OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
A Buffer Overflow Security Vulnerability in the Solaris sadmind(1M) Daemon May Lead to Execution of Arbitrary Code oval:org.mitre.oval:def:5543 Vulnerability unix
A Security Vulnerability in the Solaris 10 inetd(1M) Service May Lead to a Denial of Service (DoS) Condition oval:org.mitre.oval:def:2032 Vulnerability unix
A Security Vulnerability in the USB Mouse STREAMS Module May Lead to a System Panic oval:org.mitre.oval:def:5474 Vulnerability unix
ActionScript 3 (AS3) in Adobe Flash Player 9.0.47.0, and other versions and other 9.0.124.0 and earlier versions, allows... oval:org.mitre.oval:def:11874 Vulnerability unix
Adobe Acrobat Reader Plugin before 8.0.0 for the Firefox, Internet Explorer, and Opera web browsers allows remote attack... oval:org.mitre.oval:def:10042 Vulnerability unix
Adobe Flash Player 9.x up to 9.0.48.0, 8.x up to 8.0.35.0, and 7.x up to 7.0.70.0 allows remote attackers to modify HTTP... oval:org.mitre.oval:def:9546 Vulnerability unix
Adobe Flash Player 9.x up to 9.0.48.0, 8.x up to 8.0.35.0, and 7.x up to 7.0.70.0, when running on Linux, uses insecure ... oval:org.mitre.oval:def:10519 Vulnerability unix
Adobe Flash Player 9.x up to 9.0.48.0, 8.x up to 8.0.35.0, and 7.x up to 7.0.70.0 does not sufficiently restrict the int... oval:org.mitre.oval:def:11069 Vulnerability unix
Adobe Reader and Acrobat 7.0.8 and earlier allows user-assisted remote attackers to execute code via a crafted PDF file ... oval:org.mitre.oval:def:11698 Vulnerability unix
Adobe Reader and Acrobat 8.1.1 and earlier allows remote attackers to execute arbitrary code via a crafted PDF file that... oval:org.mitre.oval:def:9928 Vulnerability unix
Apache 2 Denial of Service due to Memory Leak in mod_ssl oval:org.mitre.oval:def:876 Vulnerability unix
Apache IPv6 Socket Failure Denial of Service oval:org.mitre.oval:def:183 Vulnerability unix
Apache Linefeed Allocation Vulnerability oval:org.mitre.oval:def:156 Vulnerability unix
Apache prefork MPM Denial of Service oval:org.mitre.oval:def:173 Vulnerability unix
Apache Terminal Escape Sequence Vulnerability II oval:org.mitre.oval:def:151 Vulnerability unix
Apache Terminal Escape Sequence Vulnerability oval:org.mitre.oval:def:150 Vulnerability unix
Apache Weak Cipher Suite Vulnerability oval:org.mitre.oval:def:169 Vulnerability unix
BO in Samba call_trans2open Function oval:org.mitre.oval:def:567 Vulnerability unix
Buffer overflow in Java Web Start in Sun JDK and JRE 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.... oval:org.mitre.oval:def:9582 Vulnerability unix
Buffer overflow in Sun JDK and Java Runtime Environment (JRE) 5.0 Update 9 and earlier, SDK and JRE 1.4.2_12 and earlier... oval:org.mitre.oval:def:11073 Vulnerability unix
cachefsd DoS via Invalid RPC Request oval:org.mitre.oval:def:4329 Vulnerability unix
Common Unix Printing System Partial Print DOS oval:org.mitre.oval:def:6 Vulnerability unix
CRLF injection vulnerability in Adobe Flash Player plugin 9.0.16 and earlier for Windows, 7.0.63 and earlier for Linux, ... oval:org.mitre.oval:def:11405 Vulnerability unix
Denial of Service Vulnerability in Postfix Parser Code oval:org.mitre.oval:def:544 Vulnerability unix
Denial of Service in Sendmail via the enhdnsbl Feature oval:org.mitre.oval:def:597 Vulnerability unix
Directory traversal vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update ... oval:org.mitre.oval:def:11102 Vulnerability unix
Double free vulnerability in the Adobe Acrobat Reader Plugin before 8.0.0, as used in Mozilla Firefox 1.5.0.7, allows re... oval:org.mitre.oval:def:9684 Vulnerability unix
FreeRADIUS Ascend-Send-Secret Server Crash oval:org.mitre.oval:def:1347 Vulnerability unix
Heap-based buffer overflow in RealNetworks RealPlayer 8, 10, 10.1, and possibly 10.5; RealOne Player 1 and 2; and RealPl... oval:org.mitre.oval:def:11625 Vulnerability unix
Heap-based Buffer Overflow Vulnerability in the Solaris 8 and 9 sadmind(1M) Daemon May Lead to Arbitrary Code Execution oval:org.mitre.oval:def:5347 Vulnerability unix
Total number of results : 169
Page : 1 (This Page) 2 3 4 5 6

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html