{"api_version":"1","generated_at":"2026-04-22T21:37:46+00:00","cve":"CVE-2023-48231","urls":{"html":"https://cve.report/CVE-2023-48231","api":"https://cve.report/api/cve/CVE-2023-48231.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-48231","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-48231"},"summary":{"title":"CVE-2023-48231","description":"Description unavailable.","state":"PUBLISHED","assigner":"","published_at":"2023-11-16 23:15:00","updated_at":"2023-11-17 01:15:00"},"problem_types":[],"metrics":[],"references":[{"url":"https://github.com/vim/vim/security/advisories/GHSA-8g46-v9ff-c765","name":"https://github.com/vim/vim/security/advisories/GHSA-8g46-v9ff-c765","refsource":"","tags":[],"title":"Use-After-Free in win_close()  · Advisory · vim/vim · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2023/11/16/1","name":"http://www.openwall.com/lists/oss-security/2023/11/16/1","refsource":"","tags":[],"title":"oss-security - [vim-security] several minor security issues in Vim\n v9.0.2106-v9.0.2112","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/vim/vim/commit/25aabc2b8ee1e19ced6f4da9d866cf9378fc4c5a","name":"https://github.com/vim/vim/commit/25aabc2b8ee1e19ced6f4da9d866cf9378fc4c5a","refsource":"","tags":[],"title":"patch 9.0.2106: [security]: Use-after-free in win_close() · vim/vim@25aabc2 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-48231","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-48231","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-48231","qid":"200016","title":"Ubuntu Security Notification for Vim Vulnerabilities (USN-6557-1)"},{"cve":"CVE-2023-48231","qid":"284764","title":"Fedora Security Update for vim (FEDORA-2023-ce3f7d4818)"},{"cve":"CVE-2023-48231","qid":"284765","title":"Fedora Security Update for vim (FEDORA-2023-eec2cdb7ed)"},{"cve":"CVE-2023-48231","qid":"285130","title":"Fedora Security Update for vim (FEDORA-2023-45cf2b4014)"},{"cve":"CVE-2023-48231","qid":"296107","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 65.157.1 Missing (CPUJAN2024)"},{"cve":"CVE-2023-48231","qid":"356776","title":"Amazon Linux Security Advisory for vim : ALAS2-2023-2353"},{"cve":"CVE-2023-48231","qid":"356909","title":"Amazon Linux Security Advisory for vim : ALAS2023-2023-447"},{"cve":"CVE-2023-48231","qid":"357186","title":"Amazon Linux Security Advisory for vim : AL2012-2024-485"},{"cve":"CVE-2023-48231","qid":"505961","title":"Alpine Linux Security Update for vim"},{"cve":"CVE-2023-48231","qid":"673345","title":"EulerOS Security Update for vim (EulerOS-SA-2024-1130)"},{"cve":"CVE-2023-48231","qid":"673552","title":"EulerOS Security Update for vim (EulerOS-SA-2024-1099)"},{"cve":"CVE-2023-48231","qid":"673740","title":"EulerOS Security Update for vim (EulerOS-SA-2024-1075)"},{"cve":"CVE-2023-48231","qid":"673930","title":"EulerOS Security Update for vim (EulerOS-SA-2024-1189)"},{"cve":"CVE-2023-48231","qid":"673976","title":"EulerOS Security Update for vim (EulerOS-SA-2024-1209)"},{"cve":"CVE-2023-48231","qid":"674064","title":"EulerOS Security Update for vim (EulerOS-SA-2024-1114)"},{"cve":"CVE-2023-48231","qid":"755920","title":"SUSE Enterprise Linux Security Update for vim (SUSE-SU-2024:0783-1)"},{"cve":"CVE-2023-48231","qid":"755972","title":"SUSE Enterprise Linux Security Update for vim (SUSE-SU-2024:0871-1)"},{"cve":"CVE-2023-48231","qid":"907682","title":"Common Base Linux Mariner (CBL-Mariner) Security Update for vim (32025-1)"}]},"source_records":{"cve_program":null,"nvd":{"publishedDate":"2023-11-16 23:15:00","lastModifiedDate":"2023-11-17 01:15:00","problem_types":[],"metrics":[],"configurations":{"CVE_data_version":"4.0","nodes":[]}},"legacy_mitre":{"record":null,"notes":[]}}}