repository vim/vim prior to 9.0.0530. | ||||
CVE-2022-3278 | 2 Fedoraproject, Vim | 2 Fedora, Vim | 2025-05-22 | 5.5 Medium |
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0552. | ||||
CVE-2022-3296 | 2 Fedoraproject, Vim | 2 Fedora, Vim | 2025-05-22 | 7.8 High |
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0577. | ||||
CVE-2022-3297 | 2 Fedoraproject, Vim | 2 Fedora, Vim | 2025-05-21 | 7.8 High |
Use After Free in GitHub repository vim/vim prior to 9.0.0579. | ||||
CVE-2022-3324 | 3 Debian, Fedoraproject, Vim | 3 Debian Linux, Fedora, Vim | 2025-05-21 | 7.8 High |
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0598. | ||||
CVE-2022-3352 | 3 Debian, Fedoraproject, Vim | 3 Debian Linux, Fedora, Vim | 2025-05-20 | 7.8 High |
Use After Free in GitHub repository vim/vim prior to 9.0.0614. | ||||
CVE-2024-22667 | 2 Fedoraproject, Vim | 2 Fedora, Vim | 2025-05-15 | 7.8 High |
Vim before 9.0.2142 has a stack-based buffer overflow because did_set_langmap in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions. | ||||
CVE-2025-29768 | 1 Vim | 1 Vim | 2025-05-02 | 4.4 Medium |
Vim, a text editor, is vulnerable to potential data loss with zip.vim and special crafted zip files in versions prior to 9.1.1198. The impact is medium because a user must be made to view such an archive with Vim and then press 'x' on such a strange filename. The issue has been fixed as of Vim patch v9.1.1198. | ||||
CVE-2022-3520 | 1 Vim | 1 Vim | 2025-04-23 | 9.8 Critical |
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0765. | ||||
CVE-2022-3491 | 1 Vim | 1 Vim | 2025-04-23 | 7.8 High |
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0742. | ||||
CVE-2022-3591 | 1 Vim | 1 Vim | 2025-04-23 | 7.8 High |
Use After Free in GitHub repository vim/vim prior to 9.0.0789. | ||||
CVE-2017-1000382 | 1 Vim | 1 Vim | 2025-04-20 | N/A |
VIM version 8.0.1187 (and other versions most likely) ignores umask when creating a swap file ("[ORIGINAL_FILENAME].swp") resulting in files that may be world readable or otherwise accessible in ways not intended by the user running the vi binary. | ||||
CVE-2017-6350 | 1 Vim | 1 Vim | 2025-04-20 | N/A |
An integer overflow at an unserialize_uep memory allocation site would occur for vim before patch 8.0.0378, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows. | ||||
CVE-2017-11109 | 1 Vim | 1 Vim | 2025-04-20 | N/A |
Vim 8.0 allows attackers to cause a denial of service (invalid free) or possibly have unspecified other impact via a crafted source (aka -S) file. NOTE: there might be a limited number of scenarios in which this has security relevance. |