Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-1769 (GCVE-0-2022-1769)
Vulnerability from cvelistv5 – Published: 2022-05-17 00:00 – Updated: 2024-08-03 00:16- CWE-126 - Buffer Over-read
| URL | Tags |
|---|---|
| https://huntr.dev/bounties/522076b2-96cb-4df6-a50… | |
| https://github.com/vim/vim/commit/4748c4bd64610cf… | |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisory |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisory |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisory |
| https://security.gentoo.org/glsa/202208-32 | vendor-advisory |
| https://support.apple.com/kb/HT213488 | |
| http://seclists.org/fulldisclosure/2022/Oct/41 | mailing-list |
| http://seclists.org/fulldisclosure/2022/Oct/28 | mailing-list |
| https://security.gentoo.org/glsa/202305-16 | vendor-advisory |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T00:16:59.943Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4"
},
{
"name": "FEDORA-2022-d6d1ac4ca7",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/"
},
{
"name": "FEDORA-2022-74b9e404c1",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/"
},
{
"name": "FEDORA-2022-d044e7e0b4",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/"
},
{
"name": "GLSA-202208-32",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202208-32"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.apple.com/kb/HT213488"
},
{
"name": "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2022/Oct/41"
},
{
"name": "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2022/Oct/28"
},
{
"name": "GLSA-202305-16",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202305-16"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "vim/vim",
"vendor": "vim",
"versions": [
{
"lessThan": "8.2.4974",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-126",
"description": "CWE-126 Buffer Over-read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-05-03T00:00:00.000Z",
"orgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
"shortName": "@huntrdev"
},
"references": [
{
"url": "https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c"
},
{
"url": "https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4"
},
{
"name": "FEDORA-2022-d6d1ac4ca7",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/"
},
{
"name": "FEDORA-2022-74b9e404c1",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/"
},
{
"name": "FEDORA-2022-d044e7e0b4",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/"
},
{
"name": "GLSA-202208-32",
"tags": [
"vendor-advisory"
],
"url": "https://security.gentoo.org/glsa/202208-32"
},
{
"url": "https://support.apple.com/kb/HT213488"
},
{
"name": "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13",
"tags": [
"mailing-list"
],
"url": "http://seclists.org/fulldisclosure/2022/Oct/41"
},
{
"name": "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13",
"tags": [
"mailing-list"
],
"url": "http://seclists.org/fulldisclosure/2022/Oct/28"
},
{
"name": "GLSA-202305-16",
"tags": [
"vendor-advisory"
],
"url": "https://security.gentoo.org/glsa/202305-16"
}
],
"source": {
"advisory": "522076b2-96cb-4df6-a504-e6e2f64c171c",
"discovery": "EXTERNAL"
},
"title": "Buffer Over-read in vim/vim"
}
},
"cveMetadata": {
"assignerOrgId": "c09c270a-b464-47c1-9133-acb35b22c19a",
"assignerShortName": "@huntrdev",
"cveId": "CVE-2022-1769",
"datePublished": "2022-05-17T00:00:00.000Z",
"dateReserved": "2022-05-17T00:00:00.000Z",
"dateUpdated": "2024-08-03T00:16:59.943Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-1769",
"date": "2026-05-12",
"epss": "0.00155",
"percentile": "0.35749"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"8.2.4974\", \"matchCriteriaId\": \"0A817425-3484-4BCF-9F0B-F397BE994FCD\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A930E247-0B43-43CB-98FF-6CE7B8189835\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"13.0\", \"matchCriteriaId\": \"71E032AD-F827-4944-9699-BB1E6D4233FC\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974.\"}, {\"lang\": \"es\", \"value\": \"Un desbordamiento de b\\u00fafer en el repositorio de GitHub vim/vim versiones anteriores a 8.2.4974\"}]",
"id": "CVE-2022-1769",
"lastModified": "2024-11-21T06:41:25.697",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV30\": [{\"source\": \"security@huntr.dev\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H\", \"baseScore\": 6.6, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 4.7}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 4.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2022-05-17T17:15:08.153",
"references": "[{\"url\": \"http://seclists.org/fulldisclosure/2022/Oct/28\", \"source\": \"security@huntr.dev\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2022/Oct/41\", \"source\": \"security@huntr.dev\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4\", \"source\": \"security@huntr.dev\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c\", \"source\": \"security@huntr.dev\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/\", \"source\": \"security@huntr.dev\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/\", \"source\": \"security@huntr.dev\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/\", \"source\": \"security@huntr.dev\"}, {\"url\": \"https://security.gentoo.org/glsa/202208-32\", \"source\": \"security@huntr.dev\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202305-16\", \"source\": \"security@huntr.dev\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/kb/HT213488\", \"source\": \"security@huntr.dev\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2022/Oct/28\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2022/Oct/41\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/202208-32\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/202305-16\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://support.apple.com/kb/HT213488\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "security@huntr.dev",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security@huntr.dev\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-126\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-125\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-1769\",\"sourceIdentifier\":\"security@huntr.dev\",\"published\":\"2022-05-17T17:15:08.153\",\"lastModified\":\"2024-11-21T06:41:25.697\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de b\u00fafer en el repositorio de GitHub vim/vim versiones anteriores a 8.2.4974\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"security@huntr.dev\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H\",\"baseScore\":6.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":4.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security@huntr.dev\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-126\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.2.4974\",\"matchCriteriaId\":\"0A817425-3484-4BCF-9F0B-F397BE994FCD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"13.0\",\"matchCriteriaId\":\"71E032AD-F827-4944-9699-BB1E6D4233FC\"}]}]}],\"references\":[{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/28\",\"source\":\"security@huntr.dev\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/41\",\"source\":\"security@huntr.dev\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4\",\"source\":\"security@huntr.dev\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c\",\"source\":\"security@huntr.dev\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/\",\"source\":\"security@huntr.dev\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/\",\"source\":\"security@huntr.dev\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/\",\"source\":\"security@huntr.dev\"},{\"url\":\"https://security.gentoo.org/glsa/202208-32\",\"source\":\"security@huntr.dev\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202305-16\",\"source\":\"security@huntr.dev\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213488\",\"source\":\"security@huntr.dev\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/28\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2022/Oct/41\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202208-32\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/202305-16\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT213488\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
CERTFR-2022-AVI-947
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Apple indique que la vulnérabilité CVE-2022-42827 serait activement exploitée.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | watchOS versions antérieures à 9.1 | ||
| Apple | N/A | iPadOS versions antérieures à 16 | ||
| Apple | macOS | macOS Monterey versions antérieures à 12.6.1 | ||
| Apple | Safari | Safari versions antérieures à 16.1 | ||
| Apple | macOS | macOS Ventura versions antérieures à 13 | ||
| Apple | N/A | iOS versions antérieures à 16.1 | ||
| Apple | macOS | macOS Big Sur versions antérieures à 11.7.1 | ||
| Apple | N/A | tvOS versions antérieures à 16.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "watchOS versions ant\u00e9rieures \u00e0 9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions ant\u00e9rieures \u00e0 16",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Monterey versions ant\u00e9rieures \u00e0 12.6.1",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 16.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Ventura versions ant\u00e9rieures \u00e0 13",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 16.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Big Sur versions ant\u00e9rieures \u00e0 11.7.1",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 16.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-1621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1621"
},
{
"name": "CVE-2022-42819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42819"
},
{
"name": "CVE-2022-0261",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0261"
},
{
"name": "CVE-2022-2000",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2000"
},
{
"name": "CVE-2022-1381",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1381"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-1898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1898"
},
{
"name": "CVE-2022-42832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42832"
},
{
"name": "CVE-2022-42823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42823"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-32913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32913"
},
{
"name": "CVE-2022-32928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32928"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2022-42815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42815"
},
{
"name": "CVE-2022-1968",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1968"
},
{
"name": "CVE-2022-32936",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32936"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-42793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42793"
},
{
"name": "CVE-2022-32915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32915"
},
{
"name": "CVE-2022-1629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1629"
},
{
"name": "CVE-2022-42827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42827"
},
{
"name": "CVE-2022-42830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42830"
},
{
"name": "CVE-2022-0554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0554"
},
{
"name": "CVE-2022-32862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32862"
},
{
"name": "CVE-2022-0572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0572"
},
{
"name": "CVE-2022-42824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42824"
},
{
"name": "CVE-2022-2042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2042"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2022-1733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1733"
},
{
"name": "CVE-2022-0943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0943"
},
{
"name": "CVE-2022-1927",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1927"
},
{
"name": "CVE-2022-1851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1851"
},
{
"name": "CVE-2022-2126",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2126"
},
{
"name": "CVE-2022-42795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42795"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-0368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0368"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2022-42829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42829"
},
{
"name": "CVE-2022-42831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42831"
},
{
"name": "CVE-2022-42806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42806"
},
{
"name": "CVE-2022-1616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1616"
},
{
"name": "CVE-2022-42796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42796"
},
{
"name": "CVE-2022-32866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32866"
},
{
"name": "CVE-2022-42808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42808"
},
{
"name": "CVE-2022-32940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32940"
},
{
"name": "CVE-2022-42790",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42790"
},
{
"name": "CVE-2022-42788",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42788"
},
{
"name": "CVE-2022-32886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32886"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2022-0629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0629"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2022-32890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32890"
},
{
"name": "CVE-2022-0729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0729"
},
{
"name": "CVE-2022-42814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42814"
},
{
"name": "CVE-2022-32867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32867"
},
{
"name": "CVE-2022-32924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32924"
},
{
"name": "CVE-2022-32883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32883"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-42818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42818"
},
{
"name": "CVE-2022-42789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42789"
