<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">gvim-9.0.0453-2.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:12337-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">gvim-9.0.0453-2.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the gvim-9.0.0453-2.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-12337</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-46059/</URL>
      <Description>SUSE CVE CVE-2021-46059 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0213/</URL>
      <Description>SUSE CVE CVE-2022-0213 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0261/</URL>
      <Description>SUSE CVE CVE-2022-0261 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0318/</URL>
      <Description>SUSE CVE CVE-2022-0318 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0319/</URL>
      <Description>SUSE CVE CVE-2022-0319 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0351/</URL>
      <Description>SUSE CVE CVE-2022-0351 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0359/</URL>
      <Description>SUSE CVE CVE-2022-0359 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0361/</URL>
      <Description>SUSE CVE CVE-2022-0361 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0368/</URL>
      <Description>SUSE CVE CVE-2022-0368 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0392/</URL>
      <Description>SUSE CVE CVE-2022-0392 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0407/</URL>
      <Description>SUSE CVE CVE-2022-0407 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0408/</URL>
      <Description>SUSE CVE CVE-2022-0408 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0413/</URL>
      <Description>SUSE CVE CVE-2022-0413 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0554/</URL>
      <Description>SUSE CVE CVE-2022-0554 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0572/</URL>
      <Description>SUSE CVE CVE-2022-0572 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0629/</URL>
      <Description>SUSE CVE CVE-2022-0629 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0685/</URL>
      <Description>SUSE CVE CVE-2022-0685 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0729/</URL>
      <Description>SUSE CVE CVE-2022-0729 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-0943/</URL>
      <Description>SUSE CVE CVE-2022-0943 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1154/</URL>
      <Description>SUSE CVE CVE-2022-1154 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1160/</URL>
      <Description>SUSE CVE CVE-2022-1160 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1420/</URL>
      <Description>SUSE CVE CVE-2022-1420 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1616/</URL>
      <Description>SUSE CVE CVE-2022-1616 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1619/</URL>
      <Description>SUSE CVE CVE-2022-1619 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1620/</URL>
      <Description>SUSE CVE CVE-2022-1620 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1621/</URL>
      <Description>SUSE CVE CVE-2022-1621 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1629/</URL>
      <Description>SUSE CVE CVE-2022-1629 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1674/</URL>
      <Description>SUSE CVE CVE-2022-1674 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1720/</URL>
      <Description>SUSE CVE CVE-2022-1720 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1733/</URL>
      <Description>SUSE CVE CVE-2022-1733 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1735/</URL>
      <Description>SUSE CVE CVE-2022-1735 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1769/</URL>
      <Description>SUSE CVE CVE-2022-1769 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1771/</URL>
      <Description>SUSE CVE CVE-2022-1771 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1785/</URL>
      <Description>SUSE CVE CVE-2022-1785 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1796/</URL>
      <Description>SUSE CVE CVE-2022-1796 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1851/</URL>
      <Description>SUSE CVE CVE-2022-1851 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1886/</URL>
      <Description>SUSE CVE CVE-2022-1886 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1897/</URL>
      <Description>SUSE CVE CVE-2022-1897 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1898/</URL>
      <Description>SUSE CVE CVE-2022-1898 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1927/</URL>
      <Description>SUSE CVE CVE-2022-1927 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1942/</URL>
      <Description>SUSE CVE CVE-2022-1942 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-1968/</URL>
      <Description>SUSE CVE CVE-2022-1968 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2000/</URL>
      <Description>SUSE CVE CVE-2022-2000 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2042/</URL>
      <Description>SUSE CVE CVE-2022-2042 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2124/</URL>
      <Description>SUSE CVE CVE-2022-2124 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2125/</URL>
      <Description>SUSE CVE CVE-2022-2125 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2126/</URL>
      <Description>SUSE CVE CVE-2022-2126 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2129/</URL>
      <Description>SUSE CVE CVE-2022-2129 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2175/</URL>
      <Description>SUSE CVE CVE-2022-2175 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2182/</URL>
      <Description>SUSE CVE CVE-2022-2182 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2183/</URL>
      <Description>SUSE CVE CVE-2022-2183 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2206/</URL>
      <Description>SUSE CVE CVE-2022-2206 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2207/</URL>
      <Description>SUSE CVE CVE-2022-2207 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2208/</URL>
      <Description>SUSE CVE CVE-2022-2208 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2210/</URL>
      <Description>SUSE CVE CVE-2022-2210 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2231/</URL>
      <Description>SUSE CVE CVE-2022-2231 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2264/</URL>
      <Description>SUSE CVE CVE-2022-2264 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2284/</URL>
