OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
Apache 2 Denial of Service due to Memory Leak in mod_ssl oval:org.mitre.oval:def:876 Vulnerability unix
DEPRECATED: Windows Script Engine Heap Overflow (Test 3) oval:org.mitre.oval:def:795 Vulnerability windows
DEPRECATED: Windows Script Engine Heap Overflow (Test 2) oval:org.mitre.oval:def:794 Vulnerability windows
Ethereal Malformed SMB Packet Vulnerability oval:org.mitre.oval:def:856 Vulnerability unix
Ethereal Malformed Q.931 Packet Vulnerability oval:org.mitre.oval:def:857 Vulnerability unix
Gaim / Ultramagnetic BO Vulnerabilities oval:org.mitre.oval:def:818 Vulnerability unix
Gaim / Ultramagnetic Extract Info Field Function BO oval:org.mitre.oval:def:819 Vulnerability unix
Gaim / Ultramagnetic directIM Packet Vulnerability oval:org.mitre.oval:def:820 Vulnerability unix
Konqueror Cookie Access Restrictions Bypass Vulnerability oval:org.mitre.oval:def:823 Vulnerability unix
Linux Kernel eflags Checking Privilege Escalation Vulnerability oval:org.mitre.oval:def:868 Vulnerability unix
Mailman Cross-site Scripting Vulnerability oval:org.mitre.oval:def:813 Vulnerability unix
Mailman Cross-site Scripting Vulnerability II oval:org.mitre.oval:def:815 Vulnerability unix
Midnight Commander vfs_s_resolve_symlink BO oval:org.mitre.oval:def:822 Vulnerability unix
mod_python Web Server Denial of Service oval:org.mitre.oval:def:839 Vulnerability unix
mod_python Web Server Denial of Service oval:org.mitre.oval:def:828 Vulnerability unix
MS Outlook Argument Injection Local Vulnerability oval:org.mitre.oval:def:843 Vulnerability windows
MS Windows Media Service Denial of Service oval:org.mitre.oval:def:842 Vulnerability windows
MSN Messenger Remote File Access Vulnerability oval:org.mitre.oval:def:844 Vulnerability windows
Net-SNMP MIB Information Disclosure Vulnerability oval:org.mitre.oval:def:869 Vulnerability unix
Red Hat CVS Server root Directory Access Vulnerability oval:org.mitre.oval:def:855 Vulnerability unix
Red Hat Enterprise 3 OpenSSL Kerberos Handshake Vulnerability oval:org.mitre.oval:def:928 Vulnerability unix
Red Hat Enterprise 3 sysstat port and trigger Scripts symlink Attack Vulnerability oval:org.mitre.oval:def:862 Vulnerability unix
Red Hat Enterprise 3 Multiple stack-based BO Vulnerabilities in Apache oval:org.mitre.oval:def:864 Vulnerability unix
Red Hat Enterprise 3 tcpdump Denial of Service via print_attr_string Function oval:org.mitre.oval:def:853 Vulnerability unix
Red Hat Enterprise 3 kdepim VCF File Information Reader BO oval:org.mitre.oval:def:865 Vulnerability unix
Red Hat Enterprise 3 CVS Server root Directory Access Vulnerability oval:org.mitre.oval:def:866 Vulnerability unix
Red Hat Enterprise 3 Linux Kernel do_mremap Privilege Escalation Vulnerability oval:org.mitre.oval:def:825 Vulnerability unix
Red Hat Enterprise 3 Linux Kernel do_mremap Denial of Service Vulnerability oval:org.mitre.oval:def:867 Vulnerability unix
Red Hat Enterprise 3 Mutt BO in Index Menu oval:org.mitre.oval:def:838 Vulnerability unix
Red Hat Enterprise 3 netpbm File Overwrite Vulnerability oval:org.mitre.oval:def:810 Vulnerability unix
Total number of results : 67
Page : 1 (This Page) 2 3

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html