},
{
"name": "CVE-2022-32912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32912"
},
{
"name": "CVE-2022-0392",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0392"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32918",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32918"
},
{
"name": "CVE-2022-32908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32908"
},
{
"name": "CVE-2022-1620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1620"
},
{
"name": "CVE-2022-32911",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32911"
},
{
"name": "CVE-2022-42813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42813"
},
{
"name": "CVE-2022-32864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32864"
},
{
"name": "CVE-2022-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1942"
},
{
"name": "CVE-2022-1735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1735"
},
{
"name": "CVE-2022-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1720"
},
{
"name": "CVE-2022-42809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42809"
},
{
"name": "CVE-2022-0359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0359"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-32898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32898"
},
{
"name": "CVE-2022-32938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32938"
},
{
"name": "CVE-2022-32827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32827"
},
{
"name": "CVE-2022-26730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26730"
},
{
"name": "CVE-2022-42799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42799"
},
{
"name": "CVE-2022-32914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32914"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-32875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32875"
},
{
"name": "CVE-2022-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0361"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2022-32892",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32892"
},
{
"name": "CVE-2022-32881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32881"
},
{
"name": "CVE-2022-42811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42811"
},
{
"name": "CVE-2022-32905",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32905"
},
{
"name": "CVE-2022-32895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32895"
},
{
"name": "CVE-2022-32922",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32922"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2022-32902",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32902"
},
{
"name": "CVE-2022-0318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0318"
},
{
"name": "CVE-2022-32904",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32904"
},
{
"name": "CVE-2022-32879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32879"
},
{
"name": "CVE-2022-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2124"
},
{
"name": "CVE-2022-32865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32865"
},
{
"name": "CVE-2022-1769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1769"
},
{
"name": "CVE-2022-32947",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32947"
},
{
"name": "CVE-2022-1619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1619"
},
{
"name": "CVE-2022-32858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32858"
},
{
"name": "CVE-2022-32899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32899"
},
{
"name": "CVE-2022-32870",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32870"
},
{
"name": "CVE-2022-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0685"
},
{
"name": "CVE-2022-42820",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42820"
},
{
"name": "CVE-2022-32934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32934"
},
{
"name": "CVE-2022-42825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42825"
},
{
"name": "CVE-2022-32888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32888"
},
{
"name": "CVE-2022-2125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2125"
},
{
"name": "CVE-2022-42791",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42791"
},
{
"name": "CVE-2022-32946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32946"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-947",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n\nApple indique que la vuln\u00e9rabilit\u00e9\u00a0CVE-2022-42827 serait activement\nexploit\u00e9e.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213493 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213493"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213489 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213489"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213492 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213492"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213491 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213491"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213494 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213494"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213488 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213488"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213495 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213495"
}
]
}
CERTFR-2022-AVI-947
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Apple indique que la vulnérabilité CVE-2022-42827 serait activement exploitée.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | watchOS versions antérieures à 9.1 | ||
| Apple | N/A | iPadOS versions antérieures à 16 | ||
| Apple | macOS | macOS Monterey versions antérieures à 12.6.1 | ||
| Apple | Safari | Safari versions antérieures à 16.1 | ||
| Apple | macOS | macOS Ventura versions antérieures à 13 | ||
| Apple | N/A | iOS versions antérieures à 16.1 | ||
| Apple | macOS | macOS Big Sur versions antérieures à 11.7.1 | ||
| Apple | N/A | tvOS versions antérieures à 16.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "watchOS versions ant\u00e9rieures \u00e0 9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions ant\u00e9rieures \u00e0 16",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Monterey versions ant\u00e9rieures \u00e0 12.6.1",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 16.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Ventura versions ant\u00e9rieures \u00e0 13",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 16.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Big Sur versions ant\u00e9rieures \u00e0 11.7.1",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 16.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-1621",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1621"
},
{
"name": "CVE-2022-42819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42819"
},
{
"name": "CVE-2022-0261",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0261"
},
{
"name": "CVE-2022-2000",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2000"
},
{
"name": "CVE-2022-1381",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1381"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-1898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1898"
},
{
"name": "CVE-2022-42832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42832"
},
{
"name": "CVE-2022-42823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42823"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-32913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32913"
},
{
"name": "CVE-2022-32928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32928"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2022-42815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42815"
},
{
"name": "CVE-2022-1968",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1968"
},
{
"name": "CVE-2022-32936",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32936"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-42793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42793"
},
{
"name": "CVE-2022-32915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32915"
},
{
"name": "CVE-2022-1629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1629"
},
{
"name": "CVE-2022-42827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42827"
},
{
"name": "CVE-2022-42830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42830"
},
{
"name": "CVE-2022-0554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0554"
},
{
"name": "CVE-2022-32862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32862"
},
{
"name": "CVE-2022-0572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0572"
},
{
"name": "CVE-2022-42824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42824"
},
{
"name": "CVE-2022-2042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2042"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2022-1733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1733"
},
{
"name": "CVE-2022-0943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0943"
},
{
"name": "CVE-2022-1927",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1927"
},
{
"name": "CVE-2022-1851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1851"
},
{
"name": "CVE-2022-2126",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2126"
},
{
"name": "CVE-2022-42795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42795"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-0368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0368"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2022-42829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42829"
},
{
"name": "CVE-2022-42831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42831"
},
{
"name": "CVE-2022-42806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42806"
},
{
"name": "CVE-2022-1616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1616"
},
{
"name": "CVE-2022-42796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42796"
},
{
"name": "CVE-2022-32866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32866"
},
{
"name": "CVE-2022-42808",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42808"
},
{
"name": "CVE-2022-32940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32940"
},
{
"name": "CVE-2022-42790",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42790"
},
{
"name": "CVE-2022-42788",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42788"
},
{
"name": "CVE-2022-32886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32886"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2022-0629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0629"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2022-32890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32890"
},
{
"name": "CVE-2022-0729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0729"
},
{
"name": "CVE-2022-42814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42814"
},
{
"name": "CVE-2022-32867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32867"
},
{
"name": "CVE-2022-32924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32924"
},
{
"name": "CVE-2022-32883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32883"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-42818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42818"
},
{
"name": "CVE-2022-42789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42789"
},
{
"name": "CVE-2022-32912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32912"
},
{
"name": "CVE-2022-0392",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0392"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32918",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32918"
},
{
"name": "CVE-2022-32908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32908"
},
{
"name": "CVE-2022-1620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1620"
},
{
"name": "CVE-2022-32911",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32911"
},
{
"name": "CVE-2022-42813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42813"
},
{
"name": "CVE-2022-32864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32864"
},
{
"name": "CVE-2022-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1942"
},
{
"name": "CVE-2022-1735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1735"
},
{
"name": "CVE-2022-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1720"
},
{
"name": "CVE-2022-42809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42809"
},
{
"name": "CVE-2022-0359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0359"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-32898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32898"
},
{
"name": "CVE-2022-32938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32938"
},
{
"name": "CVE-2022-32827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32827"
},
{
"name": "CVE-2022-26730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26730"
},
{
"name": "CVE-2022-42799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42799"
},
{
"name": "CVE-2022-32914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32914"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-32875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32875"
},
{
"name": "CVE-2022-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0361"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2022-32892",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32892"
},
{
"name": "CVE-2022-32881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32881"
},
{
"name": "CVE-2022-42811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42811"
},
{
"name": "CVE-2022-32905",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32905"
},
{
"name": "CVE-2022-32895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32895"
},
{
"name": "CVE-2022-32922",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32922"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2022-32902",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32902"
},
{
"name": "CVE-2022-0318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0318"
},
{
"name": "CVE-2022-32904",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32904"
},
{
"name": "CVE-2022-32879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32879"
},
{
"name": "CVE-2022-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2124"
