Metrics
Affected Vendors & Products
Tue, 26 Aug 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Mon, 25 Aug 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 25 Aug 2025 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Vim
Vim vim |
|
Vendors & Products |
Vim
Vim vim |
Sun, 24 Aug 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A security flaw has been discovered in vim up to 9.1.1615. Affected by this vulnerability is the function main of the file src/xxd/xxd.c of the component xxd. The manipulation results in buffer overflow. The attack requires a local approach. The exploit has been released to the public and may be exploited. Upgrading to version 9.1.1616 addresses this issue. The patch is identified as eeef7c77436a78cd27047b0f5fa6925d56de3cb0. It is recommended to upgrade the affected component. | |
Title | vim xxd xxd.c main buffer overflow | |
Weaknesses | CWE-119 CWE-120 |
|
References |
|
|
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-08-25T18:30:05.930Z
Reserved: 2025-08-23T15:29:35.733Z
Link: CVE-2025-9390

Updated: 2025-08-25T18:29:41.551Z

Status : Awaiting Analysis
Published: 2025-08-24T14:15:32.413
Modified: 2025-08-25T20:24:45.327
Link: CVE-2025-9390


Updated: 2025-08-25T09:11:21Z