CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
AI Score
Confidence
High
EPSS
Percentile
53.2%
A vulnerability in the vim text editor is related to improper handling of exceptional conditions.
Exploitation of the vulnerability could allow an attacker to cause a denial of service
The vim text editor vulnerability is related to an attempt by vim to access an already freed structure
window. Exploitation of the vulnerability could allow an attacker to impact confidentiality,
data integrity and availability
A vulnerability in the vim text editor function is related to the use of large values for the z command.
Exploitation of the vulnerability could allow an attacker to cause a denial of service
Vulnerability in vim text editor function is related to the use of z= command user can overflow the
counter with values greater than MAX_INT. Exploitation of the vulnerability could allow an attacker to cause a
denial of service
A vulnerability in the vim text editor function is related to the use of a negative line number.
Exploitation of the vulnerability could allow an attacker to cause a denial of service
A vulnerability in the vim text editor feature is related to the use of very large values when shifting lines.
Exploitation of the vulnerability could allow an attacker to cause a denial of service
A vulnerability in the vim text editor is related to the use of values for the :s command larger than
fits into a long variable. Exploitation of the vulnerability could allow an attacker to cause a denial of service.
denial of service
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
AI Score
Confidence
High
EPSS
Percentile
53.2%