Логотип exploitDog
bind:"CVE-2025-55157"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-55157"

Количество 8

Количество 8

ubuntu логотип

CVE-2025-55157

4 месяца назад

Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim’s internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400.

CVSS3: 8.8
EPSS: Низкий
redhat логотип

CVE-2025-55157

4 месяца назад

Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim’s internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400.

CVSS3: 6.1
EPSS: Низкий
nvd логотип

CVE-2025-55157

4 месяца назад

Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim’s internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400.

CVSS3: 8.8
EPSS: Низкий
debian логотип

CVE-2025-55157

4 месяца назад

Vim is an open source, command line text editor. In versions from 9.1. ...

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2025-12929

4 месяца назад

Уязвимость функции tuple_unref() текстового редактора vim, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03300-1

3 месяца назад

Security update for vim

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03299-1

3 месяца назад

Security update for vim

EPSS: Низкий
redos логотип

ROS-20251007-05

2 месяца назад

Множественные уязвимости vim-X11

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-55157

Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim’s internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400.

CVSS3: 8.8
0%
Низкий
4 месяца назад
redhat логотип
CVE-2025-55157

Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim’s internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400.

CVSS3: 6.1
0%
Низкий
4 месяца назад
nvd логотип
CVE-2025-55157

Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim’s internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400.

CVSS3: 8.8
0%
Низкий
4 месяца назад
debian логотип
CVE-2025-55157

Vim is an open source, command line text editor. In versions from 9.1. ...

CVSS3: 8.8
0%
Низкий
4 месяца назад
fstec логотип
BDU:2025-12929

Уязвимость функции tuple_unref() текстового редактора vim, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
0%
Низкий
4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03300-1

Security update for vim

3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03299-1

Security update for vim

3 месяца назад
redos логотип
ROS-20251007-05

Множественные уязвимости vim-X11

CVSS3: 8.8
2 месяца назад

Уязвимостей на страницу