Page 40 of 197 results (0.006 seconds)

CVSS: 5.1EPSS: 0%CPEs: 1EXPL: 0

vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes. • http://marc.info/?l=bugtraq&m=98593106111968&w=2 http://www.calderasystems.com/support/security/advisories/CSSA-2001-014.0.txt http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-035.php3 http://www.novell.com/linux/security/advisories/2001_012_vim.html http://www.redhat.com/support/errata/RHSA-2001-008.html http://www.securityfocus.com/bid/2510 https://exchange.xforce.ibmcloud.com/vulnerabilities/6259 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

vim (aka gvim) allows local users to modify files being edited by other users via a symlink attack on the backup and swap files, when the victim is editing the file in a world writable directory. • https://www.exploit-db.com/exploits/20967 http://www.calderasystems.com/support/security/advisories/CSSA-2001-014.0.txt http://www.novell.com/linux/security/advisories/2001_012_vim.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6628 •