Escape insert mode with ctrl character and execute malicious payload.
Go to file
six 590cadec41 Calling this exploit back from the past. 2021-10-19 14:59:04 +02:00
README.md Calling this exploit back from the past. 2021-10-19 14:59:04 +02:00
vim_pj.html Calling this exploit back from the past. 2021-10-19 14:59:04 +02:00

README.md

vim_pj

This repository is for an exploit I have found against vim users.

PoC sha512 - 760de8af0bd026b3d85d53e1ce062d300accba454f1bf2e4cd5e22ee707bb74add6b1fc575bb38ea1587db4c306cda20a3e608e55b1dec5eaa98bc4a9ef29dc7

2017.01.18. - PoC created on linux version of Vim. Developer team has been contacted about the exploit through their mailing list "vim-dev@vim.org". 2017.01.20. - PoC received and checked by Bram Moolenaar. 2017.01.21. - Left the story behind to vim devs.