CVE-2023-0049
CVSS V2 None
CVSS V3 None
Description
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.1143.
Overview
- CVE ID
- CVE-2023-0049
- Assigner
- security@huntr.dev
- Vulnerability Status
- Modified
- Published Version
- 2023-01-04T16:15:09
- Last Modified Date
- 2023-05-03T12:16:43
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:* | 1 | OR | 9.0.1143 |
References
Reference URL | Reference Tags |
---|---|
http://seclists.org/fulldisclosure/2023/Mar/17 | |
https://github.com/vim/vim/commit/7b17eb4b063a234376c1ec909ee293e42cff290c | Patch Third Party Advisory |
https://huntr.dev/bounties/5e6f325c-ba54-4bf0-b050-dca048fd3fd9 | Exploit Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3Y752EAVACVC5XY2TMGGOAIU25VQRPDW/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T33LLWHLH63XDCO5OME7NWN63RA4U5HF/ | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202305-16 | |
https://support.apple.com/kb/HT213670 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-0049 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0049 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-01-04 16:17:17 | Added to TrackCVE | |||
2023-01-04 16:17:18 | Weakness Enumeration | new | ||
2023-01-04 18:20:47 | 2023-01-04T17:42:28 | CVE Modified Date | updated | |
2023-01-04 18:20:47 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-01-04 18:20:49 | CVSS V3 information | new | ||
2023-01-08 05:20:56 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-08 05:20:59 | CVSS V3 information | new | ||
2023-01-10 20:25:54 | 2023-01-10T18:35:20 | CVE Modified Date | updated | |
2023-01-10 20:25:54 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-10 20:25:57 | CPE Information | updated | ||
2023-01-10 20:25:57 | CVSS V3 information | new | ||
2023-01-11 03:18:28 | 2023-01-11T03:15:10 | CVE Modified Date | updated | |
2023-01-11 03:18:29 | Analyzed | Modified | Vulnerability Status | updated |
2023-01-11 03:18:30 | References | updated | ||
2023-01-11 03:18:30 | CVSS V3 information | new | ||
2023-01-12 05:15:37 | 2023-01-12T03:15:08 | CVE Modified Date | updated | |
2023-01-12 05:15:37 | Modified | Undergoing Analysis | Vulnerability Status | updated |
2023-01-12 05:15:40 | References | updated | ||
2023-01-12 05:15:40 | CVSS V3 information | new | ||
2023-01-12 20:15:59 | 2023-01-12T19:36:23 | CVE Modified Date | updated | |
2023-01-12 20:15:59 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-12 20:15:59 | CVSS V3 information | new | ||
2023-03-28 02:15:31 | 2023-03-28T02:15:11 | CVE Modified Date | updated | |
2023-03-28 02:15:31 | Analyzed | Modified | Vulnerability Status | updated |
2023-03-28 02:15:32 | References | updated | ||
2023-03-28 02:15:32 | CVSS V3 information | new | ||
2023-03-28 06:16:17 | 2023-03-28T05:15:08 | CVE Modified Date | updated | |
2023-03-28 06:16:18 | References | updated | ||
2023-03-28 06:16:18 | CVSS V3 information | new | ||
2023-05-03 13:04:44 | 2023-05-03T12:16:43 | CVE Modified Date | updated | |
2023-05-03 13:04:57 | References | updated | ||
2023-05-03 13:04:57 | CVSS V3 information | new |