Vigil@nce - Vigil@nce - Vim: buffer overflow via parse_cmd_address(), analyzed on 17/06/2022
August 2022 by Vigil@nce
Vigil@nce - An attacker can trigger a buffer overflow of Vim, via parse_cmd_address(), in order to trigger a denial of service, and possibly to run code.
Plus d'information sur : https://vigilance.fr/vulnerability/Vim-buffer-overflow-via-parse-cmd-address-38615