      <Description>SUSE CVE CVE-2022-2284 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2286/</URL>
      <Description>SUSE CVE CVE-2022-2286 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2287/</URL>
      <Description>SUSE CVE CVE-2022-2287 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2288/</URL>
      <Description>SUSE CVE CVE-2022-2288 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2289/</URL>
      <Description>SUSE CVE CVE-2022-2289 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2304/</URL>
      <Description>SUSE CVE CVE-2022-2304 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2343/</URL>
      <Description>SUSE CVE CVE-2022-2343 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2344/</URL>
      <Description>SUSE CVE CVE-2022-2344 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2345/</URL>
      <Description>SUSE CVE CVE-2022-2345 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2571/</URL>
      <Description>SUSE CVE CVE-2022-2571 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2580/</URL>
      <Description>SUSE CVE CVE-2022-2580 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2581/</URL>
      <Description>SUSE CVE CVE-2022-2581 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2598/</URL>
      <Description>SUSE CVE CVE-2022-2598 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2816/</URL>
      <Description>SUSE CVE CVE-2022-2816 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2817/</URL>
      <Description>SUSE CVE CVE-2022-2817 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2819/</URL>
      <Description>SUSE CVE CVE-2022-2819 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2849/</URL>
      <Description>SUSE CVE CVE-2022-2849 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2862/</URL>
      <Description>SUSE CVE CVE-2022-2862 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2874/</URL>
      <Description>SUSE CVE CVE-2022-2874 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2889/</URL>
      <Description>SUSE CVE CVE-2022-2889 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2923/</URL>
      <Description>SUSE CVE CVE-2022-2923 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2946/</URL>
      <Description>SUSE CVE CVE-2022-2946 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2980/</URL>
      <Description>SUSE CVE CVE-2022-2980 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2982/</URL>
      <Description>SUSE CVE CVE-2022-2982 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3016/</URL>
      <Description>SUSE CVE CVE-2022-3016 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3037/</URL>
      <Description>SUSE CVE CVE-2022-3037 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-3153/</URL>
      <Description>SUSE CVE CVE-2022-3153 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="gvim-9.0.0453-2.1">
      <FullProductName ProductID="gvim-9.0.0453-2.1">gvim-9.0.0453-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vim-9.0.0453-2.1">
      <FullProductName ProductID="vim-9.0.0453-2.1">vim-9.0.0453-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vim-data-9.0.0453-2.1">
      <FullProductName ProductID="vim-data-9.0.0453-2.1">vim-data-9.0.0453-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vim-data-common-9.0.0453-2.1">
      <FullProductName ProductID="vim-data-common-9.0.0453-2.1">vim-data-common-9.0.0453-2.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vim-small-9.0.0453-2.1">
      <FullProductName ProductID="vim-small-9.0.0453-2.1">vim-small-9.0.0453-2.1</FullProductName>
    </Branch>
    <Relationship ProductReference="gvim-9.0.0453-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:gvim-9.0.0453-2.1">gvim-9.0.0453-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-9.0.0453-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:vim-9.0.0453-2.1">vim-9.0.0453-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-data-9.0.0453-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:vim-data-9.0.0453-2.1">vim-data-9.0.0453-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-data-common-9.0.0453-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1">vim-data-common-9.0.0453-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-small-9.0.0453-2.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:vim-small-9.0.0453-2.1">vim-small-9.0.0453-2.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.</Note>
    </Notes>
    <CVE>CVE-2021-46059</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-46059.html</URL>
        <Description>CVE-2021-46059</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194556</URL>
        <Description>SUSE Bug 1194556</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">vim is vulnerable to Heap-based Buffer Overflow</Note>
    </Notes>
    <CVE>CVE-2022-0213</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0213.html</URL>
        <Description>CVE-2022-0213</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194885</URL>
        <Description>SUSE Bug 1194885</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-0261</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0261.html</URL>
        <Description>CVE-2022-0261</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194872</URL>
        <Description>SUSE Bug 1194872</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-0318</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0318.html</URL>
        <Description>CVE-2022-0318</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195004</URL>
        <Description>SUSE Bug 1195004</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Read in vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-0319</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0319.html</URL>
        <Description>CVE-2022-0319</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195066</URL>
        <Description>SUSE Bug 1195066</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-0351</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0351.html</URL>
        <Description>CVE-2022-0351</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195126</URL>
        <Description>SUSE Bug 1195126</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-0359</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0359.html</URL>
        <Description>CVE-2022-0359</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195203</URL>
        <Description>SUSE Bug 1195203</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-0361</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0361.html</URL>
