vim-minimal vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the vim-minimal package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Stack-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Integer Overflow or Wraparound

*
  • L
Integer Overflow or Wraparound

*
  • L
Improper Handling of Exceptional Conditions

*
  • L
Integer Overflow or Wraparound

*
  • L
Use After Free

*
  • L
Integer Overflow or Wraparound

*
  • L
Integer Overflow or Wraparound

*
  • L
Integer Overflow or Wraparound

*
  • L
NULL Pointer Dereference

*
  • L
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Integer Overflow or Wraparound

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Incorrect Calculation of Buffer Size

*
  • L
Heap-based Buffer Overflow

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • L
Unchecked Return Value

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Write

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Stack-based Buffer Overflow

*
  • L
Out-of-bounds Write

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Out-of-bounds Read

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Undefined Behavior for Input to API

*
  • L
Out-of-bounds Read

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Integer Overflow or Wraparound

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Write

*
  • L
Use After Free

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Write

*
  • L
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • L
Heap-based Buffer Overflow

*
  • L
Buffer Over-read

*
  • L
Buffer Over-read

*
  • L
Buffer Over-read

*
  • L
Out-of-bounds Write

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • M
Out-of-bounds Write

*
  • M
Out-of-bounds Read

*
  • L
Out-of-Bounds

*
  • L
Use After Free

*
  • M
Out-of-bounds Write

*
  • L
Out-of-Bounds

*
  • M
Use After Free

*
  • M
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Use After Free

*
  • M
Heap-based Buffer Overflow

*
  • M
Out-of-Bounds

*
  • L
Use After Free

*
  • L
Out-of-Bounds

*
  • L
Out-of-bounds Read

*
  • M
Out-of-bounds Write

*
  • M
Use After Free

*
  • M
Out-of-Bounds

*
  • M
Improper Input Validation

<2:7.4.629-5.el6_8.1
  • M
OS Command Injection

*
  • H
Arbitrary Code Injection

<2:7.4.629-5.el6_10.2
  • L
Integer Overflow or Wraparound

*
  • L
Integer Overflow or Wraparound

*
  • L
Incorrect Privilege Assignment

*
  • L
Use After Free

*
  • L
Incorrect Privilege Assignment

*