Heap-Based Buffer Overflow in Vim Command Line Text Editor
CVE-2026-28418
4.4MEDIUM
What is CVE-2026-28418?
Vim, an open-source command line text editor, contains a heap-based buffer overflow vulnerability that occurs during the parsing of Emacs-style tags files. This flaw allows an attacker to craft a malformed tags file which can trick Vim into accessing memory beyond the allocated buffer, potentially leading to unintended memory disclosure or application instability. Users are advised to upgrade to version 9.2.0074 or later to mitigate this issue and ensure safe operation.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
vim < 9.2.0074
References
CVSS V3.1
Score:
4.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