        <Description>CVE-2022-0361</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195202</URL>
        <Description>SUSE Bug 1195202</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-0368</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0368.html</URL>
        <Description>CVE-2022-0368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195205</URL>
        <Description>SUSE Bug 1195205</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-0392</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0392.html</URL>
        <Description>CVE-2022-0392</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195332</URL>
        <Description>SUSE Bug 1195332</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-0407</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0407.html</URL>
        <Description>CVE-2022-0407</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195354</URL>
        <Description>SUSE Bug 1195354</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208308</URL>
        <Description>SUSE Bug 1208308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208649</URL>
        <Description>SUSE Bug 1208649</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208651</URL>
        <Description>SUSE Bug 1208651</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-0408</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0408.html</URL>
        <Description>CVE-2022-0408</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195459</URL>
        <Description>SUSE Bug 1195459</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use After Free in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-0413</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0413.html</URL>
        <Description>CVE-2022-0413</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195356</URL>
        <Description>SUSE Bug 1195356</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208308</URL>
        <Description>SUSE Bug 1208308</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208651</URL>
        <Description>SUSE Bug 1208651</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-0554</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0554.html</URL>
        <Description>CVE-2022-0554</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1195846</URL>
        <Description>SUSE Bug 1195846</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-0572</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0572.html</URL>
        <Description>CVE-2022-0572</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196023</URL>
        <Description>SUSE Bug 1196023</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-0629</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0629.html</URL>
        <Description>CVE-2022-0629</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196226</URL>
        <Description>SUSE Bug 1196226</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.</Note>
    </Notes>
    <CVE>CVE-2022-0685</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0685.html</URL>
        <Description>CVE-2022-0685</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196227</URL>
        <Description>SUSE Bug 1196227</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.</Note>
    </Notes>
    <CVE>CVE-2022-0729</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.5</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0729.html</URL>
        <Description>CVE-2022-0729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196437</URL>
        <Description>SUSE Bug 1196437</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.</Note>
    </Notes>
    <CVE>CVE-2022-0943</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-0943.html</URL>
        <Description>CVE-2022-0943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1197225</URL>
        <Description>SUSE Bug 1197225</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.</Note>
    </Notes>
    <CVE>CVE-2022-1154</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1154.html</URL>
        <Description>CVE-2022-1154</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1197813</URL>
        <Description>SUSE Bug 1197813</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">heap buffer overflow in get_one_sourceline in GitHub repository vim/vim prior to 8.2.4647.</Note>
    </Notes>
    <CVE>CVE-2022-1160</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1160.html</URL>
        <Description>CVE-2022-1160</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1197814</URL>
        <Description>SUSE Bug 1197814</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.</Note>
    </Notes>
    <CVE>CVE-2022-1420</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1420.html</URL>
        <Description>CVE-2022-1420</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1198748</URL>
        <Description>SUSE Bug 1198748</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution</Note>
    </Notes>
    <CVE>CVE-2022-1616</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1616.html</URL>
        <Description>CVE-2022-1616</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199331</URL>
        <Description>SUSE Bug 1199331</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution</Note>
    </Notes>
    <CVE>CVE-2022-1619</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1619.html</URL>
        <Description>CVE-2022-1619</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199333</URL>
        <Description>SUSE Bug 1199333</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.</Note>
    </Notes>
    <CVE>CVE-2022-1620</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1620.html</URL>
        <Description>CVE-2022-1620</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199334</URL>
        <Description>SUSE Bug 1199334</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution</Note>
    </Notes>
    <CVE>CVE-2022-1621</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1621.html</URL>
        <Description>CVE-2022-1621</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199435</URL>
        <Description>SUSE Bug 1199435</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution</Note>
    </Notes>
    <CVE>CVE-2022-1629</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1629.html</URL>
        <Description>CVE-2022-1629</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199436</URL>
