OVAL Definitions - Class: Vulnerability Family: windows

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
The hyphenation functionality in Google Chrome before 24.0.1312.52 does not properly validate file names oval:org.mitre.oval:def:15746 Vulnerability windows
The HZ-GB-2312 character-set implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird... oval:org.mitre.oval:def:16955 Vulnerability windows
The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x... oval:org.mitre.oval:def:19193 Vulnerability windows
The image decoder in WebKit before r52833, as used in Google Chrome before 4.0.249.78, does not properly handle a failur... oval:org.mitre.oval:def:14079 Vulnerability windows
The image-codec implementation in the PDF functionality in Google Chrome before 20.0.1132.43 does not initialize an unsp... oval:org.mitre.oval:def:15455 Vulnerability windows
The implementation of Content Security Policy (CSP) violation reports in Mozilla Firefox 4.x through 5, SeaMonkey 2.x be... oval:org.mitre.oval:def:14458 Vulnerability windows
The implementation of digital signatures for JAR files in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, and p... oval:org.mitre.oval:def:14055 Vulnerability windows
The IndexedDB implementation in Google Chrome before 25.0.1364.152 allows remote attackers to cause a denial of service ... oval:org.mitre.oval:def:16653 Vulnerability windows
The Install component in IBM DB2 UDB 9.5 before FP6a on Linux, UNIX, and Windows enforces an unintended limit on passwor... oval:org.mitre.oval:def:14764 Vulnerability windows
The installer in Adobe Reader 9.x before 9.5.1 and 10.x before 10.1.3 allows attackers to bypass intended access restric... oval:org.mitre.oval:def:15270 Vulnerability windows
The Inter-process Communication (IPC) implementation in Google Chrome before 18.0.1025.168 does not properly validate me... oval:org.mitre.oval:def:14964 Vulnerability windows
The International Components for Unicode (ICU) functionality in Google Chrome before 13.0.782.107 allows remote attacker... oval:org.mitre.oval:def:14179 Vulnerability windows
The internationalization (aka i18n) functionality in Google V8, as used in Google Chrome before 16.0.912.63, allows remo... oval:org.mitre.oval:def:14840 Vulnerability windows
The Internationalized Domain Name (IDN) display algorithm in Mozilla Firefox before 22.0 does not properly handle the .c... oval:org.mitre.oval:def:17296 Vulnerability windows
The IonMonkey JavaScript engine in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21, when... oval:org.mitre.oval:def:18902 Vulnerability windows
The IPC implementation in Google Chrome before 22.0.1229.79 allows attackers to obtain potentially sensitive information... oval:org.mitre.oval:def:15484 Vulnerability windows
The IPC layer in Google Chrome before 24.0.1312.52 on Windows omits a NUL character required for termination of an unspe... oval:org.mitre.oval:def:15907 Vulnerability windows
The irc_msg_who function in msgs.c in the IRC protocol plugin in libpurple 2.8.0 through 2.9.0 in Pidgin before 2.10.0 d... oval:org.mitre.oval:def:18005 Vulnerability windows
The IsCSSWordSpacingSpace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16... oval:org.mitre.oval:def:16808 Vulnerability windows
The Isolated Sites feature in Google Chrome before 26.0.1410.43 does not properly enforce the use of separate processes oval:org.mitre.oval:def:16670 Vulnerability windows
The iTunes ActiveX control in Apple iTunes before 11.1 allows remote attackers to execute arbitrary code or cause a deni... oval:org.mitre.oval:def:18997 Vulnerability windows
The JavaScript implementation in Mozilla Firefox 3.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, a... oval:org.mitre.oval:def:13962 Vulnerability windows
The JavaScript implementation in Google Chrome 4 does not properly restrict the set of values contained in the object re... oval:org.mitre.oval:def:13767 Vulnerability windows
The JavaScript implementation in Adobe Reader and Acrobat 9.x before 9.5.1 and 10.x before 10.1.3 allows attackers to ex... oval:org.mitre.oval:def:15477 Vulnerability windows
The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird ... oval:org.mitre.oval:def:18694 Vulnerability windows
The JavaScript implementation in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and... oval:org.mitre.oval:def:20800 Vulnerability windows
The JNLPClassLoader class in IcedTea-Web before 1.0.1, as used in OpenJDK Runtime Environment 1.6.0, allows remote attac... oval:org.mitre.oval:def:14117 Vulnerability windows
The JSSubScriptLoader in Mozilla Firefox 4.x through 6 and SeaMonkey before 2.4 does not properly handle XPCNativeWrappe... oval:org.mitre.oval:def:14121 Vulnerability windows
The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWr... oval:org.mitre.oval:def:13550 Vulnerability windows
The layout engine in Mozilla Firefox before 4.0, Thunderbird before 3.3, and SeaMonkey before 2.1 executes different cod... oval:org.mitre.oval:def:14456 Vulnerability windows
Total number of results : 7592
Page : 1 11 21 31 41 51 61 71 81 91 101 111 121 131 141 151 155 156 157 158 159 160 161 162 163 164 (This Page) 165 166 167 168 169 170 171 172 173 174 175 181 191 201 211 221 231 241 251

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html