OVAL Definitions - Class: Patch Family: windows

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
MS10-050: Vulnerability in Windows Movie Maker Could Allow Remote Code Execution (981997) oval:gov.nist.fdcc.patch:def:11683 Patch windows
MS10-051: Vulnerability in Microsoft XML Core Services 3.0 Could Allow Remote Code Execution (2079403) oval:gov.nist.fdcc.patch:def:11684 Patch windows
MS10-051: Vulnerability in Microsoft XML Core Services 3.0 Could Allow Remote Code Execution (2079403) oval:gov.nist.USGCB.patch:def:11684 Patch windows
MS10-052: Vulnerability in Microsoft MPEG Layer-3 Codecs Could Allow Remote Code Execution (2115168) oval:gov.nist.fdcc.patch:def:11685 Patch windows
MS10-053: Cumulative Security Update for Internet Explorer (2183461) oval:gov.nist.USGCB.patch:def:11686 Patch windows
MS10-053: Cumulative Security Update for Internet Explorer (2183461) oval:gov.nist.fdcc.patch:def:11686 Patch windows
MS10-054: Vulnerabilities in SMB Server Could Allow Remote Code Execution (982214) oval:gov.nist.fdcc.patch:def:11687 Patch windows
MS10-054: Vulnerabilities in SMB Server Could Allow Remote Code Execution (982214) oval:gov.nist.USGCB.patch:def:11687 Patch windows
MS10-055: Vulnerability in Cinepak Codec Could Allow Remote Code Execution (982665) oval:gov.nist.fdcc.patch:def:11688 Patch windows
MS10-055: Vulnerability in Cinepak Codec Could Allow Remote Code Execution (982665) oval:gov.nist.USGCB.patch:def:11688 Patch windows
MS10-058: Vulnerabilities in TCP/IP Could Allow Elevation of Privilege (978886) oval:gov.nist.fdcc.patch:def:11689 Patch windows
MS10-058: Vulnerabilities in TCP/IP Could Allow Elevation of Privilege (978886) oval:gov.nist.USGCB.patch:def:11689 Patch windows
MS10-059: Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of Privilege (982799) oval:gov.nist.fdcc.patch:def:11690 Patch windows
MS10-059: Vulnerabilities in the Tracing Feature for Services Could Allow Elevation of Privilege (982799) oval:gov.nist.USGCB.patch:def:11690 Patch windows
MS10-060: Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote ... oval:gov.nist.fdcc.patch:def:11691 Patch windows
MS10-060: Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote ... oval:gov.nist.USGCB.patch:def:11691 Patch windows
MS10-061: Vulnerability in Print Spooler Service Could Allow Remote Code Execution (2347290) oval:gov.nist.fdcc.patch:def:11692 Patch windows
MS10-062: Vulnerability in MPEG-4 Codec Could Allow Remote Code Execution (975558) oval:gov.nist.fdcc.patch:def:11693 Patch windows
MS10-063: Vulnerability in Unicode Scripts Processor Could Allow Remote Code Execution (2320113) oval:gov.nist.fdcc.patch:def:11694 Patch windows
MS10-065: Vulnerabilities in Microsoft Internet Information Services (IIS) Could Allow Remote Code Execution (2267960) oval:gov.nist.fdcc.patch:def:11695 Patch windows
MS10-066: Vulnerability in Remote Procedure Call Could Allow Remote Code Execution (982802) oval:gov.nist.fdcc.patch:def:11696 Patch windows
MS10-067: Vulnerability in WordPad Text Converters Could Allow Remote Code Execution (2259922) oval:gov.nist.fdcc.patch:def:11697 Patch windows
MS10-068: Vulnerability in Local Security Authority Subsystem Service Could Allow Elevation of Privilege (983539) oval:gov.nist.fdcc.patch:def:11698 Patch windows
MS10-069: Vulnerability in Windows Client/Server Runtime Subsystem Could Allow Elevation of Privilege (2121546) oval:gov.nist.fdcc.patch:def:11699 Patch windows
MS10-070: Vulnerability in ASP.NET Could Allow Information Disclosure (2418042) oval:gov.nist.fdcc.patch:def:11700 Patch windows
MS10-071: Cumulative Security Update for Internet Explorer (2360131) oval:gov.nist.fdcc.patch:def:11701 Patch windows
MS10-073: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (981957) oval:gov.nist.fdcc.patch:def:11702 Patch windows
MS10-074: Vulnerability in Microsoft Foundation Classes Could Allow Remote Code Execution (2387149) oval:gov.nist.fdcc.patch:def:11703 Patch windows
MS10-075: Vulnerability in Media Player Network Sharing Service Could Cause Remote Code Execution (2281679) oval:gov.nist.fdcc.patch:def:11704 Patch windows
MS10-076: Vulnerability in the Embedded OpenType Font Engine Could Allow Remote Code Execution (982132) oval:gov.nist.fdcc.patch:def:11705 Patch windows
Total number of results : 357
Page : 1 2 3 4 5 6 7 8 9 (This Page) 10 11 12

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html