},
{
"name": "CVE-2022-32865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32865"
},
{
"name": "CVE-2022-1769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1769"
},
{
"name": "CVE-2022-32947",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32947"
},
{
"name": "CVE-2022-1619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1619"
},
{
"name": "CVE-2022-32858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32858"
},
{
"name": "CVE-2022-32899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32899"
},
{
"name": "CVE-2022-32870",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32870"
},
{
"name": "CVE-2022-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0685"
},
{
"name": "CVE-2022-42820",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42820"
},
{
"name": "CVE-2022-32934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32934"
},
{
"name": "CVE-2022-42825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42825"
},
{
"name": "CVE-2022-32888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32888"
},
{
"name": "CVE-2022-2125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2125"
},
{
"name": "CVE-2022-42791",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42791"
},
{
"name": "CVE-2022-32946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32946"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-947",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n\nApple indique que la vuln\u00e9rabilit\u00e9\u00a0CVE-2022-42827 serait activement\nexploit\u00e9e.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213493 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213493"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213489 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213489"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213492 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213492"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213491 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213491"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213494 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213494"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213488 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213488"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT213495 du 24 octobre 2022",
"url": "https://support.apple.com/fr-fr/HT213495"
}
]
}
GSD-2022-1769
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-1769",
"description": "Buffer Over-read in GitHub repository vim/vim prior to 8.2.",
"id": "GSD-2022-1769",
"references": [
"https://advisories.mageia.org/CVE-2022-1769.html",
"https://www.suse.com/security/cve/CVE-2022-1769.html",
"https://alas.aws.amazon.com/cve/html/CVE-2022-1769.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-1769"
],
"details": "Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974.",
"id": "GSD-2022-1769",
"modified": "2023-12-13T01:19:27.865510Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-1769",
"STATE": "PUBLIC",
"TITLE": "Buffer Over-read in vim/vim"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "vim/vim",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "8.2.4974"
}
]
}
}
]
},
"vendor_name": "vim"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-126 Buffer Over-read"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c",
"refsource": "CONFIRM",
"url": "https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c"
},
{
"name": "https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4",
"refsource": "MISC",
"url": "https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4"
},
{
"name": "FEDORA-2022-d6d1ac4ca7",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/"
},
{
"name": "FEDORA-2022-74b9e404c1",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/"
},
{
"name": "FEDORA-2022-d044e7e0b4",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/"
},
{
"name": "GLSA-202208-32",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202208-32"
},
{
"name": "https://support.apple.com/kb/HT213488",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT213488"
},
{
"name": "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2022/Oct/41"
},
{
"name": "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2022/Oct/28"
},
{
"name": "GLSA-202305-16",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202305-16"
}
]
},
"source": {
"advisory": "522076b2-96cb-4df6-a504-e6e2f64c171c",
"discovery": "EXTERNAL"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.2.4974",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "13.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@huntr.dev",
"ID": "CVE-2022-1769"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-126"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c"
},
{
"name": "https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4"
},
{
"name": "FEDORA-2022-d6d1ac4ca7",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKIX5HYKWXWG6QBCPPTPQ53GNOFHSAIS/"
},
{
"name": "FEDORA-2022-74b9e404c1",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUPOLEX5GXC733HL4EFYMHFU7NISJJZG/"
},
{
"name": "FEDORA-2022-d044e7e0b4",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFAZTAT5CZC2R6KYDYA2HBAVEDSIX6MW/"
},
{
"name": "GLSA-202208-32",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-32"
},
{
"name": "https://support.apple.com/kb/HT213488",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT213488"
},
{
"name": "20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13",
"refsource": "FULLDISC",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2022/Oct/41"
},
{
"name": "20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13",
"refsource": "FULLDISC",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2022/Oct/28"
},
{
"name": "GLSA-202305-16",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202305-16"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-06-27T16:18Z",
"publishedDate": "2022-05-17T17:15Z"
}
}
}
WID-SEC-W-2022-1846
Vulnerability from csaf_certbund - Published: 2022-10-24 22:00 - Updated: 2024-09-16 22:00In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten "Accelerate Framework", "Apple Neural Engine", "AppleAVD", "AppleMobileFileIntegrity", "ATS", "Audio", "AVEVideoEncoder", "Calendar", "CFNetwork", "ColorSync", "Crash Reporter", "curl", "Directory Utility", "DriverKit", "Exchange", "Find My", "Finder", "GPU Drivers", "Grapher", "Image Processing", "ImageIO", "Intel Graphics Driver", "IOHIDFamily", "IOKit", "Kernel", "Mail", "Maps", MediaLibrary", "ncurses", "Notes", "Notifications", "PackageKit", "Photos", "ppp", "Ruby", "Sandbox", "Security", "Shortcuts", "Sidecar", "Siri", "SMB", "Software Update", "SQLite", "Vim", "Weather", "WebKit", "WebKit PDF" sowie "WebKit Sandboxing". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, beliebigen Programmcode auszuführen, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Apple macOS Big Sur 11.7.1
Apple / macOS
|
cpe:/o:apple:mac_os:big_sur_11.7.1
|
Big Sur 11.7.1 | |
|
Apple macOS Ventura_13
Apple / macOS
|
cpe:/o:apple:mac_os:ventura_13
|
Ventura_13 | |
|
Apple macOS Monterey 12.6.1
Apple / macOS
|
cpe:/o:apple:mac_os:monterey_12.6.1
|
Monterey 12.6.1 |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- MacOS X",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-1846 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1846.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-1846 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1846"
},
{
"category": "external",
"summary": "Apple Security Advisory HT213488 vom 2022-10-24",
"url": "https://support.apple.com/en-us/HT213488"
},
{
"category": "external",
"summary": "Apple Security Advisory HT213493 vom 2022-10-24",
"url": "https://support.apple.com/en-us/HT213493"
},
{
"category": "external",
"summary": "Apple Security Advisory HT213494 vom 2022-10-24",
"url": "https://support.apple.com/en-us/HT213494"
}
],
"source_lang": "en-US",
"title": "Apple macOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-09-16T22:00:00.000+00:00",
"generator": {
"date": "2024-09-17T08:17:03.625+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.6"
}
},
"id": "WID-SEC-W-2022-1846",
"initial_release_date": "2022-10-24T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-10-24T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-10-27T22:00:00.000+00:00",
"number": "2",
"summary": "CVEs erg\u00e4nzt"
},
{
"date": "2023-06-27T22:00:00.000+00:00",
"number": "3",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2023-08-14T22:00:00.000+00:00",
"number": "4",
"summary": "CVE Nummern erg\u00e4nzt"
},
{
"date": "2024-06-10T22:00:00.000+00:00",
"number": "5",
"summary": "CVE\u0027s erg\u00e4nzt"
},
{
"date": "2024-09-16T22:00:00.000+00:00",
"number": "6",
"summary": "CVE-2022-46723 erg\u00e4nzt"
}
],
"status": "final",
"version": "6"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Ventura_13",
"product": {
"name": "Apple macOS Ventura_13",
"product_id": "T025102",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:ventura_13"
}
}
},
{
"category": "product_version",
"name": "Big Sur 11.7.1",
"product": {
"name": "Apple macOS Big Sur 11.7.1",
"product_id": "T025103",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:big_sur_11.7.1"
}
}
},
{
"category": "product_version",
"name": "Monterey 12.6.1",
"product": {
"name": "Apple macOS Monterey 12.6.1",
"product_id": "T025104",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:monterey_12.6.1"
}
}
}
],
"category": "product_name",
"name": "macOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-36690",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2021-36690"
},
{
"cve": "CVE-2021-39537",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2021-39537"
},
{
"cve": "CVE-2022-0261",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0261"
},
{
"cve": "CVE-2022-0318",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0318"
},
{
"cve": "CVE-2022-0319",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0319"
},
{
"cve": "CVE-2022-0351",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0351"
},
{
"cve": "CVE-2022-0359",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0359"
},
{
"cve": "CVE-2022-0361",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0361"
},
{
"cve": "CVE-2022-0368",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0368"
},
{
"cve": "CVE-2022-0392",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0392"
},
{
"cve": "CVE-2022-0554",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0554"
},
{
"cve": "CVE-2022-0572",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0572"
},
{
"cve": "CVE-2022-0629",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0629"
},
{
"cve": "CVE-2022-0685",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0685"
},
{
"cve": "CVE-2022-0696",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0696"
},
{
"cve": "CVE-2022-0714",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0714"
},
{
"cve": "CVE-2022-0729",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0729"
},
{
"cve": "CVE-2022-0943",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-0943"
},
{
"cve": "CVE-2022-1381",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1381"
},
{
"cve": "CVE-2022-1420",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1420"
},
{
"cve": "CVE-2022-1616",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1616"
},
{
"cve": "CVE-2022-1619",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1619"
},
{
"cve": "CVE-2022-1620",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1620"
},
{
"cve": "CVE-2022-1621",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1621"
},
{
"cve": "CVE-2022-1622",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1622"
},
{
"cve": "CVE-2022-1629",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1629"
},
{
"cve": "CVE-2022-1674",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1674"
},
{
"cve": "CVE-2022-1720",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1720"
},
{
"cve": "CVE-2022-1725",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1725"
},
{
"cve": "CVE-2022-1733",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1733"
},
{
"cve": "CVE-2022-1735",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1735"
},
{
"cve": "CVE-2022-1769",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1769"
},
{
"cve": "CVE-2022-1851",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1851"
},
{
"cve": "CVE-2022-1897",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1897"
},
{
"cve": "CVE-2022-1898",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1898"
},
{
"cve": "CVE-2022-1927",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1927"
},
{
"cve": "CVE-2022-1942",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1942"
},
{
"cve": "CVE-2022-1968",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-1968"
},
{
"cve": "CVE-2022-2000",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-2000"
},
{
"cve": "CVE-2022-2042",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-2042"
},
{
"cve": "CVE-2022-2124",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-2124"
},
{
"cve": "CVE-2022-2125",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-2125"
},
{
"cve": "CVE-2022-2126",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-2126"
},
{
"cve": "CVE-2022-26699",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-26699"
},
{
"cve": "CVE-2022-26730",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-26730"
},
{
"cve": "CVE-2022-28739",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-28739"
},
{
"cve": "CVE-2022-29458",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-29458"
},
{
"cve": "CVE-2022-32205",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32205"
},
{
"cve": "CVE-2022-32206",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32207",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32207"
},
{
"cve": "CVE-2022-32208",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32208"
},
{
"cve": "CVE-2022-32827",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32827"
},
{
"cve": "CVE-2022-32835",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32835"
},
{
"cve": "CVE-2022-32858",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32858"
},
{
"cve": "CVE-2022-32859",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32859"
