<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en" xmlns="http://www.w3.org/2005/Atom"><title>Recent changes to bugs</title><link href="https://sourceforge.net/p/vimonline/bugs/" rel="alternate"/><link href="https://sourceforge.net/p/vimonline/bugs/feed.atom" rel="self"/><id>https://sourceforge.net/p/vimonline/bugs/</id><updated>2025-12-26T13:36:24.019000Z</updated><subtitle>Recent changes to bugs</subtitle><entry><title>The ukraine image on the homepage direct to a "Page not found".</title><link href="https://sourceforge.net/p/vimonline/bugs/115/" rel="alternate"/><published>2025-12-26T13:36:24.019000Z</published><updated>2025-12-26T13:36:24.019000Z</updated><author><name>Mao Yining</name><uri>https://sourceforge.net/u/mao-yining/</uri></author><id>https://sourceforge.neta59e311ebe98df71f7e192290b6f05feedf7a43f</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;The &lt;a href="https://eu-solidarity-ukraine.ec.europa.eu/eu-stands-ukraine_en" rel="nofollow"&gt;https://eu-solidarity-ukraine.ec.europa.eu/eu-stands-ukraine_en&lt;/a&gt; on the homepage direct to a "Page not found".&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>news.gmane.org is dead, list archive links are broken</title><link href="https://sourceforge.net/p/vimonline/bugs/114/" rel="alternate"/><published>2023-11-30T17:49:00.674000Z</published><updated>2023-11-30T17:49:00.674000Z</updated><author><name>Tim Siegel</name><uri>https://sourceforge.net/u/thimsmith/</uri></author><id>https://sourceforge.netbbcfa351cea575a712c7ad589cdb868f6e3b79e6</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Links to mailing list archives at news.gmane.org are broken, because that site is gone for good:&lt;/p&gt;
&lt;p&gt;&lt;a href="https://lars.ingebrigtsen.no/2020/01/06/whatever-happened-to-news-gmane-org/#comment-6637" rel="nofollow"&gt;https://lars.ingebrigtsen.no/2020/01/06/whatever-happened-to-news-gmane-org/#comment-6637&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Such links are present on this page, but probably elsewhere also:&lt;br/&gt;
&lt;a href="https://www.vim.org/maillist.php#vim-dev" rel="nofollow"&gt;https://www.vim.org/maillist.php#vim-dev&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;There is still nntp://news.gmane.io/, but no web interface. See the above blog post for details.&lt;/p&gt;
&lt;p&gt;I don't know if there is another list archive available, perhaps &lt;a href="https://marc.info/?l=vim-dev" rel="nofollow"&gt;https://marc.info/?l=vim-dev&lt;/a&gt; would suffice.&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Uploading new version fails with file is empty error</title><link href="https://sourceforge.net/p/vimonline/bugs/113/" rel="alternate"/><published>2022-07-26T12:06:12.566000Z</published><updated>2022-07-26T12:06:12.566000Z</updated><author><name>Alex Efros</name><uri>https://sourceforge.net/u/powerman76/</uri></author><id>https://sourceforge.netb512ba6a68bbd1e53bf56575f51f86a56836ba33</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;I've just tried to upload new version of &lt;a href="https://www.vim.org/scripts/script.php?script_id=3893" rel="nofollow"&gt;https://www.vim.org/scripts/script.php?script_id=3893&lt;/a&gt; but got "viewdoc.zip is empty, are you sure you specified the correct path?" error. I'm 100% sure the file is not empty and it was correctly sent (I've checked content of browser's POST request).&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Dark themed browser issues</title><link href="https://sourceforge.net/p/vimonline/bugs/112/" rel="alternate"/><published>2019-10-14T17:30:37.781000Z</published><updated>2019-10-14T17:30:37.781000Z</updated><author><name>sergio</name><uri>https://sourceforge.net/u/cepxuo/</uri></author><id>https://sourceforge.net880e5b799f1c57975390997593535db6621b6c42</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Both fg and bg colors should be defined together.