Логотип exploitDog
bind: "CVE-2026-25749"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2026-25749"

Количество 8

Количество 8

ubuntu логотип

CVE-2026-25749

около 2 месяцев назад

Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.

CVSS3: 6.6
EPSS: Низкий
redhat логотип

CVE-2026-25749

около 2 месяцев назад

Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.

CVSS3: 7.3
EPSS: Низкий
nvd логотип

CVE-2026-25749

около 2 месяцев назад

Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.

CVSS3: 6.6
EPSS: Низкий
debian логотип

CVE-2026-25749

около 2 месяцев назад

Vim is an open source, command line text editor. Prior to version 9.1. ...

CVSS3: 6.6
EPSS: Низкий
redos логотип

ROS-20260319-73-0035

8 дней назад

Уязвимость vim

CVSS3: 6.6
EPSS: Низкий
rocky логотип

RLSA-2026:4442

13 дней назад

Moderate: vim security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-4715

10 дней назад

ELSA-2026-4715: vim security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-4442

15 дней назад

ELSA-2026-4442: vim security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2026-25749

Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.

CVSS3: 6.6
0%
Низкий
около 2 месяцев назад
redhat логотип
CVE-2026-25749

Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.

CVSS3: 7.3
0%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2026-25749

Vim is an open source, command line text editor. Prior to version 9.1.2132, a heap buffer overflow vulnerability exists in Vim's tag file resolution logic when processing the 'helpfile' option. The vulnerability is located in the get_tagfname() function in src/tag.c. When processing help file tags, Vim copies the user-controlled 'helpfile' option value into a fixed-size heap buffer of MAXPATHL + 1 bytes (typically 4097 bytes) using an unsafe STRCPY() operation without any bounds checking. This issue has been patched in version 9.1.2132.

CVSS3: 6.6
0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2026-25749

Vim is an open source, command line text editor. Prior to version 9.1. ...

CVSS3: 6.6
0%
Низкий
около 2 месяцев назад
redos логотип
ROS-20260319-73-0035

Уязвимость vim

CVSS3: 6.6
0%
Низкий
8 дней назад
rocky логотип
RLSA-2026:4442

Moderate: vim security update

0%
Низкий
13 дней назад
oracle-oval логотип
ELSA-2026-4715

ELSA-2026-4715: vim security update (MODERATE)

10 дней назад
oracle-oval логотип
ELSA-2026-4442

ELSA-2026-4442: vim security update (MODERATE)

15 дней назад

Уязвимостей на страницу