7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
48.4%
Vim text editor vulnerability is related to a boundary error during file processing in the function
ex_finally() in ex_eval.c. Exploitation of the vulnerability could allow an attacker acting remotely,
create a special file, force the victim to open it, cause memory corruption, and execute
arbitrary code on the target system
The Vim text editor vulnerability involves the use of a negative array index with a window of
of negative width in the win_redr_ruler function at drawscreen.c. Exploitation of the vulnerability could allow
an attacker acting remotely to create a special file, force the victim to open it, and execute
arbitrary code on the target system
Vim text editor vulnerability is related to a post-release memory usage error in the function
process_next_cpt_value() in insexpand.c when processing files. Exploitation of the vulnerability could allow
an attacker acting remotely to trick a victim into opening a specially crafted file, trigger a
a usage error upon release and execute arbitrary code on the system
A vulnerability in the Vim text editor is related to a NULL pointer dereference error in eval.c.
Exploitation of the vulnerability could allow an attacker acting remotely to execute a denial-of-service (DoS) attack.
denial of service (DoS) attack