Download
| Alert*
oval:org.secpod.oval:def:91754
vim: Vi IMproved - enhanced vi editor Several security issues were fixed in Vim. oval:org.secpod.oval:def:2500602 Vim is an updated and improved version of the vi editor. oval:org.secpod.oval:def:19500168 A flaw was found in vim. A possible heap-based buffer overflow could allow an attacker to input a specially crafted file leading to a crash or code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. vim is vulnerable to Heap ... oval:org.secpod.oval:def:1601515 It was found that vim was vulnerable to use-after-free flaw in the way it was treating allocated lines in user functions. A specially crafted file could crash the vim process or possibly lead to other undefined behaviors. It was found that vim was vulnerable to a 1 byte heap based out of bounds read ... oval:org.secpod.oval:def:91470 vim: Vi IMproved - enhanced vi editor Several security issues were fixed in Vim. oval:org.secpod.oval:def:3301160 SUSE Security Update: Security update for vim oval:org.secpod.oval:def:89047403 This update for vim fixes the following issues: - CVE-2017-17087: Fixed information leak via .swp files . - CVE-2021-3875: Fixed heap-based buffer overflow . - CVE-2021-3903: Fixed heap-based buffer overflow . - CVE-2021-3968: Fixed heap-based buffer overflow . - CVE-2021-3973: Fixed heap-based buff ... oval:org.secpod.oval:def:4500889 Vim is an updated and improved version of the vi editor. Security Fix: * vim: Heap-based buffer overflow in block_insert in src/ops.c * vim: Heap-based buffer overflow in utf_head_off in mbyte.c * vim: Heap-based buffer overflow in init_ccline in ex_getln.c * vim: Illegal memory access when copy ... oval:org.secpod.oval:def:3000133 . oval:org.secpod.oval:def:89048081 This update for vim fixes the following issues: Updated to version 9.0.0814: * Fixing bsc#1192478 VUL-1: CVE-2021-3928: vim: vim is vulnerable to Stack-based Buffer Overflow * Fixing bsc#1203508 VUL-0: CVE-2022-3234: vim: Heap-based Buffer Overflow prior to 9.0.0483. * Fixing bsc#1203509 VUL-1: CVE- ... oval:org.secpod.oval:def:3000235 Multiple security vulnerabilities have been discovered in vim, an enhanced vi editor. Buffer overflows, out-of-bounds reads and Null pointer dereferences may lead to a denial of service or other unspecified impact. oval:org.secpod.oval:def:89580 vim: Vi IMproved - enhanced vi editor Several security issues were fixed in Vim. oval:org.secpod.oval:def:97603 [CLSA-2022:1644855718] Fixed CVEs in vim: CVE-2022-0361, CVE-2022-0351, CVE-2022-0368, CVE-2022-0359 oval:org.secpod.oval:def:1601545 A heap based out-of-bounds write flaw was found in vim's ops.c. This flaw allows an attacker to trick a user to open a crafted file triggering an out-of-bounds write. This vulnerability is capable of crashing software, modify memory, and possible code execution. A flaw was found in vim. The vulnerab ... oval:org.secpod.oval:def:708096 vim: Vi IMproved - enhanced vi editor Several security issues were fixed in Vim. oval:org.secpod.oval:def:121578 VIM is an updated and improved version of the vi editor. Vi was the first real screen-based editor for UNIX, and is still very popular. VIM improves on vi by adding new features: multiple windows, multi-level undo, block highlighting and more. oval:org.secpod.oval:def:506721 Vim is an updated and improved version of the vi editor. Security Fix: * vim: Heap-based buffer overflow in block_insert in src/ops.c * vim: Heap-based buffer overflow in utf_head_off in mbyte.c * vim: Heap-based buffer overflow in init_ccline in ex_getln.c * vim: Illegal memory access when copy ... oval:org.secpod.oval:def:1505500 [8.0.1763-16.0.1] - - Remove upstream references [Orabug: 31197557] [2:8.0.1763-16.12] - CVE-2022-0361 vim: Heap-based Buffer Overflow in GitHub repository [2:8.0.1763-16.11] - CVE-2022-0413 vim: use after free in src/ex_cmds.c - Fix specfile problems - Resolves: rhbz#2048525 [2:8.0.1763-16.10] - CV ... oval:org.secpod.oval:def:1700846 It was found that vim was vulnerable to use-after-free flaw in the way it was treating allocated lines in user functions. A specially crafted file could crash the vim process or possibly lead to other undefined behaviors. It was found that vim was vulnerable to a 1 byte heap based out of bounds read ... oval:org.secpod.oval:def:121513 VIM is an updated and improved version of the vi editor. Vi was the first real screen-based editor for UNIX, and is still very popular. VIM improves on vi by adding new features: multiple windows, multi-level undo, block highlighting and more. oval:org.secpod.oval:def:89046401 This update for vim fixes the following issues: - CVE-2017-17087: Fixed information leak via .swp files . - CVE-2021-3875: Fixed heap-based buffer overflow . - CVE-2021-3903: Fixed heap-based buffer overflow . - CVE-2021-3968: Fixed heap-based buffer overflow . - CVE-2021-3973: Fixed heap-based buff ... oval:org.secpod.oval:def:83796 The host is missing a security update according to Apple advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. Successful exploitation allow attackers to execute arbitrary code or disclose sensitive informat ... oval:org.secpod.oval:def:1505804 [2:8.0.1763-19.0.1.2] - Remove upstream references [Orabug: 31197557] - Added glibc-gconv-extra to common requires to provide ISO-8859-2 [Orabug: 34114984] [2:8.0.1763-19.2] - CVE-2022-1621 vim: heap buffer overflow - CVE-2022-1629 vim: buffer over-read [2:8.0.1763-19.1] - CVE-2022-1154 vim: use aft ... oval:org.secpod.oval:def:85976 The host is installed with Apple macOS 11 or macOS 12 before 12.6 and is prone to a multiple vulnerabilities. The flaws are present in the application, which fails to properly handle issues in vim update. Successful exploitation leads to unspecified impact. oval:org.secpod.oval:def:89579 vim: Vi IMproved - enhanced vi editor Several security issues were fixed in Vim. oval:org.secpod.oval:def:85969 The host is missing a security update according to Apple advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. Successful exploitation allow attackers to execute arbitrary code, cause denial of service or di ... |