OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
AIX NFSv4 Kerberos vulnerability oval:org.mitre.oval:def:6318 Vulnerability unix
AIX NFSv4 nfs_portmon vulnerability oval:org.mitre.oval:def:6366 Vulnerability unix
Avaya Solaris BIND "EVP_VerifyFinal()" Signature Spoofing Vulnerability oval:org.mitre.oval:def:5569 Vulnerability unix
Element position: Style Change Vulnerability oval:org.mitre.oval:def:1514 Vulnerability windows
Harmoni Versions Prior to 1.6.0 Cross-Site Request Forgery and Security Bypass Vulnerabilities oval:org.mitre.oval:def:6427 Vulnerability unix
Libpng Library Uninitialized Pointer Arrays Memory Corruption Vulnerability oval:org.mitre.oval:def:6458 Vulnerability unix
Memory Corruption in Indexing Service Vulnerability oval:org.mitre.oval:def:6042 Vulnerability windows
mimeTeX and mathTeX Buffer Overflow and Command Injection Issues oval:org.mitre.oval:def:6275 Vulnerability unix
Mozilla "AnyName" Entrainment and Access Control Hazard oval:org.mitre.oval:def:1625 Vulnerability windows
Mozilla Crashes with Evidence of Memory Corruption (CVE-2006-1530) oval:org.mitre.oval:def:1903 Vulnerability windows
Mozilla Crashes with Evidence of Memory Corruption (CVE-2006-1529) oval:org.mitre.oval:def:1947 Vulnerability windows
Mozilla Crashes with Evidence of Memory Corruption (CVE-2006-1531) oval:org.mitre.oval:def:2023 Vulnerability windows
Mozilla Crashes with Evidence of Memory Corruption (CVE-2006-1723) oval:org.mitre.oval:def:1574 Vulnerability windows
Mozilla Deleted Object Reference When designMode="on" oval:org.mitre.oval:def:1790 Vulnerability windows
Mozilla File Stealing by Changing Input Type oval:org.mitre.oval:def:1929 Vulnerability windows
Mozilla Firefox History File Buffer Overflow oval:org.mitre.oval:def:1619 Vulnerability windows
Mozilla Integer overflows in E4X, SVG, and Canvas Features oval:org.mitre.oval:def:1339 Vulnerability windows
Mozilla JavaScript Garbage-Collection Hazards in jsfun.c oval:org.mitre.oval:def:1494 Vulnerability windows
Mozilla JavaScript Garbage-Collection Hazards in jsinterp.c oval:org.mitre.oval:def:670 Vulnerability windows
Mozilla QueryInterface Memory Corruption Vulnerability oval:org.mitre.oval:def:1562 Vulnerability windows
Mozilla Spoofing with Translucent Windows oval:org.mitre.oval:def:1471 Vulnerability windows
Mozilla XML Attribute Name Validation Vulnerability oval:org.mitre.oval:def:1493 Vulnerability windows
Mozilla XML Parser Read Beyond Buffer Bug oval:org.mitre.oval:def:677 Vulnerability windows
OpenSSL DSA and ECDSA "EVP_VerifyFinal()" Spoofing Vulnerability oval:org.mitre.oval:def:6380 Vulnerability unix
SMBv2 Command Value Vulnerability oval:org.mitre.oval:def:6336 Vulnerability windows
SMBv2 Infinite Loop Vulnerability oval:org.mitre.oval:def:5595 Vulnerability windows
SMBv2 Negotiation Vulnerability oval:org.mitre.oval:def:6489 Vulnerability windows
Vim 'mch_expand_wildcards()' Heap Based Buffer Overflow Vulnerability oval:org.mitre.oval:def:5987 Vulnerability unix
Vim Flaw in Quoting Vim Script Lets Remote Users Cause Arbitrary Commands to Be Executed in Certain Cases oval:org.mitre.oval:def:6238 Vulnerability unix
Vim HelpTags Command Remote Format String Vulnerability oval:org.mitre.oval:def:6463 Vulnerability unix
Total number of results : 44
Page : 1 (This Page) 2

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html