[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:97639
[CLSA-2022:1653006752] Fixed CVEs in vim: CVE-2022-1620, CVE-2022-1616, CVE-2022-1629, CVE-2022-1621, CVE-2022-1619

oval:org.secpod.oval:def:19500168
A flaw was found in vim. A possible heap-based buffer overflow could allow an attacker to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. vim is vulnerable to Heap ...

oval:org.secpod.oval:def:2107713
Oracle Solaris 11 - ( CVE-2022-0943 )

oval:org.secpod.oval:def:2500791
Vim is an updated and improved version of the vi editor.

oval:org.secpod.oval:def:122174
VIM is an updated and improved version of the vi editor. Vi was the first real screen-based editor for UNIX, and is still very popular. VIM improves on vi by adding new features: multiple windows, multi-level undo, block highlighting and more.

oval:org.secpod.oval:def:1506449
[8.2.2637-20.0.1] - Remove upstream references [Orabug: 31197557] [2:8.2.2637-20] - CVE-2022-47024 vim: no check if the return value of XChangeGC is NULL [2:8.2.2637-19] - CVE-2022-1785 vim: Out-of-bounds Write - CVE-2022-1897 vim: out-of-bounds write in vim_regsub_both in regexp.c - CVE-2022-1927 v ...

oval:org.secpod.oval:def:707715
vim: Vi IMproved - enhanced vi editor Several security issues were fixed in Vim.

oval:org.secpod.oval:def:707721
vim: Vi IMproved - enhanced vi editor Details: USN-5613-1 fixed vulnerabilities in Vim. Unfortunately that update failed to include binary packages for some architectures. This update fixes that regression. We apologize for the inconvenience. Original advisory USN-5613-1 caused a regression in Vim.

oval:org.secpod.oval:def:2600028
Vim is an updated and improved version of the vi editor.

oval:org.secpod.oval:def:3000239
This update fixes multiple memory access violations in vim. CVE-2022-0318 Heap-based Buffer Overflow CVE-2022-0392 Heap-based Buffer Overflow CVE-2022-0629 Stack-based Buffer Overflow CVE-2022-0696 NULL Pointer Dereference CVE-2022-1619 Heap-based Buffer Overflow in function cmdline_erase_chars. Thi ...

oval:org.secpod.oval:def:3000233
Multiple security vulnerabilities have been discovered in vim, an enhanced vi editor. Buffer overflows, out-of-bounds reads and use-after-free may lead to a denial-of-service or other unspecified impact.

oval:org.secpod.oval:def:507073
Vim is an updated and improved version of the vi editor. Security Fix: * vim: Use of Out-of-range Pointer Offset in vim * vim: Heap-based Buffer Overflow occurs in vim * vim: Out-of-range Pointer Offset * vim: heap buffer overflow * vim: buffer over-read * vim: use after free in utf_ptr2char ...

oval:org.secpod.oval:def:4501158
Vim is an updated and improved version of the vi editor. Security Fix: * vim: heap buffer overflow * vim: buffer over-read For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References ...

oval:org.secpod.oval:def:86090
vim: Vi IMproved - enhanced vi editor Several security issues were fixed in Vim.

oval:org.secpod.oval:def:507056
Vim is an updated and improved version of the vi editor. Security Fix: * vim: heap buffer overflow * vim: buffer over-read For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References ...

oval:org.secpod.oval:def:1601565
Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior ...

oval:org.secpod.oval:def:1700963
Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior ...

oval:org.secpod.oval:def:1505880
[8.2.2637-16.0.1] - - Remove upstream references [Orabug: 31197557] [2:8.2.2637-16.2] - CVE-2022-1621 vim: heap buffer overflow - CVE-2022-1629 vim: buffer over-read [2:8.2.2637-16.1] - CVE-2022-0554 vim: Use of Out-of-range Pointer Offset in vim prior - CVE-2022-0943 vim: Heap-based Buffer Overflow ...

oval:org.secpod.oval:def:83974
vim: Vi IMproved - enhanced vi editor Several security issues were fixed in Vim.

oval:org.secpod.oval:def:1505804
[2:8.0.1763-19.0.1.2] - Remove upstream references [Orabug: 31197557] - Added glibc-gconv-extra to common requires to provide ISO-8859-2 [Orabug: 34114984] [2:8.0.1763-19.2] - CVE-2022-1621 vim: heap buffer overflow - CVE-2022-1629 vim: buffer over-read [2:8.0.1763-19.1] - CVE-2022-1154 vim: use aft ...

oval:org.secpod.oval:def:85993
The host is installed with Apple Mac OS before 13.0 and is prone to a multiple vulnerabilities. The flaws are present in the application, which fails to properly handle issues in vim update. Successful exploitation leads to unspecified impact.

oval:org.secpod.oval:def:86500
vim: Vi IMproved - enhanced vi editor Details: USN-5613-1 fixed vulnerabilities in Vim. Unfortunately that update failed to include binary packages for some architectures. This update fixes that regression. We apologize for the inconvenience. Original advisory USN-5613-1 caused a regression in Vim.

oval:org.secpod.oval:def:85969
The host is missing a security update according to Apple advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. Successful exploitation allow attackers to execute arbitrary code, cause denial of service or di ...

CPE    2
cpe:/o:debian:debian_linux:9.0
cpe:/a:vim:vim
CWE    1
CWE-122
*CVE
CVE-2022-1621

© SecPod Technologies