Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-1616

Опубликовано: 07 мая 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8
CVSS3: 7.8

Описание

Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution

РелизСтатусПримечание
bionic

released

2:8.0.1453-1ubuntu1.9
devel

not-affected

2:9.0.0242-1ubuntu1
esm-infra-legacy/trusty

not-affected

2:7.4.052-1ubuntu3.1+esm5
esm-infra/bionic

not-affected

2:8.0.1453-1ubuntu1.9
esm-infra/focal

not-affected

2:8.1.2269-1ubuntu5.8
esm-infra/xenial

released

2:7.4.1689-3ubuntu1.5+esm6
focal

released

2:8.1.2269-1ubuntu5.8
impish

ignored

end of life
jammy

released

2:8.2.3995-1ubuntu2.1
trusty/esm

released

2:7.4.052-1ubuntu3.1+esm5

Показывать по

EPSS

Процентиль: 36%
0.00146
Низкий

6.8 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
redhat
около 3 лет назад

Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution

CVSS3: 7.8
nvd
около 3 лет назад

Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution

CVSS3: 7.8
msrc
около 3 лет назад

Описание отсутствует

CVSS3: 7.8
debian
около 3 лет назад

Use after free in append_command in GitHub repository vim/vim prior to ...

CVSS3: 7.8
github
около 3 лет назад

Use after free in append_command in GitHub repository vim/vim prior to 8.2. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution

EPSS

Процентиль: 36%
0.00146
Низкий

6.8 Medium

CVSS2

7.8 High

CVSS3