        <Description>SUSE Bug 1199436</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input.</Note>
    </Notes>
    <CVE>CVE-2022-1674</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1674.html</URL>
        <Description>CVE-2022-1674</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199502</URL>
        <Description>SUSE Bug 1199502</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.</Note>
    </Notes>
    <CVE>CVE-2022-1720</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1720.html</URL>
        <Description>CVE-2022-1720</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200732</URL>
        <Description>SUSE Bug 1200732</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.</Note>
    </Notes>
    <CVE>CVE-2022-1733</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1733.html</URL>
        <Description>CVE-2022-1733</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199655</URL>
        <Description>SUSE Bug 1199655</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.</Note>
    </Notes>
    <CVE>CVE-2022-1735</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1735.html</URL>
        <Description>CVE-2022-1735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199651</URL>
        <Description>SUSE Bug 1199651</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974.</Note>
    </Notes>
    <CVE>CVE-2022-1769</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1769.html</URL>
        <Description>CVE-2022-1769</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199658</URL>
        <Description>SUSE Bug 1199658</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.</Note>
    </Notes>
    <CVE>CVE-2022-1771</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1771.html</URL>
        <Description>CVE-2022-1771</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199693</URL>
        <Description>SUSE Bug 1199693</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.</Note>
    </Notes>
    <CVE>CVE-2022-1785</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1785.html</URL>
        <Description>CVE-2022-1785</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199745</URL>
        <Description>SUSE Bug 1199745</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use After Free in GitHub repository vim/vim prior to 8.2.4979.</Note>
    </Notes>
    <CVE>CVE-2022-1796</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1796.html</URL>
        <Description>CVE-2022-1796</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199747</URL>
        <Description>SUSE Bug 1199747</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-1851</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1851.html</URL>
        <Description>CVE-2022-1851</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199936</URL>
        <Description>SUSE Bug 1199936</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-1886</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1886.html</URL>
        <Description>CVE-2022-1886</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1199969</URL>
        <Description>SUSE Bug 1199969</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-1897</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1897.html</URL>
        <Description>CVE-2022-1897</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200010</URL>
        <Description>SUSE Bug 1200010</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use After Free in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-1898</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1898.html</URL>
        <Description>CVE-2022-1898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200011</URL>
        <Description>SUSE Bug 1200011</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer Over-read in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-1927</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1927.html</URL>
        <Description>CVE-2022-1927</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200012</URL>
        <Description>SUSE Bug 1200012</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-1942</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1942.html</URL>
        <Description>CVE-2022-1942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200125</URL>
        <Description>SUSE Bug 1200125</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use After Free in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-1968</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-1968.html</URL>
        <Description>CVE-2022-1968</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200270</URL>
        <Description>SUSE Bug 1200270</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-2000</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2000.html</URL>
        <Description>CVE-2022-2000</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200405</URL>
        <Description>SUSE Bug 1200405</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use After Free in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-2042</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2042.html</URL>
        <Description>CVE-2022-2042</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200471</URL>
        <Description>SUSE Bug 1200471</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer Over-read in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-2124</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2124.html</URL>
        <Description>CVE-2022-2124</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200697</URL>
        <Description>SUSE Bug 1200697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-2125</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2125.html</URL>
        <Description>CVE-2022-2125</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200698</URL>
        <Description>SUSE Bug 1200698</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205395</URL>
        <Description>SUSE Bug 1205395</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-2126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2126.html</URL>
        <Description>CVE-2022-2126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200700</URL>
        <Description>SUSE Bug 1200700</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-2129</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2129.html</URL>
        <Description>CVE-2022-2129</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200701</URL>
