vim vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the vim package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • L
CVE-2023-0512

*
  • L
NULL Pointer Dereference

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Read

*
  • L
Heap-based Buffer Overflow

*
  • L
Insufficient Comparison

*
  • L
Use After Free

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Write

*
  • L
Use After Free

*
  • L
Out-of-bounds Write

*
  • L
Out-of-Bounds

*
  • L
Use After Free

*
  • L
Stack-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Out-of-bounds Write

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Buffer Over-read

*
  • L
Out-of-bounds Read

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
CVE-2022-2598

*
  • L
Out-of-bounds Read

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Write

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Write

*
  • L
Use After Free

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Heap-based Buffer Overflow

*
  • L
Integer Overflow or Wraparound

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-bounds Write

*
  • L
NULL Pointer Dereference

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Heap-based Buffer Overflow

*
  • L
Buffer Over-read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Write

*
  • L
Use After Free

*
  • L
Out-of-bounds Write

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Buffer Over-read

*
  • L
Use After Free

*
  • L
Out-of-bounds Write

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Write

*
  • L
Use After Free

*
  • L
Uncontrolled Recursion

*
  • L
Buffer Overflow

*
  • L
Buffer Over-read

*
  • L
Out-of-bounds Write

*
  • L
Buffer Over-read

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Buffer Over-read

*
  • L
Out-of-bounds Write

*
  • L
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Use After Free

*
  • L
Use of Out-of-range Pointer Offset

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Use of Out-of-range Pointer Offset

*
  • L
Heap-based Buffer Overflow

*
  • L
NULL Pointer Dereference

*
  • L
Stack-based Buffer Overflow

*
  • L
Use of Out-of-range Pointer Offset

*
  • L
Out-of-bounds Write

*
  • L
Use of Out-of-range Pointer Offset

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Out-of-bounds Read

*
  • L
Out-of-Bounds

*
  • L
Out-of-bounds Write

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Write

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Out-of-bounds Read

*
  • L
Use After Free

*
  • L
Use After Free

*
  • L
Out-of-bounds Read

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Use After Free

*
  • L
Heap-based Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • L
Heap-based Buffer Overflow

*
  • H
Out-of-bounds Write

<2:8.2.2434-3+deb11u1
  • H
Use After Free

<2:8.2.2434-3+deb11u1
  • H
Out-of-bounds Write

<2:8.2.2434-3+deb11u1
  • M
OS Command Injection

<2:8.1.2136-1
  • H
Use After Free

<2:8.1.2136-1
  • H
OS Command Injection

<2:8.1.0875-4
  • L
NULL Pointer Dereference

<2:8.1.0693-1
  • M
Information Exposure

<2:8.0.1401-1
  • L
Information Exposure

*
  • L
Use After Free

<2:8.0.0197-5
  • C
Integer Overflow or Wraparound

<2:8.0.0197-3
  • C
Integer Overflow or Wraparound

<2:8.0.0197-3
  • C
Integer Overflow or Wraparound

<2:8.0.0197-2
  • H
Improper Input Validation

<2:8.0.0095-1
  • L
OS Command Injection

<2:7.2.148-1
  • H
OS Command Injection

<2:7.2.010-1
  • H
OS Command Injection

<2:7.2.010-1
  • H
Arbitrary Code Injection

<2:7.2.010-1
  • L
CVE-2009-0316

<2:7.2.025-2
  • L
Credentials Management

*
  • L
Improper Input Validation

<2:7.2.010-1
  • L
Improper Input Validation

<1:7.1.314-3
  • L
CVE-2007-2953

<1:7.1-056+1
  • L
CVE-2007-2438

<1:7.1-022+1
  • M
OS Command Injection

<1:6.3-085+1
  • M
CVE-2005-0069

<1:6.3-058+1
  • H
CVE-2004-1138

<1:6.3-046+0sarge1
  • M
CVE-2002-1377

<6.1.263-1