| Advisory
Products
MOOLE SCA
Continuous visibility into open-source risk
MOOLE Container Security
End-to-end container defense across the SDLC
MOOLE SAST
Static application security testing for source code
About Us
CVE-2022-2304
Vulnerability Database
CVE-2022-2304
Base Score
HIGH
7.8
CVE-2022-2304
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
Vector
LOCAL
Published By
security@huntr.dev
Published Date
Jul 05, 2022, 13:15
Weakness Type (CWE)
:
CWE-121
CVSS Metrics
CVSS v3.1
CVSS v3.0
CVSS v2
Base Score
7.8
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Severity
HIGH
Version
3.1
Attack Vector (AV)
LOCAL
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
UNCHANGED
Confidentiality (C)
HIGH
Integrity (I)
HIGH
Availability (A)
HIGH
References
https://github.com/vim/vim/commit/54e5fed6d27b747ff152cdb6edfb72ff60e70939
https://huntr.dev/bounties/eb7402f3-025a-402f-97a7-c38700d9548a
https://lists.debian.org/debian-lts-announce/2022/11/msg00009.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
https://security.gentoo.org/glsa/202208-32
https://security.gentoo.org/glsa/202305-16
https://lists.debian.org/debian-lts-announce/2025/03/msg00023.html
Base Score
HIGH
7.8
Weakness Type (CWE)
:
CWE-121
CVSS Metrics
CVSS v3.1
CVSS v3.0
CVSS v2
Base Score
7.8
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Severity
HIGH
Version
3.1
Attack Vector (AV)
LOCAL
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
UNCHANGED
Confidentiality (C)
HIGH
Integrity (I)
HIGH
Availability (A)
HIGH