vim vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the vim package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Use After Free

*
  • L
CVE-2024-43802

*
  • L
CVE-2024-43790

*
  • L
CVE-2024-43374

*
  • L
Double Free

*
  • L
Double Free

*
  • L
Out-of-bounds Write

*
  • L
Use After Free

*
  • L
Integer Overflow or Wraparound

*
  • L
Integer Overflow or Wraparound

*
  • L
Use After Free

*
  • L
Integer Overflow or Wraparound

*
  • L
Integer Overflow or Wraparound

*
  • L
Integer Overflow or Wraparound

*
  • L
Improper Handling of Exceptional Conditions

*
  • L
Integer Overflow or Wraparound

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Write

*
  • L
Integer Overflow or Wraparound

*
  • L
Out-of-bounds Write

*
  • L
NULL Pointer Dereference

<2:8.2.2367-1
  • L
Divide By Zero

*
  • C
Buffer Overflow

<2:8.1.2136-1
  • L
Integer Overflow or Wraparound

*
  • L
NULL Pointer Dereference

*
  • L
Use of Out-of-range Pointer Offset

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Incorrect Calculation of Buffer Size

*
  • L
Heap-based Buffer Overflow

*
  • L
Divide By Zero

*
  • L
NULL Pointer Dereference

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Read

*
  • L
Heap-based Buffer Overflow

*
  • L
Floating Point Comparison with Incorrect Operator

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-Bounds

*
  • L
Use After Free

*
  • L
Stack-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Stack-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Improper Validation of Specified Quantity in Input

*
  • L
Out-of-bounds Read

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Read

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Heap-based Buffer Overflow

*
  • L
Integer Overflow or Wraparound

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Write

*
  • L
NULL Pointer Dereference

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Buffer Over-read

*
  • L
Out-of-bounds Write

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Out-of-bounds Write

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Buffer Over-read

*
  • L
Use After Free

*
  • L
Out-of-bounds Write

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Write

*
  • L
Use After Free

*
  • L
Uncontrolled Recursion

*
  • L
Buffer Overflow

*
  • L
Buffer Over-read

*
  • L
Heap-based Buffer Overflow

*
  • L
Buffer Over-read

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Buffer Over-read

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Use of Out-of-range Pointer Offset

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Use of Out-of-range Pointer Offset

*
  • L
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Stack-based Buffer Overflow

*
  • L
Use of Out-of-range Pointer Offset

*
  • L
Out-of-bounds Write

*
  • L
Use of Out-of-range Pointer Offset

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • L
Out-of-Bounds

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Write

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Out-of-bounds Read

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Out-of-bounds Read

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • H
Out-of-bounds Write

<2:8.2.2434-3+deb11u1
  • H
Use After Free

<2:8.2.2434-3+deb11u1
  • H
Out-of-bounds Write

<2:8.2.2434-3+deb11u1
  • M
OS Command Injection

<2:8.1.2136-1
  • H
Use After Free

<2:8.1.2136-1
  • H
OS Command Injection

<2:8.1.0875-4
  • L
NULL Pointer Dereference

<2:8.1.0693-1
  • M
Information Exposure

<2:8.0.1401-1
  • L
Information Exposure

*
  • L
Use After Free

<2:8.0.0197-5
  • C
Integer Overflow or Wraparound

<2:8.0.0197-3
  • C
Integer Overflow or Wraparound

<2:8.0.0197-3
  • C
Integer Overflow or Wraparound

<2:8.0.0197-2
  • H
Improper Input Validation

<2:8.0.0095-1
  • L
OS Command Injection

<2:7.2.148-1
  • H
OS Command Injection

<2:7.2.010-1
  • H
OS Command Injection

<2:7.2.010-1
  • H
Arbitrary Code Injection

<2:7.2.010-1
  • L
CVE-2009-0316

<2:7.2.025-2
  • L
Credentials Management

*
  • L
Improper Input Validation

<2:7.2.010-1
  • L
Improper Input Validation

<1:7.1.314-3
  • L
CVE-2007-2953

<1:7.1-056+1
  • L
CVE-2007-2438

<1:7.1-022+1
  • M
OS Command Injection

<1:6.3-085+1
  • M
CVE-2005-0069

<1:6.3-058+1
  • H
CVE-2004-1138

<1:6.3-046+0sarge1
  • M
CVE-2002-1377

<6.1.263-1