![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2022-4141 |
Description: | Heap based buffer overflow in vim/vim 9.0.0946 and below by allowing an attacker to CTRL-W gf in the expression used in the RHS of the substitute command. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.822999 1.3.6.1.4.1.25623.1.1.10.2022.0464 1.3.6.1.4.1.25623.1.0.822986 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-4141 https://huntr.dev/bounties/20ece512-c600-45ac-8a84-d0931e05541f https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AZ3JMSUCR6Y7626RDWQ2HNSUFIQOJ33G/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6ZNKVN4GICORTVFKVCM4MSOXCYWNHUC/ https://security.gentoo.org/glsa/202305-16 https://github.com/vim/vim/commit/cc762a48d42b579fb7bdec2c614636b830342dd5 https://github.com/vim/vim/commit/cc762a48d42b579fb7bdec2c614636b830342dd5 https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html |