&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Downloads site gives misleading information about Windows downloads</title><link href="https://sourceforge.net/p/vimonline/bugs/111/" rel="alternate"/><published>2019-06-13T15:54:56.263000Z</published><updated>2019-06-13T15:54:56.263000Z</updated><author><name>Randall Wald</name><uri>https://sourceforge.net/u/trimeta/</uri></author><id>https://sourceforge.net9252d6b102e131ac08c3606d2577c61e78604b64</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;In light of the recent modeline security issue (CVE-2019-12735), many users are going to want to update their version of Vim to the latest secure version. However, the portion of the Downloading Vim site (https://www.vim.org/download.php) discussing Windows downloads is misleading and out of date. The 8.1 builds were uploaded on 2018-05-18, and the Cream builds (which are described as being "the latest version with all patches included") are from 2011-01-24 and 2018-03-19, depending on whether you get the version with or without the Cream patches. The only updated versions are the nightlies available through the vim-win32-installer GitHub (https://github.com/vim/vim-win32-installer/releases) and Yongwei's build (http://wyw.dcweb.cn/index.htm#download).&lt;/p&gt;
&lt;p&gt;The portion of the page discussing Windows installation options should be rewritten to clarify that the nightlies are the only way to get recent, updated versions of Vim for Windows. The other options included in the archives (https://ftp.nluug.nl/pub/vim/pc/ and ftp://ftp.vim.org/pub/vim/pc/) may be discussed in terms of downloading old versions or unusual installation use cases, but it should be made clear that GitHub is the preferred location to download from.&lt;/p&gt;
&lt;p&gt;Normally I would call this sort of gripe a feature request, not a bug, but due to the security implications of recommending outdated, insecure versions, I feel it rises to the level of bug.&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>#109 Stored Cross-site Scripting (XSS) vulnerability in Vim Online</title><link href="https://sourceforge.net/p/vimonline/bugs/109/?limit=25#dc95" rel="alternate"/><published>2019-04-21T20:16:47.130000Z</published><updated>2019-04-21T20:16:47.130000Z</updated><author><name>Binit Ghimire</name><uri>https://sourceforge.net/u/binitgames/</uri></author><id>https://sourceforge.netc67223098c8278c5a50928434c0e6c8e1a33d8de</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;I hope you would close this ticket. I didn't mark the payloads as code in the visual editor in SourceForge, due to which they got executed. I have created a new ticket with the issue mentioned in a proper way.&lt;/p&gt;
&lt;p&gt;Thanks,&lt;br/&gt;
Binit Ghimire&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Stored Cross-site Scripting (XSS) vulnerability in Vim Online</title><link href="https://sourceforge.net/p/vimonline/bugs/110/" rel="alternate"/><published>2019-04-21T20:13:41.008000Z</published><updated>2019-04-21T20:13:41.008000Z</updated><author><name>Binit Ghimire</name><uri>https://sourceforge.net/u/binitgames/</uri></author><id>https://sourceforge.net956141cb804d1efb96fca72f9e9d5d96751648e6</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Hello sir/madam!&lt;/p&gt;
&lt;p&gt;I am Binit Ghimire. I was able to discover a &lt;strong&gt;Stored Cross-site Scripting (XSS) vulnerability&lt;/strong&gt; in the official Vim website (https://www.vim.org/).&lt;/p&gt;
&lt;p&gt;You can reproduce the vulnerability by following these steps:&lt;br/&gt;
1. Visit &lt;a href="https://www.vim.org/" rel="nofollow"&gt;https://www.vim.org/&lt;/a&gt;, click on "My Account" in the sidebar and then click on "Sign up now." or directly visit this page: &lt;a href="https://www.vim.org/account/register.php" rel="nofollow"&gt;https://www.vim.org/account/register.php&lt;/a&gt;&lt;br/&gt;
2. You will see an account creation form. Fill the "user name", "password" and "confirm password" fields as you want and write "I am human" in the last field. For the other three fields, enter the following XSS payloads:&lt;/p&gt;
&lt;div class="codehilite"&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;first name: "&amp;gt;&amp;lt;svg onload=alert(document.domain)&amp;gt;
last name: "&amp;gt;&amp;lt;svg onload=alert(document.domain)&amp;gt;
email: "&amp;gt;&amp;lt;svg/onload=alert(document.domain)&amp;gt;"@x.y
&lt;/pre&gt;&lt;/div&gt;


&lt;ol&gt;
&lt;li&gt;Now, press enter or click on the "create" button.&lt;/li&gt;
