Download
| Alert*
oval:org.secpod.oval:def:97639
[CLSA-2022:1653006752] Fixed CVEs in vim: CVE-2022-1620, CVE-2022-1616, CVE-2022-1629, CVE-2022-1621, CVE-2022-1619 oval:org.secpod.oval:def:19500168 A flaw was found in vim. A possible heap-based buffer overflow could allow an attacker to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. vim is vulnerable to Heap ... oval:org.secpod.oval:def:2107713 Oracle Solaris 11 - ( CVE-2022-0943 ) oval:org.secpod.oval:def:2500791 Vim is an updated and improved version of the vi editor. oval:org.secpod.oval:def:122174 VIM is an updated and improved version of the vi editor. Vi was the first real screen-based editor for UNIX, and is still very popular. VIM improves on vi by adding new features: multiple windows, multi-level undo, block highlighting and more. oval:org.secpod.oval:def:1506449 [8.2.2637-20.0.1] - Remove upstream references [Orabug: 31197557] [2:8.2.2637-20] - CVE-2022-47024 vim: no check if the return value of XChangeGC is NULL [2:8.2.2637-19] - CVE-2022-1785 vim: Out-of-bounds Write - CVE-2022-1897 vim: out-of-bounds write in vim_regsub_both in regexp.c - CVE-2022-1927 v ... oval:org.secpod.oval:def:707715 vim: Vi IMproved - enhanced vi editor Several security issues were fixed in Vim. oval:org.secpod.oval:def:707721 vim: Vi IMproved - enhanced vi editor Details: USN-5613-1 fixed vulnerabilities in Vim. Unfortunately that update failed to include binary packages for some architectures. This update fixes that regression. We apologize for the inconvenience. Original advisory USN-5613-1 caused a regression in Vim. oval:org.secpod.oval:def:2600028 Vim is an updated and improved version of the vi editor. oval:org.secpod.oval:def:3000239 This update fixes multiple memory access violations in vim. CVE-2022-0318 Heap-based Buffer Overflow CVE-2022-0392 Heap-based Buffer Overflow CVE-2022-0629 Stack-based Buffer Overflow CVE-2022-0696 NULL Pointer Dereference CVE-2022-1619 Heap-based Buffer Overflow in function cmdline_erase_chars. Thi ... oval:org.secpod.oval:def:3000233 Multiple security vulnerabilities have been discovered in vim, an enhanced vi editor. Buffer overflows, out-of-bounds reads and use-after-free may lead to a denial-of-service or other unspecified impact. oval:org.secpod.oval:def:507073 Vim is an updated and improved version of the vi editor. Security Fix: * vim: Use of Out-of-range Pointer Offset in vim * vim: Heap-based Buffer Overflow occurs in vim * vim: Out-of-range Pointer Offset * vim: heap buffer overflow * vim: buffer over-read * vim: use after free in utf_ptr2char ... oval:org.secpod.oval:def:4501158 Vim is an updated and improved version of the vi editor. Security Fix: * vim: heap buffer overflow * vim: buffer over-read For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References ... oval:org.secpod.oval:def:86090 vim: Vi IMproved - enhanced vi editor Several security issues were fixed in Vim. oval:org.secpod.oval:def:507056 Vim is an updated and improved version of the vi editor. Security Fix: * vim: heap buffer overflow * vim: buffer over-read For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References ... oval:org.secpod.oval:def:1601565 Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior ... oval:org.secpod.oval:def:1700963 Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior ... oval:org.secpod.oval:def:1505880 [8.2.2637-16.0.1] - - Remove upstream references [Orabug: 31197557] [2:8.2.2637-16.2] - CVE-2022-1621 vim: heap buffer overflow - CVE-2022-1629 vim: buffer over-read [2:8.2.2637-16.1] - CVE-2022-0554 vim: Use of Out-of-range Pointer Offset in vim prior - CVE-2022-0943 vim: Heap-based Buffer Overflow ... oval:org.secpod.oval:def:83974 vim: Vi IMproved - enhanced vi editor Several security issues were fixed in Vim. oval:org.secpod.oval:def:1505804 [2:8.0.1763-19.0.1.2] - Remove upstream references [Orabug: 31197557] - Added glibc-gconv-extra to common requires to provide ISO-8859-2 [Orabug: 34114984] [2:8.0.1763-19.2] - CVE-2022-1621 vim: heap buffer overflow - CVE-2022-1629 vim: buffer over-read [2:8.0.1763-19.1] - CVE-2022-1154 vim: use aft ... oval:org.secpod.oval:def:85993 The host is installed with Apple Mac OS before 13.0 and is prone to a multiple vulnerabilities. The flaws are present in the application, which fails to properly handle issues in vim update. Successful exploitation leads to unspecified impact. oval:org.secpod.oval:def:86500 vim: Vi IMproved - enhanced vi editor Details: USN-5613-1 fixed vulnerabilities in Vim. Unfortunately that update failed to include binary packages for some architectures. This update fixes that regression. We apologize for the inconvenience. Original advisory USN-5613-1 caused a regression in Vim. oval:org.secpod.oval:def:85969 The host is missing a security update according to Apple advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. Successful exploitation allow attackers to execute arbitrary code, cause denial of service or di ... |