Логотип exploitDog
bind:"BDU:2025-11731" OR bind:"CVE-2025-53906"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2025-11731" OR bind:"CVE-2025-53906"

Количество 14

Количество 14

fstec логотип

BDU:2025-11731

4 месяца назад

Уязвимость текстового редактора vim, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю выполнить произвольные команды

CVSS3: 4.1
EPSS: Низкий
ubuntu логотип

CVE-2025-53906

4 месяца назад

Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim’s zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability.

CVSS3: 4.1
EPSS: Низкий
redhat логотип

CVE-2025-53906

4 месяца назад

Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim’s zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability.

CVSS3: 4.1
EPSS: Низкий
nvd логотип

CVE-2025-53906

4 месяца назад

Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim’s zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability.

CVSS3: 4.1
EPSS: Низкий
msrc логотип

CVE-2025-53906

3 месяца назад

Vim has path traversal issue with zip.vim and special crafted zip archives

CVSS3: 4.1
EPSS: Низкий
debian логотип

CVE-2025-53906

4 месяца назад

Vim is an open source, command line text editor. Prior to version 9.1. ...

CVSS3: 4.1
EPSS: Низкий
redos логотип

ROS-20250807-06

3 месяца назад

Множественные уязвимости vim

CVSS3: 4.1
EPSS: Низкий
rocky логотип

RLSA-2025:17913

19 дней назад

Moderate: vim security update

EPSS: Низкий
rocky логотип

RLSA-2025:17715

25 дней назад

Moderate: vim security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-17913

24 дня назад

ELSA-2025-17913: vim security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-17742

25 дней назад

ELSA-2025-17742: vim security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-17715

29 дней назад

ELSA-2025-17715: vim security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03300-1

около 1 месяца назад

Security update for vim

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03299-1

около 1 месяца назад

Security update for vim

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2025-11731

Уязвимость текстового редактора vim, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю выполнить произвольные команды

CVSS3: 4.1
0%
Низкий
4 месяца назад
ubuntu логотип
CVE-2025-53906

Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim’s zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability.

CVSS3: 4.1
0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-53906

Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim’s zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability.

CVSS3: 4.1
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-53906

Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim’s zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability.

CVSS3: 4.1
0%
Низкий
4 месяца назад
msrc логотип
CVE-2025-53906

Vim has path traversal issue with zip.vim and special crafted zip archives

CVSS3: 4.1
0%
Низкий
3 месяца назад
debian логотип
CVE-2025-53906

Vim is an open source, command line text editor. Prior to version 9.1. ...

CVSS3: 4.1
0%
Низкий
4 месяца назад
redos логотип
ROS-20250807-06

Множественные уязвимости vim

CVSS3: 4.1
3 месяца назад
rocky логотип
RLSA-2025:17913

Moderate: vim security update

19 дней назад
rocky логотип
RLSA-2025:17715

Moderate: vim security update

25 дней назад
oracle-oval логотип
ELSA-2025-17913

ELSA-2025-17913: vim security update (MODERATE)

24 дня назад
oracle-oval логотип
ELSA-2025-17742

ELSA-2025-17742: vim security update (MODERATE)

25 дней назад
oracle-oval логотип
ELSA-2025-17715

ELSA-2025-17715: vim security update (MODERATE)

29 дней назад
suse-cvrf логотип
SUSE-SU-2025:03300-1

Security update for vim

около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03299-1

Security update for vim

около 1 месяца назад

Уязвимостей на страницу