        <Description>SUSE Bug 1200701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer Over-read in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-2175</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2175.html</URL>
        <Description>CVE-2022-2175</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200904</URL>
        <Description>SUSE Bug 1200904</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-2182</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2182.html</URL>
        <Description>CVE-2022-2182</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200903</URL>
        <Description>SUSE Bug 1200903</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-2183</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2183.html</URL>
        <Description>CVE-2022-2183</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1200902</URL>
        <Description>SUSE Bug 1200902</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-2206</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2206.html</URL>
        <Description>CVE-2022-2206</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201155</URL>
        <Description>SUSE Bug 1201155</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-2207</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2207.html</URL>
        <Description>CVE-2022-2207</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201153</URL>
        <Description>SUSE Bug 1201153</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.</Note>
    </Notes>
    <CVE>CVE-2022-2208</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2208.html</URL>
        <Description>CVE-2022-2208</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201152</URL>
        <Description>SUSE Bug 1201152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-2210</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2210.html</URL>
        <Description>CVE-2022-2210</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201151</URL>
        <Description>SUSE Bug 1201151</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.</Note>
    </Notes>
    <CVE>CVE-2022-2231</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2231.html</URL>
        <Description>CVE-2022-2231</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201150</URL>
        <Description>SUSE Bug 1201150</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.</Note>
    </Notes>
    <CVE>CVE-2022-2264</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2264.html</URL>
        <Description>CVE-2022-2264</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201132</URL>
        <Description>SUSE Bug 1201132</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.</Note>
    </Notes>
    <CVE>CVE-2022-2284</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2284.html</URL>
        <Description>CVE-2022-2284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201133</URL>
        <Description>SUSE Bug 1201133</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.</Note>
    </Notes>
    <CVE>CVE-2022-2286</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2286.html</URL>
        <Description>CVE-2022-2286</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201135</URL>
        <Description>SUSE Bug 1201135</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.</Note>
    </Notes>
    <CVE>CVE-2022-2287</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2287.html</URL>
        <Description>CVE-2022-2287</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201136</URL>
        <Description>SUSE Bug 1201136</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.</Note>
    </Notes>
    <CVE>CVE-2022-2288</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2288.html</URL>
        <Description>CVE-2022-2288</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201137</URL>
        <Description>SUSE Bug 1201137</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use After Free in GitHub repository vim/vim prior to 9.0.</Note>
    </Notes>
    <CVE>CVE-2022-2289</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2289.html</URL>
        <Description>CVE-2022-2289</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201139</URL>
        <Description>SUSE Bug 1201139</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.</Note>
    </Notes>
    <CVE>CVE-2022-2304</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2304.html</URL>
        <Description>CVE-2022-2304</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201249</URL>
        <Description>SUSE Bug 1201249</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.</Note>
    </Notes>
    <CVE>CVE-2022-2343</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2343.html</URL>
        <Description>CVE-2022-2343</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201356</URL>
        <Description>SUSE Bug 1201356</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.</Note>
    </Notes>
    <CVE>CVE-2022-2344</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2344.html</URL>
        <Description>CVE-2022-2344</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201359</URL>
        <Description>SUSE Bug 1201359</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use After Free in GitHub repository vim/vim prior to 9.0.0046.</Note>
    </Notes>
    <CVE>CVE-2022-2345</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2345.html</URL>
        <Description>CVE-2022-2345</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1201363</URL>
        <Description>SUSE Bug 1201363</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0101.</Note>
    </Notes>
    <CVE>CVE-2022-2571</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2571.html</URL>
        <Description>CVE-2022-2571</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202046</URL>
        <Description>SUSE Bug 1202046</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0102.</Note>
    </Notes>
    <CVE>CVE-2022-2580</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2580.html</URL>
        <Description>CVE-2022-2580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202049</URL>
        <Description>SUSE Bug 1202049</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104.</Note>
    </Notes>
    <CVE>CVE-2022-2581</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2581.html</URL>
        <Description>CVE-2022-2581</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202050</URL>
        <Description>SUSE Bug 1202050</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Write to API in GitHub repository vim/vim prior to 9.0.0100.