&lt;li&gt;When your account is created, you will be automatically logged in to your account and sent to this webpage: &lt;a href="https://www.vim.org/account/index.php." rel="nofollow"&gt;https://www.vim.org/account/index.php.&lt;/a&gt; If you haven't logged in to your account, visit &lt;a href="https://www.vim.org/account/login.php" rel="nofollow"&gt;https://www.vim.org/account/login.php&lt;/a&gt; to use your username and password for logging in.&lt;/li&gt;
&lt;li&gt;When you have logged in to your account, visit &lt;a href="https://www.vim.org/account/index.php" rel="nofollow"&gt;https://www.vim.org/account/index.php&lt;/a&gt; and click on "edit account info" or visit: &lt;a href="https://www.vim.org/account/edit_account.php" rel="nofollow"&gt;https://www.vim.org/account/edit_account.php&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;When you reach the "Edit Account" page, your XSS payloads will be executed. This means the "first name", "last name" and "email" fields are vulnerable to Stored Cross-site Scripting which is a persistent vulnerability stored permanently in the database.&lt;/p&gt;
&lt;p&gt;This Stored Cross-site Scripting vulnerability can be fixed by sanitizing or escaping the user's input in the input field. &lt;/p&gt;
&lt;p&gt;Here, the XSS payloads don't get executed when the first name and last name are displayed in the website, which means they are properly sanitized or escaped while displaying in the website. But, just doing so isn't enough to prevent from stored XSS as I was able to execute my payloads in the website. &lt;/p&gt;
&lt;p&gt;In the "&lt;strong&gt;Edit Account&lt;/strong&gt;" page, the contents of the "value" attribute of respective input elements for first name, last name and email also need to be sanitized or escaped properly. Doing so will help in resolving this vulnerability.&lt;/p&gt;
&lt;p&gt;I usually use &lt;strong&gt;htmlspecialchars()&lt;/strong&gt; and &lt;strong&gt;htmlentities()&lt;/strong&gt; PHP functions to prevent XSS in my websites.&lt;/p&gt;
&lt;p&gt;I hope this vulnerability would be resolved as soon as possible.&lt;/p&gt;
&lt;p&gt;You can contact me at my email: &lt;strong&gt;thebinitghimire@gmail.com&lt;/strong&gt; or my Twitter handle: &lt;strong&gt;@WHOISbinit&lt;/strong&gt; for any queries regarding this issue.&lt;/p&gt;
&lt;p&gt;Thanks,&lt;br/&gt;
Binit Ghimire&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Stored Cross-site Scripting (XSS) vulnerability in Vim Online</title><link href="https://sourceforge.net/p/vimonline/bugs/109/" rel="alternate"/><published>2019-04-21T20:05:54.638000Z</published><updated>2019-04-21T20:05:54.638000Z</updated><author><name>Binit Ghimire</name><uri>https://sourceforge.net/u/binitgames/</uri></author><id>https://sourceforge.net24e4b9e3d21789e61c1f00bccc0344f18a40f61b</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Hello sir/madam!&lt;/p&gt;
&lt;p&gt;I am Binit Ghimire. I was able to discover a Stored Cross-site Scripting (XSS) vulnerability in the official Vim website (https://www.vim.org/).&lt;/p&gt;
&lt;p&gt;You can reproduce the vulnerability by following these steps:&lt;br/&gt;
1. Visit &lt;a href="https://www.vim.org/" rel="nofollow"&gt;https://www.vim.org/&lt;/a&gt;, click on "My Account" in the sidebar and then click on "Sign up now." or directly visit this page: &lt;a href="https://www.vim.org/account/register.php" rel="nofollow"&gt;https://www.vim.org/account/register.php&lt;/a&gt;&lt;br/&gt;
2. You will see an account creation form. Fill the "user name", "password" and "confirm password" fields as you want and write "I am human" in the last field. For the other three fields, enter the following XSS payloads:&lt;br/&gt;
first name: "&amp;gt;&lt;svg&gt;&lt;/svg&gt;&lt;br/&gt;
last name: "&amp;gt;&lt;svg&gt;&lt;/svg&gt;&lt;br/&gt;
email: "&amp;gt;&lt;svg&gt;"@x.y&lt;/svg&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Now, press enter or click on the "create" button.&lt;/li&gt;
&lt;li&gt;When your account is created, you will be automatically logged in to your account and sent to this webpage: &lt;a href="https://www.vim.org/account/index.php." rel="nofollow"&gt;https://www.vim.org/account/index.php.&lt;/a&gt; If you haven't logged in to your account, visit &lt;a href="https://www.vim.org/account/login.php" rel="nofollow"&gt;https://www.vim.org/account/login.php&lt;/a&gt; to use your username and password for logging in.&lt;/li&gt;
