Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
900 articles · 101759 vulns · 36/41 feeds (7d)
← Back to list
5.3
CVE-2026-28421PATCHED
vim · vim

Vim is an open source, command line text editor. Versions prior to 9.2.0077 have a heap-buffer-overflow and a segmentation fault (SEGV) exist in Vim's swap file recovery logic. Both are caused by unva

Description

Vim is an open source, command line text editor. Versions prior to 9.2.0077 have a heap-buffer-overflow and a segmentation fault (SEGV) exist in Vim's swap file recovery logic. Both are caused by unvalidated fields read from crafted pointer blocks within a swap file. Version 9.2.0077 fixes the issue.

Affected Products

VendorProductVersions
vimvim< 9.2.0077

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
canonicalubuntu linuxcert_advisory90%
fedorafedora linuxcert_advisory90%
open sourcevimcert_advisory90%
sususe linuxcert_advisory90%
sususe opensusecert_advisory90%

References

  • https://github.com/vim/vim/commit/65c1a143c331c886dc28(Patch)
  • https://github.com/vim/vim/releases/tag/v9.2.0077(Product)
  • https://github.com/vim/vim/security/advisories/GHSA-r2gw-2x48-jj5p(Patch, Vendor Advisory)
  • http://www.openwall.com/lists/oss-security/2026/02/27/10(Mailing List, Patch, Third Party Advisory)

Related News (1 articles)

Tier B
BSI Advisories2d ago
[UPDATE] [mittel] vim: Mehrere Schwachstellen
→ No new info (linked only)
CVSS 3.15.3 MEDIUM
VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CISA KEV❌ No
Actively exploited❌ No
Patch available
9.2.0077
CWECWE-20, CWE-122
PublishedFeb 27, 2026
Last enriched7h ago
Trending Score15
Source articles1
Independent1
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-34714
Vim before 9.2.0272 allows code execution that happens immediately upon opening a crafted file in the default configuration, because %{expr} injection occurs with tabpanel lacking P_MLE.
Trending: 44
MEDIUMCVE-2026-25749
Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vu
Trending: 22
MEDIUMCVE-2026-33412
Vim is an open source, command line text editor. Prior to version 9.2.0202, a command injection vulnerability exists in Vim's glob() function on Unix-like systems. By including a newline character (\n
Trending: 17
MEDIUMCVE-2026-28420
Vim is an open source, command line text editor. Prior to version 9.2.0076, a heap-based buffer overflow WRITE and an out-of-bounds READ exist in Vim's terminal emulator when processing maximum combin
Trending: 15
MEDIUMCVE-2026-28418
Vim is an open source, command line text editor. Prior to version 9.2.0074, a heap-based buffer overflow out-of-bounds read exists in Vim's Emacs-style tags file parsing logic. When processing a malfo
Trending: 15

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Vulnerability Timeline

CVE Published
Feb 27, 2026
Patch Available
Mar 4, 2026
Discovered by ZDM
Apr 1, 2026