Product:

Vim

(Vim)
Repositories https://github.com/vim/vim
https://github.com/neovim/neovim
#Vulnerabilities 193
Date Id Summary Products Score Patch Annotated
2022-01-14 CVE-2022-0213 vim is vulnerable to Heap-based Buffer Overflow Debian_linux, Vim 6.6
2022-01-21 CVE-2022-0319 Out-of-bounds Read in vim/vim prior to 8.2. Macos, Debian_linux, Vim 5.5
2022-01-26 CVE-2022-0368 Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. Macos, Debian_linux, Vim 7.8
2022-01-06 CVE-2022-0128 vim is vulnerable to Out-of-bounds Read Mac_os_x, Macos, Vim 7.8
2020-05-28 CVE-2019-20807 In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua). Mac_os_x, Ubuntu_linux, Debian_linux, Leap, Command_center, San_\&_nas, Vim 5.3
2022-01-30 CVE-2022-0407 Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. Vim 7.8
2022-08-01 CVE-2022-2571 Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0101. Vim 7.8
2022-08-01 CVE-2022-2580 Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0102. Vim 7.8
2022-08-01 CVE-2022-2581 Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104. Vim 7.8
2017-12-01 CVE-2017-17087 fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp file to the editor's primary group (which may be different from the group ownership of the original file), which allows local users to obtain sensitive information by leveraging an applicable group membership, as demonstrated by /etc/shadow owned by root:shadow mode 0640, but /etc/.shadow.swp owned by root:users mode 0640, a different vulnerability than CVE-2017-1000382. Ubuntu_linux, Debian_linux, Vim 5.5