OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
Adobe Reader and Acrobat before 9.5, and 10.x before 10.1.2, on Windows and Mac OS X allow attackers to execute arbitrar... oval:org.mitre.oval:def:14615 Vulnerability windows
Adobe Reader and Acrobat before 9.5, and 10.x before 10.1.2, on Windows and Mac OS X allow attackers to execute arbitrar... oval:org.mitre.oval:def:14801 Vulnerability windows
Adobe Reader and Acrobat before 9.5, and 10.x before 10.1.2, on Windows and Mac OS X allow attackers to execute arbitrar... oval:org.mitre.oval:def:14809 Vulnerability windows
Adobe Reader and Acrobat before 9.5, and 10.x before 10.1.2, on Windows and Mac OS X allow attackers to execute arbitrar... oval:org.mitre.oval:def:14857 Vulnerability windows
AntiXSS Library Bypass Vulnerability oval:org.mitre.oval:def:14314 Vulnerability windows
Array index error in VLC media player 0.9.2 oval:org.mitre.oval:def:14726 Vulnerability windows
Assembly Execution Vulnerability oval:org.mitre.oval:def:14197 Vulnerability windows
Buffer overflow in VideoLAN VLC media player 1.0.5 oval:org.mitre.oval:def:14532 Vulnerability windows
CSRSS Elevation of Privilege Vulnerability oval:org.mitre.oval:def:14879 Vulnerability windows
Denial of service vulnerability in VLC before 0.8.6f oval:org.mitre.oval:def:14445 Vulnerability windows
DEPRECATED: Untrusted search path vulnerability in VideoLAN VLC before 0.9.0 oval:org.mitre.oval:def:14769 Vulnerability windows
DirectShow Remote Code Execution Vulnerability oval:org.mitre.oval:def:14832 Vulnerability windows
Format string vulnerability in the httpd_FileCallBack function (network/httpd.c) in VideoLAN VLC 0.8.6d oval:org.mitre.oval:def:14790 Vulnerability windows
Heap-based buffer overflow in the libaccess_realrtsp plugin in VideoLAN VLC Media Player 0.8.6d and earlier on Windows oval:org.mitre.oval:def:14597 Vulnerability windows
Heap-based buffer overflow in modules/access/rtsp/real_sdpplin.c in the Xine library, as used in VideoLAN VLC Media Play... oval:org.mitre.oval:def:14776 Vulnerability windows
Heap-based buffer overflow in libxml2, as used in Google Chrome before 16.0.912.75, allows remote attackers to cause a d... oval:org.mitre.oval:def:14504 Vulnerability windows
Heap-based buffer overflow in the tree builder in Google Chrome before 16.0.912.77 allows remote attackers to cause a de... oval:org.mitre.oval:def:14552 Vulnerability windows
Heap-based buffer overflow in the MP4_ReadBox_skcr function in libmp4.c in the MP4 demultiplexer in VideoLAN VLC media p... oval:org.mitre.oval:def:14741 Vulnerability windows
Heap-based buffer overflow in the DemuxAudioSipr function in real.c in the RealMedia demuxer in VideoLAN VLC media playe... oval:org.mitre.oval:def:14851 Vulnerability windows
Heap-based buffer overflow in the AVI_ChunkRead_strf function in libavi.c in the AVI demuxer in VideoLAN VLC media playe... oval:org.mitre.oval:def:14858 Vulnerability windows
HP-UX Apache Running Tomcat Servlet Engine, Remote Information Disclosure, Authentication Bypass, Cross-Site Scripting (... oval:org.mitre.oval:def:14743 Vulnerability unix
HP-UX Apache Running Tomcat Servlet Engine, Remote Information Disclosure, Authentication Bypass, Cross-Site Scripting (... oval:org.mitre.oval:def:14945 Vulnerability unix
HP-UX Apache Running Tomcat Servlet Engine, Remote Information Disclosure, Authentication Bypass, Cross-Site Scripting (... oval:org.mitre.oval:def:13969 Vulnerability unix
HP-UX Apache Running Tomcat Servlet Engine, Remote Information Disclosure, Authentication Bypass, Cross-Site Scripting (... oval:org.mitre.oval:def:14573 Vulnerability unix
HP-UX Apache Running Tomcat Servlet Engine, Remote Information Disclosure, Authentication Bypass, Cross-Site Scripting (... oval:org.mitre.oval:def:14589 Vulnerability unix
HP-UX Apache Running Tomcat Servlet Engine, Remote Information Disclosure, Authentication Bypass, Cross-Site Scripting (... oval:org.mitre.oval:def:14931 Vulnerability unix
HP-UX Apache Running Tomcat Servlet Engine, Remote Information Disclosure, Authentication Bypass, Cross-Site Scripting (... oval:org.mitre.oval:def:14933 Vulnerability unix
HP-UX Apache Web Server, Remote Denial of Service (DoS) oval:org.mitre.oval:def:14941 Vulnerability unix
HP-UX Apache Web Server, Remote Denial of Service (DoS) oval:org.mitre.oval:def:14762 Vulnerability unix
HP-UX Apache Web Server, Remote Denial of Service (DoS) oval:org.mitre.oval:def:14804 Vulnerability unix
Total number of results : 93
Page : 1 (This Page) 2 3 4

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html