},
{
"cve": "CVE-2022-32862",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32862"
},
{
"cve": "CVE-2022-32864",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32864"
},
{
"cve": "CVE-2022-32865",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32865"
},
{
"cve": "CVE-2022-32866",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32866"
},
{
"cve": "CVE-2022-32867",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32867"
},
{
"cve": "CVE-2022-32870",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32870"
},
{
"cve": "CVE-2022-32875",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32875"
},
{
"cve": "CVE-2022-32876",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32876"
},
{
"cve": "CVE-2022-32877",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32877"
},
{
"cve": "CVE-2022-32879",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32879"
},
{
"cve": "CVE-2022-32881",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32881"
},
{
"cve": "CVE-2022-32883",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32883"
},
{
"cve": "CVE-2022-32886",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32886"
},
{
"cve": "CVE-2022-32888",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32888"
},
{
"cve": "CVE-2022-32890",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32890"
},
{
"cve": "CVE-2022-32892",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32892"
},
{
"cve": "CVE-2022-32895",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32895"
},
{
"cve": "CVE-2022-32898",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32898"
},
{
"cve": "CVE-2022-32899",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32899"
},
{
"cve": "CVE-2022-32902",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32902"
},
{
"cve": "CVE-2022-32903",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32903"
},
{
"cve": "CVE-2022-32904",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32904"
},
{
"cve": "CVE-2022-32905",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32905"
},
{
"cve": "CVE-2022-32907",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32907"
},
{
"cve": "CVE-2022-32908",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32908"
},
{
"cve": "CVE-2022-32909",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32909"
},
{
"cve": "CVE-2022-32911",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32911"
},
{
"cve": "CVE-2022-32912",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32912"
},
{
"cve": "CVE-2022-32913",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32913"
},
{
"cve": "CVE-2022-32914",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32914"
},
{
"cve": "CVE-2022-32915",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32915"
},
{
"cve": "CVE-2022-32918",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32918"
},
{
"cve": "CVE-2022-32922",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32922"
},
{
"cve": "CVE-2022-32924",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32924"
},
{
"cve": "CVE-2022-32928",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32928"
},
{
"cve": "CVE-2022-32934",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32934"
},
{
"cve": "CVE-2022-32936",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32936"
},
{
"cve": "CVE-2022-32938",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32938"
},
{
"cve": "CVE-2022-32940",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32940"
},
{
"cve": "CVE-2022-32947",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-32947"
},
{
"cve": "CVE-2022-42788",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42788"
},
{
"cve": "CVE-2022-42789",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42789"
},
{
"cve": "CVE-2022-42790",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42790"
},
{
"cve": "CVE-2022-42791",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42791"
},
{
"cve": "CVE-2022-42793",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42793"
},
{
"cve": "CVE-2022-42795",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42795"
},
{
"cve": "CVE-2022-42796",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42796"
},
{
"cve": "CVE-2022-42799",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42799"
},
{
"cve": "CVE-2022-42806",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42806"
},
{
"cve": "CVE-2022-42808",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42808"
},
{
"cve": "CVE-2022-42809",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42809"
},
{
"cve": "CVE-2022-42811",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42811"
},
{
"cve": "CVE-2022-42813",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42813"
},
{
"cve": "CVE-2022-42814",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42814"
},
{
"cve": "CVE-2022-42815",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42815"
},
{
"cve": "CVE-2022-42818",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42818"
},
{
"cve": "CVE-2022-42819",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42819"
},
{
"cve": "CVE-2022-42820",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42820"
},
{
"cve": "CVE-2022-42823",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42823"
},
{
"cve": "CVE-2022-42824",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42824"
},
{
"cve": "CVE-2022-42825",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42825"
},
{
"cve": "CVE-2022-42828",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42828"
},
{
"cve": "CVE-2022-42829",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42829"
},
{
"cve": "CVE-2022-42830",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42830"
},
{
"cve": "CVE-2022-42831",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42831"
},
{
"cve": "CVE-2022-42832",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42832"
},
{
"cve": "CVE-2022-42833",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42833"
},
{
"cve": "CVE-2022-42834",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42834"
},
{
"cve": "CVE-2022-42838",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42838"
},
{
"cve": "CVE-2022-42860",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-42860"
},
{
"cve": "CVE-2022-46709",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-46709"
},
{
"cve": "CVE-2022-46712",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-46712"
},
{
"cve": "CVE-2022-46713",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-46713"
},
{
"cve": "CVE-2022-46721",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-46721"
},
{
"cve": "CVE-2022-46722",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-46722"
},
{
"cve": "CVE-2022-46723",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-46723"
},
{
"cve": "CVE-2022-47915",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-47915"
},
{
"cve": "CVE-2022-47965",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-47965"
},
{
"cve": "CVE-2022-48504",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-48504"
},
{
"cve": "CVE-2022-48505",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-48505"
},
{
"cve": "CVE-2022-48577",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-48577"
},
{
"cve": "CVE-2022-48683",
"notes": [
{
"category": "description",
"text": "In Apple macOS existieren mehrere Schwachstellen. Diese sind auf Fehler in den Komponenten \"Accelerate Framework\", \"Apple Neural Engine\", \"AppleAVD\", \"AppleMobileFileIntegrity\", \"ATS\", \"Audio\", \"AVEVideoEncoder\", \"Calendar\", \"CFNetwork\", \"ColorSync\", \"Crash Reporter\", \"curl\", \"Directory Utility\", \"DriverKit\", \"Exchange\", \"Find My\", \"Finder\", \"GPU Drivers\", \"Grapher\", \"Image Processing\", \"ImageIO\", \"Intel Graphics Driver\", \"IOHIDFamily\", \"IOKit\", \"Kernel\", \"Mail\", \"Maps\", MediaLibrary\", \"ncurses\", \"Notes\", \"Notifications\", \"PackageKit\", \"Photos\", \"ppp\", \"Ruby\", \"Sandbox\", \"Security\", \"Shortcuts\", \"Sidecar\", \"Siri\", \"SMB\", \"Software Update\", \"SQLite\", \"Vim\", \"Weather\", \"WebKit\", \"WebKit PDF\" sowie \"WebKit Sandboxing\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, beliebigen Programmcode auszuf\u00fchren, seine Privilegien zu erweitern, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen, Sicherheitsvorkehrungen zu umgehen oder sonstige Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T025103",
"T025102",
"T025104"
]
},
"release_date": "2022-10-24T22:00:00.000+00:00",
"title": "CVE-2022-48683"
}
]
}
WID-SEC-W-2022-0362
Vulnerability from csaf_certbund - Published: 2022-05-17 22:00 - Updated: 2023-04-03 22:00In vim existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund eines Pufferüberlaufs und eines heap-basierten Pufferüberlaufs. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um die Software zum Absturz zu bringen, den Speicher zu verändern und möglicherweise beliebigen Code auszuführen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— |
In vim existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund eines Pufferüberlaufs und eines heap-basierten Pufferüberlaufs. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um die Software zum Absturz zu bringen, den Speicher zu verändern und möglicherweise beliebigen Code auszuführen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Gentoo Linux
Gentoo
|
cpe:/o:gentoo:linux:-
|
— |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Vim (Vi IMproved) ist eine Weiterentwicklung des Texteditors vi.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in vim ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren, Speicher zu manipulieren und beliebigen Code zur Ausf\u00fchrung zu bringen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Windows\n- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0362 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0362.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0362 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0362"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5995-1 vom 2023-04-04",
"url": "https://ubuntu.com/security/notices/USN-5995-1"
},
{
"category": "external",
"summary": "Red Hat Bugzilla - Bug 2087594 vom 2022-05-17",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087594"
},
{
"category": "external",
"summary": "PoC vom 2022-05-17",
"url": "https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c/"
},
{
"category": "external",
"summary": "Patch vom 2022-05-17",
"url": "https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4"
},
{
"category": "external",
"summary": "Red Hat Bugzilla - Bug 2087594 vom 2022-05-17",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087600"
},
{
"category": "external",
"summary": "PoC vom 2022-05-17",
"url": "https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a"
},
{
"category": "external",
"summary": "Patch vom 2022-05-17",
"url": "https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2102-1 vom 2022-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011301.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5498-1 vom 2022-06-30",
"url": "https://ubuntu.com/security/notices/USN-5498-1"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2022-1829 vom 2022-07-21",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1829.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2022-1628 vom 2022-08-05",
"url": "https://alas.aws.amazon.com/ALAS-2022-1628.html"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202208-32 vom 2022-08-23",
"url": "https://security.gentoo.org/glsa/202208-32"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4619-1 vom 2022-12-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-December/013343.html"
}
],
"source_lang": "en-US",
"title": "vim: Schwachstelle erm\u00f6glicht Denial of Service, Manipulation und Codeausf\u00fchrung",
"tracking": {
"current_release_date": "2023-04-03T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:28:45.195+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-0362",
"initial_release_date": "2022-05-17T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-05-17T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-05-19T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: FEDORA-2022-74B9E404C1, FEDORA-2022-D044E7E0B4, FEDORA-2022-D6D1AC4CA7"
},
{
"date": "2022-06-16T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-06-30T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-07-20T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-08-04T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2022-08-22T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2022-12-26T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-04-03T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "9"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Open Source vim \u003c 8.2.4974",
"product": {
"name": "Open Source vim \u003c 8.2.4974",
"product_id": "T023272",
"product_identification_helper": {
"cpe": "cpe:/a:vim:vim:8.2.4974"
}
}
},
{
"category": "product_name",
"name": "Open Source vim \u003c 8.2.4968",
"product": {
"name": "Open Source vim \u003c 8.2.4968",
"product_id": "T023273",
"product_identification_helper": {
"cpe": "cpe:/a:vim:vim:8.2.4968"
}
}
}
],
"category": "product_name",
"name": "vim"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1733",
"notes": [
{
"category": "description",
"text": "In vim existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund eines Puffer\u00fcberlaufs und eines heap-basierten Puffer\u00fcberlaufs. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um die Software zum Absturz zu bringen, den Speicher zu ver\u00e4ndern und m\u00f6glicherweise beliebigen Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T002207",
"T000126",
"398363",
"T012167"
]
},
"release_date": "2022-05-17T22:00:00.000+00:00",
"title": "CVE-2022-1733"
},
{
"cve": "CVE-2022-1769",
"notes": [
{
"category": "description",
"text": "In vim existieren mehrere Schwachstellen. Die Fehler bestehen aufgrund eines Puffer\u00fcberlaufs und eines heap-basierten Puffer\u00fcberlaufs. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um die Software zum Absturz zu bringen, den Speicher zu ver\u00e4ndern und m\u00f6glicherweise beliebigen Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T002207",
"T000126",
"398363",
"T012167"
]
},
