Search CVE reports
181 – 190 of 210 results
CVE-2021-3778
Medium priorityvim is vulnerable to Heap-based Buffer Overflow
1 affected package
vim
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
vim | — | Fixed | Fixed | Fixed | Fixed |
CVE-2021-3770
Medium priorityvim is vulnerable to Heap-based Buffer Overflow
1 affected package
vim
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
vim | — | Fixed | Fixed | Not affected | Not affected |
CVE-2019-20807
Low prioritySome fixes available 3 of 4
In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).
1 affected package
vim
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
vim | — | Not affected | Not affected | Fixed | Fixed |
CVE-2019-20079
Low prioritySome fixes available 2 of 3
The autocmd feature in window.c in Vim before 8.1.2136 accesses freed memory.
1 affected package
vim
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
vim | — | — | — | Fixed | Not affected |
CVE-2019-12735
Medium prioritygetchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.
2 affected packages
neovim, vim
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
neovim | — | Not affected | Not affected | Fixed | Not in release |
vim | — | Fixed | Fixed | Fixed | Fixed |
CVE-2018-20786
Low prioritySome fixes available 1 of 17
libvterm through 0+bzr726, as used in Vim and other products, mishandles certain out-of-memory conditions, leading to a denial of service (application crash), related to screen.c, state.c, and vterm.c.
2 affected packages
libvterm, vim
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libvterm | Vulnerable | Vulnerable | Vulnerable | Vulnerable | Not in release |
vim | Not affected | Not affected | Not affected | Fixed | Not affected |
CVE-2018-11319
Medium prioritySome fixes available 1 of 3
Syntastic (aka vim-syntastic) through 3.9.0 does not properly handle searches for configuration files (it searches the current directory up to potentially the root). This improper handling might be exploited for arbitrary code...
1 affected package
vim-syntastic
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
vim-syntastic | Not affected | Not affected | Not affected | Vulnerable | Fixed |
CVE-2017-17087
Low prioritySome fixes available 2 of 4
fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp file to the editor's primary group (which may be different from the group ownership of the original file), which allows local users to obtain sensitive...
1 affected package
vim
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
vim | — | Not affected | Not affected | Not affected | Fixed |
CVE-2017-1000382
Low priorityVIM version 8.0.1187 (and other versions most likely) ignores umask when creating a swap file ("[ORIGINAL_FILENAME].swp") resulting in files that may be world readable or otherwise accessible in ways not intended by the user...
1 affected package
vim
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
vim | — | — | — | Ignored | Ignored |
CVE-2017-11109
Low prioritySome fixes available 2 of 5
Vim 8.0 allows attackers to cause a denial of service (invalid free) or possibly have unspecified other impact via a crafted source (aka -S) file. NOTE: there might be a limited number of scenarios in which this has security relevance.
1 affected package
vim
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
vim | — | — | — | Not affected | Fixed |