Количество 10
Количество 10
CVE-2023-48236
Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit `73b2d379` which has been included in release version 9.0.2111. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2023-48236
Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit `73b2d379` which has been included in release version 9.0.2111. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2023-48236
Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit `73b2d379` which has been included in release version 9.0.2111. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2023-48236
overflow in get_number in vim
CVE-2023-48236
Vim is an open source command line text editor. When using the z= comm ...
BDU:2024-02417
Уязвимость функции get_number() текстового редактора vim, позволяющая нарушителю вызвать отказ в обслуживании
ROS-20240329-01
Множественные уязвимости VIM
SUSE-SU-2024:1287-1
Security update for vim
SUSE-SU-2024:0871-1
Security update for vim
SUSE-SU-2024:0783-1
Security update for vim
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-48236 Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit `73b2d379` which has been included in release version 9.0.2111. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 2.8 | 0% Низкий | около 2 лет назад | |
CVE-2023-48236 Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit `73b2d379` which has been included in release version 9.0.2111. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 4.3 | 0% Низкий | около 2 лет назад | |
CVE-2023-48236 Vim is an open source command line text editor. When using the z= command, the user may overflow the count with values larger than MAX_INT. Impact is low, user interaction is required and a crash may not even happen in all situations. This vulnerability has been addressed in commit `73b2d379` which has been included in release version 9.0.2111. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 2.8 | 0% Низкий | около 2 лет назад | |
CVE-2023-48236 overflow in get_number in vim | CVSS3: 4.3 | 0% Низкий | около 2 лет назад | |
CVE-2023-48236 Vim is an open source command line text editor. When using the z= comm ... | CVSS3: 2.8 | 0% Низкий | около 2 лет назад | |
BDU:2024-02417 Уязвимость функции get_number() текстового редактора vim, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 4.3 | 0% Низкий | около 2 лет назад | |
ROS-20240329-01 Множественные уязвимости VIM | CVSS3: 4.3 | больше 1 года назад | ||
SUSE-SU-2024:1287-1 Security update for vim | больше 1 года назад | |||
SUSE-SU-2024:0871-1 Security update for vim | больше 1 года назад | |||
SUSE-SU-2024:0783-1 Security update for vim | больше 1 года назад |
Уязвимостей на страницу