"release_date": "2022-05-17T22:00:00.000+00:00",
"title": "CVE-2022-1769"
}
]
}
OPENSUSE-SU-2024:12337-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "gvim-9.0.0453-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the gvim-9.0.0453-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12337",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12337-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-46059 page",
"url": "https://www.suse.com/security/cve/CVE-2021-46059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0213 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0213/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0261 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0318 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0319 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0351 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0351/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0359 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0359/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0361 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0368 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0368/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0392 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0392/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0407 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0407/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0408 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0408/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0413 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0413/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0554 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0554/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0572 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0572/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0629 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0629/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0685 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0685/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0729 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0943 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0943/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1154 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1160 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1420 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1420/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1616 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1616/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1619 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1620 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1621 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1629 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1629/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1674 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1674/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1720 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1733 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1733/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1735 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1735/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1769 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1769/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1771 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1771/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1785 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1785/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1796 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1796/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1851 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1851/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1886 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1886/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1897 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1897/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1898 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1898/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1927 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1927/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1942 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1942/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1968 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1968/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2000 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2000/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2042 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2042/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2124 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2124/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2125 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2126 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2126/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2129 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2129/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2175 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2175/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2182 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2183 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2206 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2206/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2207 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2208 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2210 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2210/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2231 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2264 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2264/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2284 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2284/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2286 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2286/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2287 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2287/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2288 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2289 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2289/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2304 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2304/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2343 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2343/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2344 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2344/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2345 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2345/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2571 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2571/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2580 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2580/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2581 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2581/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2598 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2816 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2816/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2817 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2819 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2849 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2849/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2862 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2874 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2874/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2889 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2889/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2923 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2946 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2946/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2980 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2982 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3016 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3037 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-3153 page",
"url": "https://www.suse.com/security/cve/CVE-2022-3153/"
}
],
"title": "gvim-9.0.0453-2.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12337-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.0.0453-2.1.aarch64",
"product": {
"name": "gvim-9.0.0453-2.1.aarch64",
"product_id": "gvim-9.0.0453-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "vim-9.0.0453-2.1.aarch64",
"product": {
"name": "vim-9.0.0453-2.1.aarch64",
"product_id": "vim-9.0.0453-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "vim-data-9.0.0453-2.1.aarch64",
"product": {
"name": "vim-data-9.0.0453-2.1.aarch64",
"product_id": "vim-data-9.0.0453-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "vim-data-common-9.0.0453-2.1.aarch64",
"product": {
"name": "vim-data-common-9.0.0453-2.1.aarch64",
"product_id": "vim-data-common-9.0.0453-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "vim-small-9.0.0453-2.1.aarch64",
"product": {
"name": "vim-small-9.0.0453-2.1.aarch64",
"product_id": "vim-small-9.0.0453-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.0.0453-2.1.ppc64le",
"product": {
"name": "gvim-9.0.0453-2.1.ppc64le",
"product_id": "gvim-9.0.0453-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "vim-9.0.0453-2.1.ppc64le",
"product": {
"name": "vim-9.0.0453-2.1.ppc64le",
"product_id": "vim-9.0.0453-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "vim-data-9.0.0453-2.1.ppc64le",
"product": {
"name": "vim-data-9.0.0453-2.1.ppc64le",
"product_id": "vim-data-9.0.0453-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "vim-data-common-9.0.0453-2.1.ppc64le",
"product": {
"name": "vim-data-common-9.0.0453-2.1.ppc64le",
"product_id": "vim-data-common-9.0.0453-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "vim-small-9.0.0453-2.1.ppc64le",
"product": {
"name": "vim-small-9.0.0453-2.1.ppc64le",
"product_id": "vim-small-9.0.0453-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.0.0453-2.1.s390x",
"product": {
"name": "gvim-9.0.0453-2.1.s390x",
"product_id": "gvim-9.0.0453-2.1.s390x"
}
},
{
"category": "product_version",
"name": "vim-9.0.0453-2.1.s390x",
"product": {
"name": "vim-9.0.0453-2.1.s390x",
"product_id": "vim-9.0.0453-2.1.s390x"
}
},
{
"category": "product_version",
"name": "vim-data-9.0.0453-2.1.s390x",
"product": {
"name": "vim-data-9.0.0453-2.1.s390x",
"product_id": "vim-data-9.0.0453-2.1.s390x"
}
},
{
"category": "product_version",
"name": "vim-data-common-9.0.0453-2.1.s390x",
"product": {
"name": "vim-data-common-9.0.0453-2.1.s390x",
"product_id": "vim-data-common-9.0.0453-2.1.s390x"
}
},
{
"category": "product_version",
"name": "vim-small-9.0.0453-2.1.s390x",
"product": {
"name": "vim-small-9.0.0453-2.1.s390x",
"product_id": "vim-small-9.0.0453-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gvim-9.0.0453-2.1.x86_64",
"product": {
"name": "gvim-9.0.0453-2.1.x86_64",
"product_id": "gvim-9.0.0453-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "vim-9.0.0453-2.1.x86_64",
"product": {
"name": "vim-9.0.0453-2.1.x86_64",
"product_id": "vim-9.0.0453-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "vim-data-9.0.0453-2.1.x86_64",
"product": {
"name": "vim-data-9.0.0453-2.1.x86_64",
"product_id": "vim-data-9.0.0453-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "vim-data-common-9.0.0453-2.1.x86_64",
"product": {
"name": "vim-data-common-9.0.0453-2.1.x86_64",
"product_id": "vim-data-common-9.0.0453-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "vim-small-9.0.0453-2.1.x86_64",
"product": {
"name": "vim-small-9.0.0453-2.1.x86_64",
"product_id": "vim-small-9.0.0453-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64"
},
"product_reference": "gvim-9.0.0453-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le"
},
"product_reference": "gvim-9.0.0453-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x"
},
"product_reference": "gvim-9.0.0453-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gvim-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64"
},
"product_reference": "gvim-9.0.0453-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64"
},
"product_reference": "vim-9.0.0453-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le"
},
"product_reference": "vim-9.0.0453-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x"
},
"product_reference": "vim-9.0.0453-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64"
},
"product_reference": "vim-9.0.0453-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64"
},
"product_reference": "vim-data-9.0.0453-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le"
},
"product_reference": "vim-data-9.0.0453-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x"
},
"product_reference": "vim-data-9.0.0453-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64"
},
"product_reference": "vim-data-9.0.0453-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-common-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64"
},
"product_reference": "vim-data-common-9.0.0453-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-common-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le"
},
"product_reference": "vim-data-common-9.0.0453-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-common-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x"
},
"product_reference": "vim-data-common-9.0.0453-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-data-common-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64"
},
"product_reference": "vim-data-common-9.0.0453-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.0.0453-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64"
},
"product_reference": "vim-small-9.0.0453-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.0.0453-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le"
},
"product_reference": "vim-small-9.0.0453-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.0.0453-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x"
