7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.7 High
AI Score
Confidence
Low
0.002 Low
EPSS
Percentile
55.7%
Vulnerability in vim text editor is related to memory usage after it is freed. Exploitation
exploitation of the vulnerability could allow an attacker to execute arbitrary code
Vim text editor trunc_string() vulnerability is related to buffer overflow. Exploitation
exploitation of this vulnerability could allow a remote attacker to cause a denial of service.
Vulnerability of the ins_compl_get_exp function of the vim text editor is related to memory usage after its
memory after it has been freed. Exploitation of the vulnerability could allow an attacker to execute arbitrary code
Vulnerability in vim exmode mode is related to NULL pointer dereferencing. Exploitation of the vulnerability could
allow an attacker to cause a denial of service
Vulnerability in buf_contents_changed() function in vim is related to memory usage after memory freeing.
Exploitation of the vulnerability may allow an attacker to cause a denial of service
A vulnerability in the vim_regsub_both() function of the Vim text editor is related to a buffer overflow in the
dynamic memory. Exploitation of the vulnerability could allow an attacker to impact the
confidentiality, integrity and availability of protected information
Vulnerability of the buflist_altfpos function of the vim text editor is related to memory usage after its
memory after it has been freed. Exploitation of the vulnerability could allow an attacker to execute arbitrary code
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.7 High
AI Score
Confidence
Low
0.002 Low
EPSS
Percentile
55.7%