Download
| Alert*
oval:org.secpod.oval:def:300593
Python has a variable called sys.path that contains all paths where Python loads modules by using import scripting procedure. A wrong handling of that variable enables local attackers to execute arbitrary code via Python scripting in the current Vim working directory . This update provides fix for t ... oval:org.secpod.oval:def:301236 Python has a variable called sys.path that contains all paths where Python loads modules by using import scripting procedure. A wrong handling of that variable enables local attackers to execute arbitrary code via Python scripting in the current Vim working directory . This update provides fix for t ... oval:org.secpod.oval:def:3863 The host is installed with Apple Mac OS X 10.5.5 or 10.5.8 and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to properly handle a Trojan horse Python file in the current working directory. Successful exploitation could allow attackers to execute a ... oval:org.secpod.oval:def:89048081 This update for vim fixes the following issues: Updated to version 9.0.0814: * Fixing bsc#1192478 VUL-1: CVE-2021-3928: vim: vim is vulnerable to Stack-based Buffer Overflow * Fixing bsc#1203508 VUL-0: CVE-2022-3234: vim: Heap-based Buffer Overflow prior to 9.0.0483. * Fixing bsc#1203509 VUL-1: CVE- ... |