},
"product_reference": "vim-small-9.0.0453-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "vim-small-9.0.0453-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
},
"product_reference": "vim-small-9.0.0453-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-46059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-46059"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-46059",
"url": "https://www.suse.com/security/cve/CVE-2021-46059"
},
{
"category": "external",
"summary": "SUSE Bug 1194556 for CVE-2021-46059",
"url": "https://bugzilla.suse.com/1194556"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-46059"
},
{
"cve": "CVE-2022-0213",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0213"
}
],
"notes": [
{
"category": "general",
"text": "vim is vulnerable to Heap-based Buffer Overflow",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0213",
"url": "https://www.suse.com/security/cve/CVE-2022-0213"
},
{
"category": "external",
"summary": "SUSE Bug 1194885 for CVE-2022-0213",
"url": "https://bugzilla.suse.com/1194885"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0213"
},
{
"cve": "CVE-2022-0261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0261"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0261",
"url": "https://www.suse.com/security/cve/CVE-2022-0261"
},
{
"category": "external",
"summary": "SUSE Bug 1194872 for CVE-2022-0261",
"url": "https://bugzilla.suse.com/1194872"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0261"
},
{
"cve": "CVE-2022-0318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0318"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0318",
"url": "https://www.suse.com/security/cve/CVE-2022-0318"
},
{
"category": "external",
"summary": "SUSE Bug 1195004 for CVE-2022-0318",
"url": "https://bugzilla.suse.com/1195004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0318"
},
{
"cve": "CVE-2022-0319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0319"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0319",
"url": "https://www.suse.com/security/cve/CVE-2022-0319"
},
{
"category": "external",
"summary": "SUSE Bug 1195066 for CVE-2022-0319",
"url": "https://bugzilla.suse.com/1195066"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-0319"
},
{
"cve": "CVE-2022-0351",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0351"
}
],
"notes": [
{
"category": "general",
"text": "Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0351",
"url": "https://www.suse.com/security/cve/CVE-2022-0351"
},
{
"category": "external",
"summary": "SUSE Bug 1195126 for CVE-2022-0351",
"url": "https://bugzilla.suse.com/1195126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-0351"
},
{
"cve": "CVE-2022-0359",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0359"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0359",
"url": "https://www.suse.com/security/cve/CVE-2022-0359"
},
{
"category": "external",
"summary": "SUSE Bug 1195203 for CVE-2022-0359",
"url": "https://bugzilla.suse.com/1195203"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0359"
},
{
"cve": "CVE-2022-0361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0361"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0361",
"url": "https://www.suse.com/security/cve/CVE-2022-0361"
},
{
"category": "external",
"summary": "SUSE Bug 1195202 for CVE-2022-0361",
"url": "https://bugzilla.suse.com/1195202"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0361"
},
{
"cve": "CVE-2022-0368",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0368"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0368",
"url": "https://www.suse.com/security/cve/CVE-2022-0368"
},
{
"category": "external",
"summary": "SUSE Bug 1195205 for CVE-2022-0368",
"url": "https://bugzilla.suse.com/1195205"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0368"
},
{
"cve": "CVE-2022-0392",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0392"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0392",
"url": "https://www.suse.com/security/cve/CVE-2022-0392"
},
{
"category": "external",
"summary": "SUSE Bug 1195332 for CVE-2022-0392",
"url": "https://bugzilla.suse.com/1195332"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0392"
},
{
"cve": "CVE-2022-0407",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0407"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0407",
"url": "https://www.suse.com/security/cve/CVE-2022-0407"
},
{
"category": "external",
"summary": "SUSE Bug 1195354 for CVE-2022-0407",
"url": "https://bugzilla.suse.com/1195354"
},
{
"category": "external",
"summary": "SUSE Bug 1208308 for CVE-2022-0407",
"url": "https://bugzilla.suse.com/1208308"
},
{
"category": "external",
"summary": "SUSE Bug 1208649 for CVE-2022-0407",
"url": "https://bugzilla.suse.com/1208649"
},
{
"category": "external",
"summary": "SUSE Bug 1208651 for CVE-2022-0407",
"url": "https://bugzilla.suse.com/1208651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0407"
},
{
"cve": "CVE-2022-0408",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0408"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0408",
"url": "https://www.suse.com/security/cve/CVE-2022-0408"
},
{
"category": "external",
"summary": "SUSE Bug 1195459 for CVE-2022-0408",
"url": "https://bugzilla.suse.com/1195459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0408"
},
{
"cve": "CVE-2022-0413",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0413"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0413",
"url": "https://www.suse.com/security/cve/CVE-2022-0413"
},
{
"category": "external",
"summary": "SUSE Bug 1195356 for CVE-2022-0413",
"url": "https://bugzilla.suse.com/1195356"
},
{
"category": "external",
"summary": "SUSE Bug 1208308 for CVE-2022-0413",
"url": "https://bugzilla.suse.com/1208308"
},
{
"category": "external",
"summary": "SUSE Bug 1208651 for CVE-2022-0413",
"url": "https://bugzilla.suse.com/1208651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0413"
},
{
"cve": "CVE-2022-0554",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0554"
}
],
"notes": [
{
"category": "general",
"text": "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0554",
"url": "https://www.suse.com/security/cve/CVE-2022-0554"
},
{
"category": "external",
"summary": "SUSE Bug 1195846 for CVE-2022-0554",
"url": "https://bugzilla.suse.com/1195846"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0554"
},
{
"cve": "CVE-2022-0572",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0572"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0572",
"url": "https://www.suse.com/security/cve/CVE-2022-0572"
},
{
"category": "external",
"summary": "SUSE Bug 1196023 for CVE-2022-0572",
"url": "https://bugzilla.suse.com/1196023"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0572"
},
{
"cve": "CVE-2022-0629",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0629"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0629",
"url": "https://www.suse.com/security/cve/CVE-2022-0629"
},
{
"category": "external",
"summary": "SUSE Bug 1196226 for CVE-2022-0629",
"url": "https://bugzilla.suse.com/1196226"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-0629"
},
{
"cve": "CVE-2022-0685",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0685"
}
],
"notes": [
{
"category": "general",
"text": "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0685",
"url": "https://www.suse.com/security/cve/CVE-2022-0685"
},
{
"category": "external",
"summary": "SUSE Bug 1196227 for CVE-2022-0685",
"url": "https://bugzilla.suse.com/1196227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0685"
},
{
"cve": "CVE-2022-0729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0729"
}
],
"notes": [
{
"category": "general",
"text": "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0729",
"url": "https://www.suse.com/security/cve/CVE-2022-0729"
},
{
"category": "external",
"summary": "SUSE Bug 1196437 for CVE-2022-0729",
"url": "https://bugzilla.suse.com/1196437"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-0729"
},
{
"cve": "CVE-2022-0943",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0943"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0943",
"url": "https://www.suse.com/security/cve/CVE-2022-0943"
},
{
"category": "external",
"summary": "SUSE Bug 1197225 for CVE-2022-0943",
"url": "https://bugzilla.suse.com/1197225"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-0943"
},
{
"cve": "CVE-2022-1154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1154"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1154",
"url": "https://www.suse.com/security/cve/CVE-2022-1154"
},
{
"category": "external",
"summary": "SUSE Bug 1197813 for CVE-2022-1154",
"url": "https://bugzilla.suse.com/1197813"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1154"
},
{
"cve": "CVE-2022-1160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1160"
}
],
"notes": [
{
"category": "general",
"text": "heap buffer overflow in get_one_sourceline in GitHub repository vim/vim prior to 8.2.4647.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1160",
"url": "https://www.suse.com/security/cve/CVE-2022-1160"
},
{
"category": "external",
"summary": "SUSE Bug 1197814 for CVE-2022-1160",
"url": "https://bugzilla.suse.com/1197814"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1160"
},
{
"cve": "CVE-2022-1420",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1420"
}
],
"notes": [
{
"category": "general",
"text": "Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1420",
"url": "https://www.suse.com/security/cve/CVE-2022-1420"
},
{
"category": "external",
"summary": "SUSE Bug 1198748 for CVE-2022-1420",
"url": "https://bugzilla.suse.com/1198748"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-1420"
},
{
"cve": "CVE-2022-1616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1616"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1616",
"url": "https://www.suse.com/security/cve/CVE-2022-1616"
},
{
"category": "external",
"summary": "SUSE Bug 1199331 for CVE-2022-1616",
"url": "https://bugzilla.suse.com/1199331"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1616"
},
{
"cve": "CVE-2022-1619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1619"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1619",
"url": "https://www.suse.com/security/cve/CVE-2022-1619"
},
{
"category": "external",
"summary": "SUSE Bug 1199333 for CVE-2022-1619",
"url": "https://bugzilla.suse.com/1199333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1619"
},
{
"cve": "CVE-2022-1620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1620"
}
],
"notes": [
{
"category": "general",
"text": "NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1620",
"url": "https://www.suse.com/security/cve/CVE-2022-1620"
},
{
"category": "external",
"summary": "SUSE Bug 1199334 for CVE-2022-1620",
"url": "https://bugzilla.suse.com/1199334"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-1620"
},
{
"cve": "CVE-2022-1621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1621"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1621",
"url": "https://www.suse.com/security/cve/CVE-2022-1621"
},
{
"category": "external",
"summary": "SUSE Bug 1199435 for CVE-2022-1621",
"url": "https://bugzilla.suse.com/1199435"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1621"
},
{
"cve": "CVE-2022-1629",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1629"
}
],
"notes": [
{
"category": "general",
"text": "Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1629",
"url": "https://www.suse.com/security/cve/CVE-2022-1629"
},
{
"category": "external",
"summary": "SUSE Bug 1199436 for CVE-2022-1629",
"url": "https://bugzilla.suse.com/1199436"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1629"
},
{
"cve": "CVE-2022-1674",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1674"
}
],
"notes": [
{
"category": "general",
"text": "NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1674",
"url": "https://www.suse.com/security/cve/CVE-2022-1674"
},
{
"category": "external",
"summary": "SUSE Bug 1199502 for CVE-2022-1674",
"url": "https://bugzilla.suse.com/1199502"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-1674"
},
{
"cve": "CVE-2022-1720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1720"
}
],
"notes": [
{
"category": "general",
"text": "Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1720",
"url": "https://www.suse.com/security/cve/CVE-2022-1720"
},
{
"category": "external",
"summary": "SUSE Bug 1200732 for CVE-2022-1720",
"url": "https://bugzilla.suse.com/1200732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-1720"
},
{
"cve": "CVE-2022-1733",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1733"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1733",
"url": "https://www.suse.com/security/cve/CVE-2022-1733"
},
{
"category": "external",
"summary": "SUSE Bug 1199655 for CVE-2022-1733",
"url": "https://bugzilla.suse.com/1199655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-1733"
},
{
"cve": "CVE-2022-1735",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1735"
}
],
"notes": [
{
"category": "general",
"text": "Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1735",
"url": "https://www.suse.com/security/cve/CVE-2022-1735"
},
{
"category": "external",
"summary": "SUSE Bug 1199651 for CVE-2022-1735",
"url": "https://bugzilla.suse.com/1199651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1735"
},
{
"cve": "CVE-2022-1769",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1769"
}
],
"notes": [
{
"category": "general",
"text": "Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1769",
"url": "https://www.suse.com/security/cve/CVE-2022-1769"
},
{
"category": "external",
"summary": "SUSE Bug 1199658 for CVE-2022-1769",
"url": "https://bugzilla.suse.com/1199658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1769"
},
{
"cve": "CVE-2022-1771",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1771"
}
],
"notes": [
{
"category": "general",
"text": "Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1771",
"url": "https://www.suse.com/security/cve/CVE-2022-1771"
},
{
"category": "external",
"summary": "SUSE Bug 1199693 for CVE-2022-1771",
"url": "https://bugzilla.suse.com/1199693"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-1771"
},
{
