Metrics
Affected Vendors & Products
Thu, 14 Aug 2025 06:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Tue, 12 Aug 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:* | |
Metrics |
cvssV3_1
|
Tue, 12 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 12 Aug 2025 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Vim
Vim vim |
|
Vendors & Products |
Vim
Vim vim |
Mon, 11 Aug 2025 23:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim’s internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400. | |
Title | Vim heap use-after-free vulnerability when processing recursive tuple data types | |
Weaknesses | CWE-416 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-08-12T15:52:20.470Z
Reserved: 2025-08-07T18:27:23.306Z
Link: CVE-2025-55157

Updated: 2025-08-12T15:52:16.507Z

Status : Analyzed
Published: 2025-08-11T23:15:27.870
Modified: 2025-08-12T18:50:20.100
Link: CVE-2025-55157
