vim-minimal vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the vim-minimal package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
Stack-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Integer Overflow or Wraparound

*
  • L
Integer Overflow or Wraparound

*
  • L
Improper Handling of Exceptional Conditions

*
  • L
Integer Overflow or Wraparound

*
  • L
Integer Overflow or Wraparound

*
  • L
Integer Overflow or Wraparound

*
  • L
Integer Overflow or Wraparound

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Write

*
  • L
Integer Overflow or Wraparound

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Integer Overflow or Wraparound

*
  • L
NULL Pointer Dereference

*
  • L
Incorrect Calculation of Buffer Size

*
  • L
Heap-based Buffer Overflow

*
  • L
Divide By Zero

*
  • L
Divide By Zero

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Unchecked Return Value

*
  • L
Out-of-bounds Read

*
  • L
Insufficient Comparison

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Stack-based Buffer Overflow

*
  • L
Out-of-bounds Write

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Buffer Under-read

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Integer Overflow or Wraparound

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Write

*
  • L
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Read

*
  • L
Heap-based Buffer Overflow

*
  • L
Buffer Over-read

*
  • L
Buffer Over-read

*
  • L
Buffer Over-read

*
  • L
Out-of-bounds Write

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • M
Out-of-bounds Read

<2:8.0.1763-19.el8_6.4
  • M
Out-of-bounds Write

<2:8.0.1763-19.el8_6.4
  • M
Out-of-bounds Write

<2:8.0.1763-19.el8_6.4
  • M
Out-of-bounds Write

<2:8.0.1763-19.el8_6.2
  • M
Out-of-bounds Read

<2:8.0.1763-19.el8_6.2
  • L
Out-of-Bounds

*
  • M
Use After Free

<2:8.0.1763-16.el8_5.13
  • M
Out-of-bounds Write

<2:8.0.1763-16.el8_5.12
  • M
Out-of-bounds Write

<2:8.0.1763-16.el8_5.12
  • M
Use After Free

<2:8.0.1763-16.el8_5.12
  • M
Out-of-bounds Write

<2:8.0.1763-16.el8_5.12
  • L
Out-of-Bounds

*
  • M
Out-of-Bounds

<2:8.0.1763-16.el8_5.12
  • M
Out-of-bounds Write

<2:8.0.1763-16.el8_5.12
  • M
Use After Free

<2:8.0.1763-16.el8_5.4
  • M
Out-of-bounds Read

<2:8.0.1763-16.el8_5.4
  • L
Out-of-bounds Read

*
  • M
Heap-based Buffer Overflow

<2:8.0.1763-16.el8_5.4
  • M
Out-of-Bounds

<2:8.0.1763-16.el8_5.4
  • L
Use After Free

*
  • L
Out-of-Bounds

*
  • M
Out-of-bounds Write

<2:8.0.1763-16.el8_5.4
  • M
Use After Free

<2:8.0.1763-16.el8
  • M
Out-of-Bounds

<2:8.0.1763-16.el8
  • M
OS Command Injection

<2:8.0.1763-15.el8
  • H
Arbitrary Code Injection

<2:8.0.1763-11.el8_0
  • L
NULL Pointer Dereference

*