Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution
[ { "source": "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c", "deprecated": false, "digest": { "line_hashes": [ "146200493773228420153804765641940418619", "295957853604481578401542256480342274950", "143087279238525360606364042469929212938", "32640677102677746719902546728464723531" ], "threshold": 0.9 }, "target": { "file": "src/version.c" }, "id": "CVE-2022-1616-19bed754", "signature_type": "Line", "signature_version": "v1" }, { "source": "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c", "deprecated": false, "digest": { "line_hashes": [ "198016461449000150231175552777544331240", "171590059231393512042216955171149850878", "316686136004962099024228210453394012582", "15210692249140618194474647794668422768", "147419277426255274610267039372053766845", "145063143628024854754152831816492852915", "69805306449089086225822973507550347559", "45219349205717403857699249625592224925" ], "threshold": 0.9 }, "target": { "file": "src/ex_docmd.c" }, "id": "CVE-2022-1616-7dc43a7a", "signature_type": "Line", "signature_version": "v1" }, { "source": "https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c", "deprecated": false, "digest": { "function_hash": "56774900917297562489151985595807997678", "length": 391.0 }, "target": { "file": "src/ex_docmd.c", "function": "append_command" }, "id": "CVE-2022-1616-dda937cb", "signature_type": "Function", "signature_version": "v1" } ]