"cve": "CVE-2022-1785",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1785"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1785",
"url": "https://www.suse.com/security/cve/CVE-2022-1785"
},
{
"category": "external",
"summary": "SUSE Bug 1199745 for CVE-2022-1785",
"url": "https://bugzilla.suse.com/1199745"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-1785"
},
{
"cve": "CVE-2022-1796",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1796"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 8.2.4979.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1796",
"url": "https://www.suse.com/security/cve/CVE-2022-1796"
},
{
"category": "external",
"summary": "SUSE Bug 1199747 for CVE-2022-1796",
"url": "https://bugzilla.suse.com/1199747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1796"
},
{
"cve": "CVE-2022-1851",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1851"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1851",
"url": "https://www.suse.com/security/cve/CVE-2022-1851"
},
{
"category": "external",
"summary": "SUSE Bug 1199936 for CVE-2022-1851",
"url": "https://bugzilla.suse.com/1199936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-1851"
},
{
"cve": "CVE-2022-1886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1886"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1886",
"url": "https://www.suse.com/security/cve/CVE-2022-1886"
},
{
"category": "external",
"summary": "SUSE Bug 1199969 for CVE-2022-1886",
"url": "https://bugzilla.suse.com/1199969"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-1886"
},
{
"cve": "CVE-2022-1897",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1897"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1897",
"url": "https://www.suse.com/security/cve/CVE-2022-1897"
},
{
"category": "external",
"summary": "SUSE Bug 1200010 for CVE-2022-1897",
"url": "https://bugzilla.suse.com/1200010"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1897"
},
{
"cve": "CVE-2022-1898",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1898"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1898",
"url": "https://www.suse.com/security/cve/CVE-2022-1898"
},
{
"category": "external",
"summary": "SUSE Bug 1200011 for CVE-2022-1898",
"url": "https://bugzilla.suse.com/1200011"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1898"
},
{
"cve": "CVE-2022-1927",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1927"
}
],
"notes": [
{
"category": "general",
"text": "Buffer Over-read in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1927",
"url": "https://www.suse.com/security/cve/CVE-2022-1927"
},
{
"category": "external",
"summary": "SUSE Bug 1200012 for CVE-2022-1927",
"url": "https://bugzilla.suse.com/1200012"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1927"
},
{
"cve": "CVE-2022-1942",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1942"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1942",
"url": "https://www.suse.com/security/cve/CVE-2022-1942"
},
{
"category": "external",
"summary": "SUSE Bug 1200125 for CVE-2022-1942",
"url": "https://bugzilla.suse.com/1200125"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1942"
},
{
"cve": "CVE-2022-1968",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1968"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1968",
"url": "https://www.suse.com/security/cve/CVE-2022-1968"
},
{
"category": "external",
"summary": "SUSE Bug 1200270 for CVE-2022-1968",
"url": "https://bugzilla.suse.com/1200270"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-1968"
},
{
"cve": "CVE-2022-2000",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2000"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2000",
"url": "https://www.suse.com/security/cve/CVE-2022-2000"
},
{
"category": "external",
"summary": "SUSE Bug 1200405 for CVE-2022-2000",
"url": "https://bugzilla.suse.com/1200405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-2000"
},
{
"cve": "CVE-2022-2042",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2042"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2042",
"url": "https://www.suse.com/security/cve/CVE-2022-2042"
},
{
"category": "external",
"summary": "SUSE Bug 1200471 for CVE-2022-2042",
"url": "https://bugzilla.suse.com/1200471"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-2042"
},
{
"cve": "CVE-2022-2124",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2124"
}
],
"notes": [
{
"category": "general",
"text": "Buffer Over-read in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2124",
"url": "https://www.suse.com/security/cve/CVE-2022-2124"
},
{
"category": "external",
"summary": "SUSE Bug 1200697 for CVE-2022-2124",
"url": "https://bugzilla.suse.com/1200697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2124"
},
{
"cve": "CVE-2022-2125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2125"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2125",
"url": "https://www.suse.com/security/cve/CVE-2022-2125"
},
{
"category": "external",
"summary": "SUSE Bug 1200698 for CVE-2022-2125",
"url": "https://bugzilla.suse.com/1200698"
},
{
"category": "external",
"summary": "SUSE Bug 1205395 for CVE-2022-2125",
"url": "https://bugzilla.suse.com/1205395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2125"
},
{
"cve": "CVE-2022-2126",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2126"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2126",
"url": "https://www.suse.com/security/cve/CVE-2022-2126"
},
{
"category": "external",
"summary": "SUSE Bug 1200700 for CVE-2022-2126",
"url": "https://bugzilla.suse.com/1200700"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2126"
},
{
"cve": "CVE-2022-2129",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2129"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2129",
"url": "https://www.suse.com/security/cve/CVE-2022-2129"
},
{
"category": "external",
"summary": "SUSE Bug 1200701 for CVE-2022-2129",
"url": "https://bugzilla.suse.com/1200701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2129"
},
{
"cve": "CVE-2022-2175",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2175"
}
],
"notes": [
{
"category": "general",
"text": "Buffer Over-read in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2175",
"url": "https://www.suse.com/security/cve/CVE-2022-2175"
},
{
"category": "external",
"summary": "SUSE Bug 1200904 for CVE-2022-2175",
"url": "https://bugzilla.suse.com/1200904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2175"
},
{
"cve": "CVE-2022-2182",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2182"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2182",
"url": "https://www.suse.com/security/cve/CVE-2022-2182"
},
{
"category": "external",
"summary": "SUSE Bug 1200903 for CVE-2022-2182",
"url": "https://bugzilla.suse.com/1200903"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2182"
},
{
"cve": "CVE-2022-2183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2183"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2183",
"url": "https://www.suse.com/security/cve/CVE-2022-2183"
},
{
"category": "external",
"summary": "SUSE Bug 1200902 for CVE-2022-2183",
"url": "https://bugzilla.suse.com/1200902"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2183"
},
{
"cve": "CVE-2022-2206",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2206"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2206",
"url": "https://www.suse.com/security/cve/CVE-2022-2206"
},
{
"category": "external",
"summary": "SUSE Bug 1201155 for CVE-2022-2206",
"url": "https://bugzilla.suse.com/1201155"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2206"
},
{
"cve": "CVE-2022-2207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2207"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2207",
"url": "https://www.suse.com/security/cve/CVE-2022-2207"
},
{
"category": "external",
"summary": "SUSE Bug 1201153 for CVE-2022-2207",
"url": "https://bugzilla.suse.com/1201153"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2207"
},
{
"cve": "CVE-2022-2208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2208"
}
],
"notes": [
{
"category": "general",
"text": "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2208",
"url": "https://www.suse.com/security/cve/CVE-2022-2208"
},
{
"category": "external",
"summary": "SUSE Bug 1201152 for CVE-2022-2208",
"url": "https://bugzilla.suse.com/1201152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2208"
},
{
"cve": "CVE-2022-2210",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2210"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2210",
"url": "https://www.suse.com/security/cve/CVE-2022-2210"
},
{
"category": "external",
"summary": "SUSE Bug 1201151 for CVE-2022-2210",
"url": "https://bugzilla.suse.com/1201151"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2210"
},
{
"cve": "CVE-2022-2231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2231"
}
],
"notes": [
{
"category": "general",
"text": "NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2231",
"url": "https://www.suse.com/security/cve/CVE-2022-2231"
},
{
"category": "external",
"summary": "SUSE Bug 1201150 for CVE-2022-2231",
"url": "https://bugzilla.suse.com/1201150"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2231"
},
{
"cve": "CVE-2022-2264",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2264"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2264",
"url": "https://www.suse.com/security/cve/CVE-2022-2264"
},
{
"category": "external",
"summary": "SUSE Bug 1201132 for CVE-2022-2264",
"url": "https://bugzilla.suse.com/1201132"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2264"
},
{
"cve": "CVE-2022-2284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2284"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2284",
"url": "https://www.suse.com/security/cve/CVE-2022-2284"
},
{
"category": "external",
"summary": "SUSE Bug 1201133 for CVE-2022-2284",
"url": "https://bugzilla.suse.com/1201133"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2284"
},
{
"cve": "CVE-2022-2286",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2286"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2286",
"url": "https://www.suse.com/security/cve/CVE-2022-2286"
},
{
"category": "external",
"summary": "SUSE Bug 1201135 for CVE-2022-2286",
"url": "https://bugzilla.suse.com/1201135"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2286"
},
{
"cve": "CVE-2022-2287",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2287"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2287",
"url": "https://www.suse.com/security/cve/CVE-2022-2287"
},
{
"category": "external",
"summary": "SUSE Bug 1201136 for CVE-2022-2287",
"url": "https://bugzilla.suse.com/1201136"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2287"
},
{
"cve": "CVE-2022-2288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2288"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2288",
"url": "https://www.suse.com/security/cve/CVE-2022-2288"
},
{
"category": "external",
"summary": "SUSE Bug 1201137 for CVE-2022-2288",
"url": "https://bugzilla.suse.com/1201137"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2288"
},
{
"cve": "CVE-2022-2289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2289"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2289",
"url": "https://www.suse.com/security/cve/CVE-2022-2289"
},
{
"category": "external",
"summary": "SUSE Bug 1201139 for CVE-2022-2289",
"url": "https://bugzilla.suse.com/1201139"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2289"
},
{
"cve": "CVE-2022-2304",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2304"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2304",
"url": "https://www.suse.com/security/cve/CVE-2022-2304"
},
{
"category": "external",
"summary": "SUSE Bug 1201249 for CVE-2022-2304",
"url": "https://bugzilla.suse.com/1201249"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2304"
},
{
"cve": "CVE-2022-2343",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2343"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2343",
"url": "https://www.suse.com/security/cve/CVE-2022-2343"
},
{
"category": "external",
"summary": "SUSE Bug 1201356 for CVE-2022-2343",
"url": "https://bugzilla.suse.com/1201356"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2343"
},
{
"cve": "CVE-2022-2344",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2344"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2344",
"url": "https://www.suse.com/security/cve/CVE-2022-2344"
},
{
"category": "external",
"summary": "SUSE Bug 1201359 for CVE-2022-2344",
"url": "https://bugzilla.suse.com/1201359"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2344"
},
{
"cve": "CVE-2022-2345",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2345"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.0046.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2345",
"url": "https://www.suse.com/security/cve/CVE-2022-2345"
},
{
"category": "external",
"summary": "SUSE Bug 1201363 for CVE-2022-2345",
"url": "https://bugzilla.suse.com/1201363"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2345"
},
{
"cve": "CVE-2022-2571",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2571"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0101.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2571",
"url": "https://www.suse.com/security/cve/CVE-2022-2571"
},
{
"category": "external",
"summary": "SUSE Bug 1202046 for CVE-2022-2571",
"url": "https://bugzilla.suse.com/1202046"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2571"
},
{
"cve": "CVE-2022-2580",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2580"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0102.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2580",
"url": "https://www.suse.com/security/cve/CVE-2022-2580"
},
{
"category": "external",
"summary": "SUSE Bug 1202049 for CVE-2022-2580",
"url": "https://bugzilla.suse.com/1202049"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2580"
},
{
"cve": "CVE-2022-2581",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2581"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2581",
"url": "https://www.suse.com/security/cve/CVE-2022-2581"
},
{
"category": "external",
"summary": "SUSE Bug 1202050 for CVE-2022-2581",
"url": "https://bugzilla.suse.com/1202050"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2581"
