{ "schema_version": "1.4.0", "id": "GHSA-ggw5-mghh-pg96", "modified": "2022-05-03T03:18:11Z", "published": "2022-05-03T03:18:11Z", "aliases": [ "CVE-2007-2953" ], "details": "Format string vulnerability in the helptags_one function in src/ex_cmds.c in Vim 6.4 and earlier, and 7.x up to 7.1, allows user-assisted remote attackers to execute arbitrary code via format string specifiers in a help-tags tag in a help file, related to the helptags command.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2953" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35655" }, { "type": "WEB", "url": "https://issues.rpath.com/browse/RPL-1595" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11549" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6463" }, { "type": "WEB", "url": "http://secunia.com/advisories/25941" }, { "type": "WEB", "url": "http://secunia.com/advisories/26285" }, { "type": "WEB", "url": "http://secunia.com/advisories/26522" }, { "type": "WEB", "url": "http://secunia.com/advisories/26594" }, { "type": "WEB", "url": "http://secunia.com/advisories/26653" }, { "type": "WEB", "url": "http://secunia.com/advisories/26674" }, { "type": "WEB", "url": "http://secunia.com/advisories/26822" }, { "type": "WEB", "url": "http://secunia.com/advisories/32858" }, { "type": "WEB", "url": "http://secunia.com/advisories/33410" }, { "type": "WEB", "url": "http://secunia.com/secunia_research/2007-66/advisory" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-001.htm" }, { "type": "WEB", "url": "http://www.attrition.org/pipermail/vim/2007-August/001770.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2007/dsa-1364" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:168" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:236" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2007_18_sr.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0580.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0617.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/475076/100/100/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/502322/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/25095" }, { "type": "WEB", "url": "http://www.trustix.org/errata/2007/0026" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-505-1" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0004.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/2687" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/0033" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/0904" } ], "database_specific": { "cwe_ids": [], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2007-07-31T10:17:00Z" } }