OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
Buffer Overflow Vulnerability - MS13-024 oval:org.mitre.oval:def:16414 Vulnerability windows
Callback Function Vulnerability - MS13-024 oval:org.mitre.oval:def:16596 Vulnerability windows
Directory traversal vulnerability in Google Chrome before 25.0.1364.152 via vectors related to databases oval:org.mitre.oval:def:16377 Vulnerability windows
Double dereference vulnerability in Microsoft Silverlight - MS13-022 (Mac OS X) oval:org.mitre.oval:def:16565 Vulnerability macos
Double dereference vulnerability in Microsoft Silverlight - MS13-022 oval:org.mitre.oval:def:16516 Vulnerability windows
epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before ... oval:org.mitre.oval:def:16593 Vulnerability windows
Google Chrome before 25.0.1364.152 does not properly manage bindings of extension processes oval:org.mitre.oval:def:16369 Vulnerability windows
Google Chrome before 25.0.1364.152 does not properly manage the interaction between the browser process and renderer pro... oval:org.mitre.oval:def:16574 Vulnerability windows
Integer signedness error in the dissect_mount_dirpath_call function in epan/dissectors/packet-mount.c in the Mount disse... oval:org.mitre.oval:def:16420 Vulnerability windows
Internet Explorer onBeforeCopy Use After Free Vulnerability - MS13-021 oval:org.mitre.oval:def:16239 Vulnerability windows
Internet Explorer OnResize Use After Free Vulnerability - MS13-021 oval:org.mitre.oval:def:16583 Vulnerability windows
Internet Explorer CMarkupBehaviorContext Use After Free Vulnerability - MS13-021 oval:org.mitre.oval:def:16587 Vulnerability windows
Internet Explorer GetMarkupPtr Use After Free Vulnerability - MS13-021 oval:org.mitre.oval:def:16324 Vulnerability windows
Internet Explorer saveHistory Use After Free Vulnerability - MS13-021 oval:org.mitre.oval:def:16386 Vulnerability windows
Internet Explorer removeChild Use After Free Vulnerability - MS13-021 oval:org.mitre.oval:def:16634 Vulnerability windows
Internet Explorer CCaret Use After Free Vulnerability - MS13-021 oval:org.mitre.oval:def:16049 Vulnerability windows
Internet Explorer CElement Use After Free Vulnerability - MS13-021 oval:org.mitre.oval:def:16526 Vulnerability windows
Internet Explorer CTreeNode Use After Free Vulnerability - MS13-021 oval:org.mitre.oval:def:16095 Vulnerability windows
Microsoft kernel-mode drivers privilege elevation vulnerability (CVE-2013-1286) - MS13-027 oval:org.mitre.oval:def:16591 Vulnerability windows
Microsoft kernel-mode drivers privilege elevation vulnerability (CVE-2013-1285) - MS13-027 oval:org.mitre.oval:def:16441 Vulnerability windows
Microsoft kernel-mode drivers privilege elevation vulnerability (CVE-2013-1287) - MS13-027 oval:org.mitre.oval:def:16498 Vulnerability windows
Race condition in Google Chrome before 25.0.1364.152 via vectors related to the handling of media threads oval:org.mitre.oval:def:16633 Vulnerability windows
SharePoint Directory Traversal Vulnerability - MS13-024 oval:org.mitre.oval:def:16445 Vulnerability windows
The acn_add_dmp_data function in epan/dissectors/packet-acn.c in the ACN dissector in Wireshark 1.6.x before 1.6.14 and ... oval:org.mitre.oval:def:16411 Vulnerability windows
The AMPQ dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of ... oval:org.mitre.oval:def:16677 Vulnerability windows
The CIMD dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of ... oval:org.mitre.oval:def:16469 Vulnerability windows
The CSN.1 dissector in Wireshark 1.8.x before 1.8.6 does not properly manage function pointers, which allows remote atta... oval:org.mitre.oval:def:16589 Vulnerability windows
The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RE... oval:org.mitre.oval:def:16109 Vulnerability windows
The dissect_hartip function in epan/dissectors/packet-hartip.c in the HART/IP dissector in Wireshark 1.8.x before 1.8.6 ... oval:org.mitre.oval:def:15838 Vulnerability windows
The dissect_mpls_echo_tlv_dd_map function in epan/dissectors/packet-mpls-echo.c in the MPLS Echo dissector in Wireshark ... oval:org.mitre.oval:def:16376 Vulnerability windows
Total number of results : 44
Page : 1 (This Page) 2

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html