},
{
"cve": "CVE-2022-2598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2598"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Write to API in GitHub repository vim/vim prior to 9.0.0100.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2598",
"url": "https://www.suse.com/security/cve/CVE-2022-2598"
},
{
"category": "external",
"summary": "SUSE Bug 1202051 for CVE-2022-2598",
"url": "https://bugzilla.suse.com/1202051"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2598"
},
{
"cve": "CVE-2022-2816",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2816"
}
],
"notes": [
{
"category": "general",
"text": "Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0212.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2816",
"url": "https://www.suse.com/security/cve/CVE-2022-2816"
},
{
"category": "external",
"summary": "SUSE Bug 1202421 for CVE-2022-2816",
"url": "https://bugzilla.suse.com/1202421"
},
{
"category": "external",
"summary": "SUSE Bug 1203576 for CVE-2022-2816",
"url": "https://bugzilla.suse.com/1203576"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2816"
},
{
"cve": "CVE-2022-2817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2817"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.0213.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2817",
"url": "https://www.suse.com/security/cve/CVE-2022-2817"
},
{
"category": "external",
"summary": "SUSE Bug 1202420 for CVE-2022-2817",
"url": "https://bugzilla.suse.com/1202420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2817"
},
{
"cve": "CVE-2022-2819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2819"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0211.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2819",
"url": "https://www.suse.com/security/cve/CVE-2022-2819"
},
{
"category": "external",
"summary": "SUSE Bug 1202414 for CVE-2022-2819",
"url": "https://bugzilla.suse.com/1202414"
},
{
"category": "external",
"summary": "SUSE Bug 1203576 for CVE-2022-2819",
"url": "https://bugzilla.suse.com/1203576"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2819"
},
{
"cve": "CVE-2022-2849",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2849"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2849",
"url": "https://www.suse.com/security/cve/CVE-2022-2849"
},
{
"category": "external",
"summary": "SUSE Bug 1202512 for CVE-2022-2849",
"url": "https://bugzilla.suse.com/1202512"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2849"
},
{
"cve": "CVE-2022-2862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2862"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.0221.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2862",
"url": "https://www.suse.com/security/cve/CVE-2022-2862"
},
{
"category": "external",
"summary": "SUSE Bug 1202511 for CVE-2022-2862",
"url": "https://bugzilla.suse.com/1202511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2862"
},
{
"cve": "CVE-2022-2874",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2874"
}
],
"notes": [
{
"category": "general",
"text": "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0224.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2874",
"url": "https://www.suse.com/security/cve/CVE-2022-2874"
},
{
"category": "external",
"summary": "SUSE Bug 1202552 for CVE-2022-2874",
"url": "https://bugzilla.suse.com/1202552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2874"
},
{
"cve": "CVE-2022-2889",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2889"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.0225.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2889",
"url": "https://www.suse.com/security/cve/CVE-2022-2889"
},
{
"category": "external",
"summary": "SUSE Bug 1202599 for CVE-2022-2889",
"url": "https://bugzilla.suse.com/1202599"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2889"
},
{
"cve": "CVE-2022-2923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2923"
}
],
"notes": [
{
"category": "general",
"text": "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2923",
"url": "https://www.suse.com/security/cve/CVE-2022-2923"
},
{
"category": "external",
"summary": "SUSE Bug 1202687 for CVE-2022-2923",
"url": "https://bugzilla.suse.com/1202687"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2923"
},
{
"cve": "CVE-2022-2946",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2946"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.0246.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2946",
"url": "https://www.suse.com/security/cve/CVE-2022-2946"
},
{
"category": "external",
"summary": "SUSE Bug 1202689 for CVE-2022-2946",
"url": "https://bugzilla.suse.com/1202689"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2946"
},
{
"cve": "CVE-2022-2980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2980"
}
],
"notes": [
{
"category": "general",
"text": "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2980",
"url": "https://www.suse.com/security/cve/CVE-2022-2980"
},
{
"category": "external",
"summary": "SUSE Bug 1203155 for CVE-2022-2980",
"url": "https://bugzilla.suse.com/1203155"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-2980"
},
{
"cve": "CVE-2022-2982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2982"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.0260.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2982",
"url": "https://www.suse.com/security/cve/CVE-2022-2982"
},
{
"category": "external",
"summary": "SUSE Bug 1203152 for CVE-2022-2982",
"url": "https://bugzilla.suse.com/1203152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-2982"
},
{
"cve": "CVE-2022-3016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3016"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.0286.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3016",
"url": "https://www.suse.com/security/cve/CVE-2022-3016"
},
{
"category": "external",
"summary": "SUSE Bug 1202862 for CVE-2022-3016",
"url": "https://bugzilla.suse.com/1202862"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-3016"
},
{
"cve": "CVE-2022-3037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3037"
}
],
"notes": [
{
"category": "general",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.0322.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3037",
"url": "https://www.suse.com/security/cve/CVE-2022-3037"
},
{
"category": "external",
"summary": "SUSE Bug 1202962 for CVE-2022-3037",
"url": "https://bugzilla.suse.com/1202962"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2022-3037"
},
{
"cve": "CVE-2022-3153",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-3153"
}
],
"notes": [
{
"category": "general",
"text": "NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-3153",
"url": "https://www.suse.com/security/cve/CVE-2022-3153"
},
{
"category": "external",
"summary": "SUSE Bug 1203272 for CVE-2022-3153",
"url": "https://bugzilla.suse.com/1203272"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:gvim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1.x86_64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.aarch64",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.ppc64le",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.s390x",
"openSUSE Tumbleweed:vim-small-9.0.0453-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2022-3153"
}
]
}
VDE-2022-046
Vulnerability from csaf_phoenixcontactgmbhcokg - Published: 2022-11-10 07:00 - Updated: 2025-05-22 13:03In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
BusyBox through 1.35.0 allows remote attackers to execute arbitrary code if netstat is used to print a DNS PTR record's value to a VT compatible terminal. Alternatively, the attacker could choose to change the terminal's colors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication plug-ins when more than one of them makes use of deferred authentication replies, which allows an external user to be granted access with only partially correct credentials.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
global heap buffer overflow in skip_range in GitHub repository vim/vim prior to 8.2.4763. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
Use After Free in GitHub repository vim/vim prior to 8.2.4979.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
In Expat (aka libexpat) before 2.4.5, an attacker can trigger stack exhaustion in build_model via a large nesting depth in the DTD element.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
The OPC autogenerated ANSI C stack stubs (in the NodeSets) do not handle all error cases. This can lead to a NULL pointer dereference.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
xmltok_impl.c in Expat (aka libexpat) before 2.4.5 lacks certain validation of encoding, such as checks for whether a UTF-8 character is valid in a certain context.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
xmlparse.c in Expat (aka libexpat) before 2.4.5 allows attackers to insert namespace-separator characters into namespace URIs.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
Use After Free in GitHub repository vim/vim prior to 8.2.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
A use of incorrectly resolved name vulnerability fixed in 7.83.1 might remove the wrong file when '--no-clobber' is used together with '--remove-on-error'.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
libcurl wrongly allows cookies to be set for Top Level Domains (TLDs) if thehost name is provided with a trailing dot.curl can be told to receive and send cookies. curl's "cookie engine" can bebuilt with or without [Public Suffix List](https://publicsuffix.org/)awareness. If PSL support not provided, a more rudimentary check exists to atleast prevent cookies from being set on TLDs. This check was broken if thehost name in the URL uses a trailing dot.This can allow arbitrary sites to set cookies that then would get sent to adifferent and unrelated site or domain.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
libcurl would reuse a previously created connection even when a TLS or SSHrelated option had been changed that should have prohibited reuse.libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse if one of them matches the setup. However, several TLS andSSH settings were left out from the configuration match checks, making themmatch too easily.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
An insufficiently protected credentials vulnerability exists in curl 4.9 to and include curl 7.82.0 are affected that could allow an attacker to extract credentials when follows HTTP(S) redirects is used with authentication could leak credentials to other services that exist on different protocols or port numbers.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
In Expat (aka libexpat) before 2.4.5, there is an integer overflow in copyString.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
In Expat (aka libexpat) before 2.4.5, there is an integer overflow in storeRawNames.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
Using its HSTS support, curl can be instructed to use HTTPS directly insteadof using an insecure clear-text HTTP step even when HTTP is provided in theURL. This mechanism could be bypassed if the host name in the given URL used atrailing dot while not using one when it built the HSTS cache. Or the otherway around - by having the trailing dot in the HSTS cache and *not* using thetrailing dot in the URL.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
The curl URL parser wrongly accepts percent-encoded URL separators like '/'when decoding the host name part of a URL, making it a *different* URL usingthe wrong host name when it is later retrieved.For example, a URL like 'http://example.com%2F127.0.0.1/', would be allowed bythe parser and get transposed into 'http://example.com/127.0.0.1/'. This flawcan be used to circumvent filters, checks and more.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
libcurl provides the 'CURLOPT_CERTINFO' option to allow applications torequest details to be returned about a server's certificate chain.Due to an erroneous function, a malicious server could make libcurl built withNSS get stuck in a never-ending busy-loop when trying to retrieve thatinformation.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
An information disclosure vulnerability exists in curl 7.65.0 to 7.82.0 are vulnerable that by using an IPv6 address that was in the connection pool but with a different zone id it could reuse a connection instead.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
curl < 7.84.0 supports "chained" HTTP compression algorithms, meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable "links" in this "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a "malloc bomb", makingcurl end up spending enormous amounts of allocated heap memory, or trying toand returning out of memory errors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
When curl < 7.84.0 does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
A malicious server can serve excessive amounts of 'Set-Cookie:' headers in a HTTP response to curl and curl < 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instead returns an error.This denial state might remain for as long as the same cookies are kept, match and haven't expired. Due to cookie matching rules, a server on 'foo.example.com' can set cookies that also would match for 'bar.example.com', making it it possible for a "sister server" to effectively cause a denial of service for a sibling site on the same second level domain using this method.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — | ||
| Unresolved product id: CSAFPID-32007 | — | ||
| Unresolved product id: CSAFPID-32008 | — | ||
| Unresolved product id: CSAFPID-32009 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — | ||
| Unresolved product id: CSAFPID-31007 | — | ||
| Unresolved product id: CSAFPID-31008 | — | ||
| Unresolved product id: CSAFPID-31009 | — |
cyrus-sasl (aka Cyrus SASL) 2.1.27 has an out-of-bounds write leading to unauthenticated remote denial-of-service in OpenLDAP via a malformed LDAP packet. The OpenLDAP crash is ultimately caused by an off-by-one error in _sasl_add_string in common.c in cyrus-sasl.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — |