Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> FreeBSD Local Security Checks >> FreeBSD : vim -- vulnerabilities in modeline handling: glob, expand (604)


Vulnerability Assessment Details

FreeBSD : vim -- vulnerabilities in modeline handling: glob, expand (604)

Vulnerability Assessment Summary
Check for vim+ruby

Detailed Explanation for this Vulnerability Assessment

The remote host is missing an update to the system

The following package is affected: vim+ruby

Solution : Update the package on the remote host
See also :


Networks Security ID: 14374

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Cisco ASA 5520 VPN Plus Appliance Firewall 2.5GB RAM/256MB FL,9.17OS,
$134.99
Cisco ASA 5520 VPN Plus Appliance Firewall 2.5GB RAM/256MB FL,9.17OS,  pictureCisco ASA 5500-X Series Next-Generation Firewalls (2 DVDs)
$6.99
Cisco ASA 5500-X Series Next-Generation Firewalls (2 DVDs) pictureCisco PIX 515E Firewall VPN-DES Unrestricted Unit 6.3
$299.0
Cisco PIX 515E Firewall VPN-DES Unrestricted Unit 6.3 pictureTorres Networks ISFM 7120 IP Service Flow Manager: WAN Traffic Shaping.
$119.0
Torres Networks ISFM 7120 IP Service Flow Manager: WAN Traffic Shaping. picture


Discussions

No Discussions have been posted on this vulnerability.