![](/assets/img/cve_300x82_sin_bg.png)
CVE-2002-1377
https://notcve.org/view.php?id=CVE-2002-1377
23 Dec 2002 — vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt. vim 6.0 y 6.1 y posiblemente otras versiones, permite a atacantes ejecutar comandos arbitrarios usando la característica libcall en lineas de modo, que no son apantalladas si no que pueden ser ejecutadas cuando vim es usado como editor para otros productos como mu... • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000812 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2001-0408
https://notcve.org/view.php?id=CVE-2001-0408
18 Jun 2001 — vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes. • http://marc.info/?l=bugtraq&m=98593106111968&w=2 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2001-0409 – Vim 5.x - Swap File Race Condition
https://notcve.org/view.php?id=CVE-2001-0409
18 Jun 2001 — vim (aka gvim) allows local users to modify files being edited by other users via a symlink attack on the backup and swap files, when the victim is editing the file in a world writable directory. • https://www.exploit-db.com/exploits/20967 •