OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
Clipboard Format Atom Name Handling Vulnerability (CVE-2012-1866) oval:org.mitre.oval:def:15096 Vulnerability windows
Command Injection Vulnerability - MS12-048 oval:org.mitre.oval:def:14897 Vulnerability windows
CSRSS Local EOP SrvWriteConsoleOutput Vulnerability oval:org.mitre.oval:def:12734 Vulnerability windows
CSRSS Local EOP SrvSetConsoleLocalEUDC Vulnerability oval:org.mitre.oval:def:12402 Vulnerability windows
CSRSS Local EOP AllocConsole Vulnerability oval:org.mitre.oval:def:12602 Vulnerability windows
CSRSS Memory Corruption Vulnerability - MS13-033 oval:org.mitre.oval:def:16260 Vulnerability windows
DirectPlay Heap Overflow Vulnerability - MS12-082 oval:org.mitre.oval:def:16086 Vulnerability windows
Font Library File Buffer Overrun Vulnerability oval:org.mitre.oval:def:13103 Vulnerability windows
Font Resource Refcount Integer Overflow Vulnerability (CVE-2012-1867) oval:org.mitre.oval:def:15510 Vulnerability windows
GDI Access Violation Vulnerability oval:org.mitre.oval:def:14603 Vulnerability windows
Internet Explorer Use After Free Vulnerability - CVE-2013-1304 (MS13-028) oval:org.mitre.oval:def:16515 Vulnerability windows
Internet Explorer Use After Free Vulnerability - CVE-2013-1303 (MS13-028) oval:org.mitre.oval:def:16662 Vulnerability windows
Kernel Race Condition Vulnerability - CVE-2013-1284 (MS13-031) oval:org.mitre.oval:def:16455 Vulnerability windows
Keyboard Layout Use After Free Vulnerability oval:org.mitre.oval:def:14928 Vulnerability windows
Keyboard Layout Vulnerability - MS12-047 oval:org.mitre.oval:def:15416 Vulnerability windows
Microsoft SSL Version 3 and TLS Protocol Security Feature Bypass Vulnerability - MS13-006 oval:org.mitre.oval:def:16273 Vulnerability windows
OpenType Font Parsing Vulnerability - MS12-078 oval:org.mitre.oval:def:16067 Vulnerability windows
PostMessage Function Vulnerability oval:org.mitre.oval:def:14217 Vulnerability windows
Revoked Certificate Bypass Vulnerability - MS12-083 oval:org.mitre.oval:def:16117 Vulnerability windows
SSL and TLS Protocols Vulnerability oval:org.mitre.oval:def:14752 Vulnerability windows
String Atom Class Name Handling Vulnerability (CVE-2012-1864) oval:org.mitre.oval:def:15496 Vulnerability windows
String Atom Class Name Handling Vulnerability (CVE-2012-1865) oval:org.mitre.oval:def:15649 Vulnerability windows
TLS Protocol Vulnerability - MS12-049 oval:org.mitre.oval:def:15644 Vulnerability windows
TrueType Font Parsing Vulnerability - MS12-078 oval:org.mitre.oval:def:15845 Vulnerability windows
TrueType Font Parsing Vulnerability oval:org.mitre.oval:def:14133 Vulnerability windows
Vulnerability in TrueType Font Parsing Could Allow Elevation of Privilege oval:org.mitre.oval:def:13998 Vulnerability windows
Vulnerability in SharePoint could allow information disclosure - MS13-030 oval:org.mitre.oval:def:15758 Vulnerability windows
Win32k Improper Message Handling Vulnerability - MS13-005 oval:org.mitre.oval:def:16326 Vulnerability windows
Win32k Incorrect Type Handling Vulnerability - MS12-047 oval:org.mitre.oval:def:15654 Vulnerability windows
Win32k Null Pointer De-reference Vulnerability oval:org.mitre.oval:def:12935 Vulnerability windows
Total number of results : 81
Page : 1 (This Page) 2 3

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html