vim (aka gvim) processes VIM control codes that are embedded in a file, which could allow attackers to execute arbitrary commands when another user opens a file containing malicious VIM control codes.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Vim | Vim_development_group | 5.7 (including) | 5.7 (including) |
| Red Hat Linux 5.2 | RedHat | * | |
| Red Hat Linux 6.2 | RedHat | * | |
| Red Hat Linux 7.0 | RedHat | * |