OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
Animated Cursor Denial of Service (NT 4.0) oval:org.mitre.oval:def:712 Vulnerability windows
Animated Cursor Denial of Service (NT 4.0 Terminal Server) oval:org.mitre.oval:def:3957 Vulnerability windows
DCOM RPC Object Identity Windows NT Vulnerability oval:org.mitre.oval:def:1041 Vulnerability windows
Default Permissions on RAS Administration Key oval:org.mitre.oval:def:500 Vulnerability windows
Default Registry Permissions on SNMP Parameters oval:org.mitre.oval:def:139 Vulnerability windows
Default Registry Permissions on the MTS Package Admin Key oval:org.mitre.oval:def:140 Vulnerability windows
DHCP Server Logging Vulnerability (NT 4.0) oval:org.mitre.oval:def:2280 Vulnerability windows
DHCP Server Logging Vulnerability (Terminal Server) oval:org.mitre.oval:def:4282 Vulnerability windows
Flaw in Windows WM_TIMER Message Handling Could Enable Privilege Elevation oval:org.mitre.oval:def:681 Vulnerability windows
IIS4.0 Redirect Function Buffer Overflow oval:org.mitre.oval:def:2204 Vulnerability windows
Integer Overflows in Windows NT DirectX MIDI Library (QUARTZ.DLL) oval:org.mitre.oval:def:218 Vulnerability windows
License Logging Service Vulnerability (Windows NT) oval:org.mitre.oval:def:4786 Vulnerability windows
License Logging Service Vulnerability (Terminal Server) oval:org.mitre.oval:def:644 Vulnerability windows
LoadImage Cursor and Icon Format Handling Vulnerability (Terminal Server) oval:org.mitre.oval:def:3097 Vulnerability windows
LoadImage Cursor and Icon Format Handling Vulnerability (NT 4.0) oval:org.mitre.oval:def:3355 Vulnerability windows
Microsoft Certificate Validation Flaw Identity Spoofing Vulnerability (Variant) oval:org.mitre.oval:def:1059 Vulnerability windows
MS CIFS Spoofed Browse Frame Request Vulnerability oval:org.mitre.oval:def:1079 Vulnerability windows
MS FrontPage Server Extensions SmartHTML Denial of Service (Test 2) oval:org.mitre.oval:def:591 Vulnerability windows
MS FrontPage Server Extensions Chunked Encoded Request Buffer Overflow (Test 4) oval:org.mitre.oval:def:699 Vulnerability windows
NT4.0 Remote Registry Access Authentication Vulnerability oval:org.mitre.oval:def:1021 Vulnerability windows
RPC Runtime Library Denial of Service and Information Disclosure Vulnerability (NT 4.0 Terminal Server Edition) oval:org.mitre.oval:def:5277 Vulnerability windows
RPC Runtime Library Denial of Service and Information Disclosure Vulnerability (NT 4.0) oval:org.mitre.oval:def:2505 Vulnerability windows
Security Vulnerability in Solaris 10 OpenSSL SSL_get_shared_ciphers() Function oval:org.mitre.oval:def:5337 Vulnerability unix
Security Vulnerability in the Solaris X Server May Lead to Unauthorized Disclosure of Information on Access Restricted F... oval:org.mitre.oval:def:5393 Vulnerability unix
Security Vulnerability in Simplified Chinese, Traditional Chinese, Korean, and Thai Language Input Methods oval:org.mitre.oval:def:5545 Vulnerability unix
Security Vulnerability in the libxml2 Library May Lead to a Denial of Service (DoS) oval:org.mitre.oval:def:5216 Vulnerability unix
SNMP Request Handling Buffer Overflow oval:org.mitre.oval:def:402 Vulnerability windows
Windows Kernel LPC Privilege Escalation Vulnerability (NT Terminal Server) oval:org.mitre.oval:def:4021 Vulnerability windows
Windows Kernel LPC Privilege Escalation Vulnerability (NT 4.0) oval:org.mitre.oval:def:1321 Vulnerability windows
Windows NT ASN.1 Library Integer Overflow Vulnerabilities oval:org.mitre.oval:def:796 Vulnerability windows
Total number of results : 60
Page : 1 (This Page) 2

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html