Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configuration, because %{expr} injection occurs with tabpanel lacking P_MLE.
| Vendor | Product | Versions |
|---|---|---|
| Vim | Vim | 9.2.0272 |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| fedora | fedora linux | cert_advisory | 90% |
| open source | vim | cert_advisory | 90% |
Added vendor and product information, updated affected versions to 9.2.0272, and marked the exploit as actively exploited.
Initial creation