| Advisory
Products
MOOLE SCA
Continuous visibility into open-source risk
MOOLE Container Security
End-to-end container defense across the SDLC
MOOLE SAST
Static application security testing for source code
About Us
CVE-2021-3928
Vulnerability Database
CVE-2021-3928
Base Score
HIGH
7.8
CVE-2021-3928
vim is vulnerable to Use of Uninitialized Variable
Vector
LOCAL
Published By
security@huntr.dev
Published Date
Nov 05, 2021, 15:15
Weakness Type (CWE)
:
CWE-457
CVSS Metrics
CVSS v3.1
CVSS v3.0
CVSS v2
Base Score
7.8
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Severity
HIGH
Version
3.1
Attack Vector (AV)
LOCAL
Attack Complexity (AC)
LOW
Privileges Required (PR)
LOW
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality (C)
HIGH
Integrity (I)
HIGH
Availability (A)
HIGH
References
http://www.openwall.com/lists/oss-security/2022/01/15/1
https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732
https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd
https://lists.debian.org/debian-lts-announce/2022/03/msg00018.html
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BCQWPEY2AEYBELCMJYHYWYCD3PZVD2H7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FNXY7T5OORA7UJIMGSJBGHFMU6UZWS6P/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PGW56Z6IN4UVM3E5RXXF4G7LGGTRBI5C/
https://security.gentoo.org/glsa/202208-32
Base Score
HIGH
7.8
Weakness Type (CWE)
:
CWE-457
CVSS Metrics
CVSS v3.1
CVSS v3.0
CVSS v2
Base Score
7.8
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Severity
HIGH
Version
3.1
Attack Vector (AV)
LOCAL
Attack Complexity (AC)
LOW
Privileges Required (PR)
LOW
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality (C)
HIGH
Integrity (I)
HIGH
Availability (A)
HIGH