| Advisory
Products
MOOLE SCA
Continuous visibility into open-source risk
MOOLE Container Security
End-to-end container defense across the SDLC
MOOLE SAST
Static application security testing for source code
About Us
CVE-2022-1942
Vulnerability Database
CVE-2022-1942
Base Score
HIGH
7.8
CVE-2022-1942
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Vector
LOCAL
Published By
security@huntr.dev
Published Date
May 31, 2022, 14:15
Weakness Type (CWE)
:
CWE-122
CVSS Metrics
CVSS v3.1
CVSS v3.0
CVSS v2
Base Score
7.8
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Severity
HIGH
Version
3.1
Attack Vector (AV)
LOCAL
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
UNCHANGED
Confidentiality (C)
HIGH
Integrity (I)
HIGH
Availability (A)
HIGH
References
http://seclists.org/fulldisclosure/2022/Oct/28
http://seclists.org/fulldisclosure/2022/Oct/41
https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d
https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071
https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://support.apple.com/kb/HT213488
https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html
Base Score
HIGH
7.8
Weakness Type (CWE)
:
CWE-122
CVSS Metrics
CVSS v3.1
CVSS v3.0
CVSS v2
Base Score
7.8
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Severity
HIGH
Version
3.1
Attack Vector (AV)
LOCAL
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
UNCHANGED
Confidentiality (C)
HIGH
Integrity (I)
HIGH
Availability (A)
HIGH