Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim before 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983), as demonstrated by an erroneous search path for plugin/bike.vim in bicyclerepair.
https://svn.pardus.org.tr/pardus/2008/applications/editors/vim/files/official/7.2.045
https://exchange.xforce.ibmcloud.com/vulnerabilities/48275
https://bugzilla.redhat.com/show_bug.cgi?id=481565
http://www.securityfocus.com/bid/33447
http://www.openwall.com/lists/oss-security/2009/01/26/2
http://www.mandriva.com/security/advisories?name=MDVSA-2009:047
http://support.apple.com/kb/HT4077
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html