CVE-2026-28421: Vim vulnerability analysis and mitigation
Vim is an open source, command line text editor. Versions prior to 9.2.0077 have a heap-buffer-overflow and a segmentation fault (SEGV) exist in Vim's swap file recovery logic. Both are caused by unvalidated fields read from crafted pointer blocks within a swap file. Version 9.2.0077 fixes the issue.
Source: NVD
Related Vim vulnerabilities:
CVE ID
Severity
Score
Technologies
Component name
CISA KEV exploit
Has fix
Published date
CVE-2026-34714
HIGH
8.6
Vim
vim-enhanced-debuginfo
No
Yes
Mar 30, 2026
CVE-2026-34982
HIGH
8.2
Vim
vim-debugsource
No
Yes
Apr 06, 2026
CVE-2026-33412
HIGH
7.3
Vim
vim-data-common
No
Yes
Mar 24, 2026
CVE-2026-39881
MEDIUM
5
Vim
vim-minimal
No
Yes
Apr 08, 2026
CVE-2026-35177
MEDIUM
4.1
Vim
vim-debuginfo
No
Yes
Apr 06, 2026
Free Vulnerability Assessment
Benchmark your Cloud Security Posture
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.