-
Byte Open Security
(ByteOS Network)
Log In
Sign Up
CVE Vulnerability Details :
CVE-2022-0213
PUBLISHED
More Info
Official Page
Assigner
-
@huntrdev
Assigner Org ID
-
c09c270a-b464-47c1-9133-acb35b22c19a
View Known Exploited Vulnerability (KEV) details
Published At
-
14 Jan, 2022 | 00:00
Updated At
-
02 Aug, 2024 | 23:18
Rejected At
-
▼
CVE Numbering Authority (CNA)
Heap-based Buffer Overflow in vim/vim
vim is vulnerable to Heap-based Buffer Overflow
Affected Products
Vendor
Vim
vim
Product
vim/vim
Versions
Affected
From
unspecified
before
8.2
(custom)
Problem Types
Type
CWE ID
Description
CWE
CWE-122
CWE-122 Heap-based Buffer Overflow
Type:
CWE
CWE ID:
CWE-122
Description:
CWE-122 Heap-based Buffer Overflow
Metrics
Version
Base score
Base severity
Vector
3.0
6.8
MEDIUM
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
Version:
3.0
Base score:
6.8
Base severity:
MEDIUM
Vector:
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed
N/A
https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26
N/A
http://www.openwall.com/lists/oss-security/2022/01/15/1
mailing-list
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
mailing-list
https://security.gentoo.org/glsa/202208-32
vendor-advisory
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
mailing-list
Hyperlink:
https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed
Resource:
N/A
Hyperlink:
https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26
Resource:
N/A
Hyperlink:
http://www.openwall.com/lists/oss-security/2022/01/15/1
Resource:
mailing-list
Hyperlink:
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
Resource:
mailing-list
Hyperlink:
https://security.gentoo.org/glsa/202208-32
Resource:
vendor-advisory
Hyperlink:
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
Resource:
mailing-list
▼
Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
Version
Base score
Base severity
Vector
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed
x_transferred
https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26
x_transferred
http://www.openwall.com/lists/oss-security/2022/01/15/1
mailing-list
x_transferred
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
mailing-list
x_transferred
https://security.gentoo.org/glsa/202208-32
vendor-advisory
x_transferred
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
mailing-list
x_transferred
Hyperlink:
https://huntr.dev/bounties/f3afe1a5-e6f8-4579-b68a-6e5c7e39afed
Resource:
x_transferred
Hyperlink:
https://github.com/vim/vim/commit/de05bb25733c3319e18dca44e9b59c6ee389eb26
Resource:
x_transferred
Hyperlink:
http://www.openwall.com/lists/oss-security/2022/01/15/1
Resource:
mailing-list
x_transferred
Hyperlink:
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
Resource:
mailing-list
x_transferred
Hyperlink:
https://security.gentoo.org/glsa/202208-32
Resource:
vendor-advisory
x_transferred
Hyperlink:
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
Resource:
mailing-list
x_transferred
Details not found