7.8
CVSSv3

CVE-2022-2183

Published: 23/06/2022 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Out-of-bounds Read in GitHub repository vim/vim before 8.2.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vim vim

fedoraproject fedora 35

fedoraproject fedora 36

Vendor Advisories

Several security issues were fixed in Vim ...
Use after free in append_command in GitHub repository vim/vim prior to 824895 This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution (CVE-2022-1616) Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 824899 This vulnerabilities ...
Use after free in append_command in GitHub repository vim/vim prior to 824895 This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution (CVE-2022-1616) Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 824899 This vulnerabilities ...
Out-of-bounds Read in GitHub repository vim/vim prior to 82 ...
A heap buffer over-read vulnerability was found in Vim's grab_file_name() function of the src/findfilec file This flaw occurs because the function reads after the NULL terminates the line with "gf" in Visual block mode This flaw allows an attacker to trick a user into opening a specially crafted file, triggering a heap buffer over-read vulnerabi ...