Show filters
246 Total Results
Displaying 141-150 of 246
Sort by:
Attacker Value
Unknown

CVE-2022-1886

Disclosure Date: May 26, 2022 (last updated February 23, 2025)
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Attacker Value
Unknown

CVE-2022-1851

Disclosure Date: May 25, 2022 (last updated February 23, 2025)
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
Attacker Value
Unknown

CVE-2022-1796

Disclosure Date: May 19, 2022 (last updated February 23, 2025)
Use After Free in GitHub repository vim/vim prior to 8.2.4979.
Attacker Value
Unknown

CVE-2022-1785

Disclosure Date: May 19, 2022 (last updated February 23, 2025)
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.
Attacker Value
Unknown

CVE-2022-1771

Disclosure Date: May 18, 2022 (last updated February 23, 2025)
Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.
Attacker Value
Unknown

CVE-2022-1735

Disclosure Date: May 17, 2022 (last updated February 23, 2025)
Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.
Attacker Value
Unknown

CVE-2022-1769

Disclosure Date: May 17, 2022 (last updated February 23, 2025)
Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974.
Attacker Value
Unknown

CVE-2022-1733

Disclosure Date: May 17, 2022 (last updated February 23, 2025)
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.
Attacker Value
Unknown

CVE-2022-1674

Disclosure Date: May 12, 2022 (last updated February 23, 2025)
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input.
Attacker Value
Unknown

CVE-2022-1621

Disclosure Date: May 10, 2022 (last updated February 23, 2025)
Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution