Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
900 articles · 101759 vulns · 36/41 feeds (7d)
← Back to list
4.4
CVE-2026-28418PATCHED
vim · vim

Vim is an open source, command line text editor. Prior to version 9.2.0074, a heap-based buffer overflow out-of-bounds read exists in Vim's Emacs-style tags file parsing logic. When processing a malfo

Description

Vim is an open source, command line text editor. Prior to version 9.2.0074, a heap-based buffer overflow out-of-bounds read exists in Vim's Emacs-style tags file parsing logic. When processing a malformed tags file, Vim can be tricked into reading up to 7 bytes beyond the allocated memory boundary. Version 9.2.0074 fixes the issue.

Affected Products

VendorProductVersions
vimvim< 9.2.0074

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
canonicalubuntu linuxcert_advisory90%
fedorafedora linuxcert_advisory90%
open sourcevimcert_advisory90%
sususe linuxcert_advisory90%
sususe opensusecert_advisory90%

References

  • https://github.com/vim/vim/commit/f6a7f469a9c0d09e84cd6cb(Patch)
  • https://github.com/vim/vim/releases/tag/v9.2.0074(Release Notes)
  • https://github.com/vim/vim/security/advisories/GHSA-h4mf-vg97-hj8j(Patch, Vendor Advisory)
  • http://www.openwall.com/lists/oss-security/2026/02/27/7(Mailing List, Patch, Third Party Advisory)

Related News (1 articles)

Tier B
BSI Advisories2d ago
[UPDATE] [mittel] vim: Mehrere Schwachstellen
→ No new info (linked only)
CVSS 3.14.4 MEDIUM
VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
CISA KEV❌ No
Actively exploited❌ No
Patch available
9.2.0074
CWECWE-122, CWE-125
PublishedFeb 27, 2026
Last enriched7h ago
Trending Score15
Source articles1
Independent1
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-34714
Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configuration, because %{expr} injection occurs with tabpanel lacking P_MLE.
Trending: 44
MEDIUMCVE-2026-25749
Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vu
Trending: 22
MEDIUMCVE-2026-33412
Vim is an open source, command line text editor. Prior to version 9.2.0202, a command injection vulnerability exists in Vim's glob() function on Unix-like systems. By including a newline character (\n
Trending: 17
MEDIUMCVE-2026-28420
Vim is an open source, command line text editor. Prior to version 9.2.0076, a heap-based buffer overflow WRITE and an out-of-bounds READ exist in Vim's terminal emulator when processing maximum combin
Trending: 15
MEDIUMCVE-2026-28421
Vim is an open source, command line text editor. Versions prior to 9.2.0077 have a heap-buffer-overflow and a segmentation fault (SEGV) exist in Vim's swap file recovery logic. Both are caused by unva
Trending: 15

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Vulnerability Timeline

CVE Published
Feb 27, 2026
Patch Available
Mar 3, 2026
Discovered by ZDM
Apr 1, 2026