</Note>
    </Notes>
    <CVE>CVE-2022-2598</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2598.html</URL>
        <Description>CVE-2022-2598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202051</URL>
        <Description>SUSE Bug 1202051</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0212.</Note>
    </Notes>
    <CVE>CVE-2022-2816</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2816.html</URL>
        <Description>CVE-2022-2816</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202421</URL>
        <Description>SUSE Bug 1202421</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203576</URL>
        <Description>SUSE Bug 1203576</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use After Free in GitHub repository vim/vim prior to 9.0.0213.</Note>
    </Notes>
    <CVE>CVE-2022-2817</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2817.html</URL>
        <Description>CVE-2022-2817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202420</URL>
        <Description>SUSE Bug 1202420</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0211.</Note>
    </Notes>
    <CVE>CVE-2022-2819</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2819.html</URL>
        <Description>CVE-2022-2819</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202414</URL>
        <Description>SUSE Bug 1202414</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203576</URL>
        <Description>SUSE Bug 1203576</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.</Note>
    </Notes>
    <CVE>CVE-2022-2849</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2849.html</URL>
        <Description>CVE-2022-2849</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202512</URL>
        <Description>SUSE Bug 1202512</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use After Free in GitHub repository vim/vim prior to 9.0.0221.</Note>
    </Notes>
    <CVE>CVE-2022-2862</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2862.html</URL>
        <Description>CVE-2022-2862</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202511</URL>
        <Description>SUSE Bug 1202511</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="76">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0224.</Note>
    </Notes>
    <CVE>CVE-2022-2874</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2874.html</URL>
        <Description>CVE-2022-2874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202552</URL>
        <Description>SUSE Bug 1202552</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="77">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use After Free in GitHub repository vim/vim prior to 9.0.0225.</Note>
    </Notes>
    <CVE>CVE-2022-2889</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2889.html</URL>
        <Description>CVE-2022-2889</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202599</URL>
        <Description>SUSE Bug 1202599</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="78">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.</Note>
    </Notes>
    <CVE>CVE-2022-2923</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2923.html</URL>
        <Description>CVE-2022-2923</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202687</URL>
        <Description>SUSE Bug 1202687</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="79">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use After Free in GitHub repository vim/vim prior to 9.0.0246.</Note>
    </Notes>
    <CVE>CVE-2022-2946</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2946.html</URL>
        <Description>CVE-2022-2946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202689</URL>
        <Description>SUSE Bug 1202689</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="80">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.</Note>
    </Notes>
    <CVE>CVE-2022-2980</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2980.html</URL>
        <Description>CVE-2022-2980</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203155</URL>
        <Description>SUSE Bug 1203155</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="81">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use After Free in GitHub repository vim/vim prior to 9.0.0260.</Note>
    </Notes>
    <CVE>CVE-2022-2982</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2982.html</URL>
        <Description>CVE-2022-2982</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203152</URL>
        <Description>SUSE Bug 1203152</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="82">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use After Free in GitHub repository vim/vim prior to 9.0.0286.</Note>
    </Notes>
    <CVE>CVE-2022-3016</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3016.html</URL>
        <Description>CVE-2022-3016</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202862</URL>
        <Description>SUSE Bug 1202862</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="83">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use After Free in GitHub repository vim/vim prior to 9.0.0322.</Note>
    </Notes>
    <CVE>CVE-2022-3037</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3037.html</URL>
        <Description>CVE-2022-3037</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202962</URL>
        <Description>SUSE Bug 1202962</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="84">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.</Note>
    </Notes>
    <CVE>CVE-2022-3153</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:gvim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-data-common-9.0.0453-2.1</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-small-9.0.0453-2.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-3153.html</URL>
        <Description>CVE-2022-3153</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203272</URL>
        <Description>SUSE Bug 1203272</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