&lt;li&gt;When you have logged in to your account, visit &lt;a href="https://www.vim.org/account/index.php" rel="nofollow"&gt;https://www.vim.org/account/index.php&lt;/a&gt; and click on "edit account info" or visit: &lt;a href="https://www.vim.org/account/edit_account.php" rel="nofollow"&gt;https://www.vim.org/account/edit_account.php&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;When you reach the "Edit Account" page, your XSS payloads will be executed. This means the "first name", "last name" and "email" fields are vulnerable to Stored Cross-site Scripting which is a persistent vulnerability stored permanently in the database.&lt;/p&gt;
&lt;p&gt;This Stored Cross-site Scripting vulnerability can be fixed by sanitizing or escaping the user's input in the input field. &lt;/p&gt;
&lt;p&gt;Here, the XSS payloads don't get executed when the first name and last name are displayed in the website, which means they are properly sanitized or escaped while displaying in the website. But, just doing so isn't enough to prevent from stored XSS as I was able to execute my payloads in the website. &lt;/p&gt;
&lt;p&gt;In the "Edit Account" page, the contents of the "value" attribute of respective input elements for first name, last name and email also need to be sanitized or escaped properly. Doing so will help in resolving this vulnerability.&lt;/p&gt;
&lt;p&gt;I usually use &lt;strong&gt;htmlspecialchars()&lt;/strong&gt; and &lt;strong&gt;htmlentities()&lt;/strong&gt; PHP functions to prevent XSS in my websites.&lt;/p&gt;
&lt;p&gt;I hope this vulnerability would be resolved as soon as possible.&lt;/p&gt;
&lt;p&gt;You can contact me at my email: &lt;strong&gt;thebinitghimire@gmail.com&lt;/strong&gt; or my Twitter handle: &lt;strong&gt;&lt;a class="" href="https://twitter.com/WHOISbinit" rel="nofollow"&gt;@WHOISbinit&lt;/a&gt;&lt;/strong&gt; for any queries regarding this issue.&lt;/p&gt;
&lt;p&gt;Thanks,&lt;br/&gt;
Binit Ghimire&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Vim scripts pages redirect to homepage</title><link href="https://sourceforge.net/p/vimonline/bugs/108/" rel="alternate"/><published>2018-06-12T21:31:31.518000Z</published><updated>2018-06-12T21:31:31.518000Z</updated><author><name>Rick</name><uri>https://sourceforge.net/u/wolph/</uri></author><id>https://sourceforge.net72f67238a2e0a2a598586a8552241bdda7a9d705</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;When I open an "old" link like this one: &lt;a href="http://vim.sourceforge.net/scripts/script.php?script_id=302"&gt;http://vim.sourceforge.net/scripts/script.php?script_id=302&lt;/a&gt;&lt;br/&gt;
It first (immediately) redirects me to: &lt;a href="https://vim.sourceforge.io/scripts/script.php?script_id=302" rel="nofollow"&gt;https://vim.sourceforge.io/scripts/script.php?script_id=302&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;And after that it follows with a rewrite to: &lt;a href="https://vim8.org/" rel="nofollow"&gt;https://vim8.org/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The worst thing is that it's done in such a way that it breaks the back button too so you can't go to the script page anymore...&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Spelling error "formery" on maillist.php</title><link href="https://sourceforge.net/p/vimonline/bugs/107/" rel="alternate"/><published>2018-03-27T05:07:22.460000Z</published><updated>2018-03-27T05:07:22.460000Z</updated><author><name>pell</name><uri>https://sourceforge.net/u/pellea72/</uri></author><id>https://sourceforge.netef1f8b63422e5a5f3248e318a9635b5969878f21</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;There's a spelling error on vim.org/maillist.php under the vim.org mailing lists section.&lt;/p&gt;
&lt;p&gt;"There formery was a vim-multibyte list" should be "There formerly was a vim-multibyte list".&lt;/p&gt;
&lt;p&gt;I've attached a diff file for the generated html page, but I'll post it here as well:&lt;/p&gt;
&lt;div class="codehilite"&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;453c453
&amp;lt; There formery was a vim-multibyte list, but now that UTF-8 is widespread
---
&amp;gt; There formerly was a vim-multibyte list, but now that UTF-8 is widespread
&lt;/pre&gt;&lt;/div&gt;

&lt;/div&gt;</summary></entry></feed>