This page was not yet optimized for use on mobile devices.
CVE-2022-1942
Data ?
Vulnerability ID | CVE-2022-1942 |
---|---|
Published on | 31.05.2022 14:15 |
Severity | HIGH |
Vulnerable configurations ?
-
cpe:2.3:a:vim:vim:-:*:*:*:*:*:*:*,
cpe:2.3:a:vim:vim:5.6:*:*:*:*:*:*:*,
cpe:2.3:a:vim:vim:6.1:*:*:*:*:*:*:*,
cpe:2.3:a:vim:vim:6.3:*:*:*:*:*:*:*,
cpe:2.3:a:vim:vim:6.4:*:*:*:*:*:*:*,
cpe:2.3:a:vim:vim:7:*:*:*:*:*:*:*,
cpe:2.3:a:vim:vim:7.0:*:*:*:*:*:*:*,
cpe:2.3:a:vim:vim:7.0.001:*:*:*:*:*:*:*,
cpe:2.3:a:vim:vim:7.0.002:*:*:*:*:*:*:*,
cpe:2.3:a:vim:vim:7.0.003:*:*:*:*:*:*:*,
…
Vulnerable certificates ?
The CVE was matched to the following certificates. This means the vulnerability likely affects said certified devices. However, this is an automated process that may have false positives and negatives.
Common Criteria certificates Display network
- Strong Customer Authentication pour Apple Pay sur Mac mini avec M1 et Magic keyboard avec Touch ID, exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258))
- Apple macOS 11 Big Sur: Contacts
- Apple FileVault 2 on T2 systems running macOS Catalina 10.15
- macOS Catalina 10.15
- Strong Customer Authentication pour Apple Pay, sur MacBook Air 2020 avec M1 exécutant macOS Big Sur 11.3.1
- Strong Customer Authentication pour Apple Pay sur MacBook Air 2020 avec M1 exécutant macOS Monterey 12.3.1 (Version 12.3.1 (build 21E258))