7.8
CVSSv3

CVE-2022-0408

Published: 30/01/2022 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based Buffer Overflow in GitHub repository vim/vim before 8.2.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vim vim

fedoraproject fedora 34

fedoraproject fedora 35

debian debian linux 9.0

debian debian linux 10.0

Vendor Advisories

Several security issues were fixed in Vim ...
A flaw was found in vim The vulnerability occurs due to a crash when recording and using Select mode and leads to an out-of-bounds read This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution (CVE-2022-0393) A flaw was found in vim The vulnerability occurs due to stack corruption when looking for spe ...
A flaw was found in vim The vulnerability occurs due to a crash when recording and using Select mode and leads to an out-of-bounds read This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution (CVE-2022-0393) A flaw was found in vim The vulnerability occurs due to stack corruption when looking for spe ...
Stack-based Buffer Overflow in Conda vim prior to 82 ...
A flaw was found in vim The vulnerability occurs due to a crash when recording and using Select mode and leads to an out-of-bounds read This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution (CVE-2022-0393) A flaw was found in vim The vulnerability occurs due to stack corruption when looking for spe ...
A flaw was found in vim The vulnerability occurs due to a crash when recording and using Select mode and leads to an out-of-bounds read This flaw allows an attacker to input a specially crafted file, leading to a crash or code execution (CVE-2022-0393) A flaw was found in vim The vulnerability occurs due to stack corruption when looking for spe ...