OVAL Definitions - Class: Vulnerability Family: unix

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
Integer overflow in the JavaScript engine in Firefox before 1.0.7 and Mozilla Suite before 1.7.12 might allow remote att... oval:org.mitre.oval:def:10367 Vulnerability unix
Integer overflow in the CIDAFM function in X.Org 6.8.2 and XFree86 X server allows local users to execute arbitrary code... oval:org.mitre.oval:def:10305 Vulnerability unix
Integer overflow in the JBIG2 decoding feature in Poppler before 0.10.6 allows remote attackers to cause a denial of ser... oval:org.mitre.oval:def:10292 Vulnerability unix
Integer overflow in the WriteProlog function in texttops in CUPS before 1.3.9 allows remote attackers to execute arbitra... oval:org.mitre.oval:def:10266 Vulnerability unix
Integer overflow in player.c in libwmf 0.2.8.4, as used in multiple products including (1) wv, (2) abiword, (3) freetype... oval:org.mitre.oval:def:10262 Vulnerability unix
Integer overflow in OpenOffice.org before 2.4 allows remote attackers to cause a denial of service (crash) and possibly ... oval:org.mitre.oval:def:10249 Vulnerability unix
Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authenticated users to ca... oval:org.mitre.oval:def:10236 Vulnerability unix
Integer overflow in Gaim before 0.82 allows remote attackers to cause a denial of service and possibly execute arbitrary... oval:org.mitre.oval:def:10220 Vulnerability unix
Integer overflow in Qt 3.3 before 3.3.7, 4.1 before 4.1.5, and 4.2 before 4.2.1, as used in the KDE khtml library, kdeli... oval:org.mitre.oval:def:10218 Vulnerability unix
Integer overflow in the XPMReader::ReadXPM function in filter.vcl/ixpm/svt_xpmread.cxx in OpenOffice.org (OOo) before 3.... oval:org.mitre.oval:def:10176 Vulnerability unix
Integer overflow in the get_fdb_entries function in net/bridge/br_ioctl.c in the Linux kernel before 2.6.18.4 allows loc... oval:org.mitre.oval:def:10151 Vulnerability unix
Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-... oval:org.mitre.oval:def:10137 Vulnerability unix
Integer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earl... oval:org.mitre.oval:def:10124 Vulnerability unix
Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Updat... oval:org.mitre.oval:def:10073 Vulnerability unix
Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbit... oval:org.mitre.oval:def:10058 Vulnerability unix
Integer overflow in Mozilla Firefox and Thunderbird 1.x before 1.5.0.2 and 1.0.x before 1.0.8, Mozilla Suite before 1.7.... oval:org.mitre.oval:def:10055 Vulnerability unix
Integer overflow in dvips in TeX Live 2009 and earlier, and teTeX, allows remote attackers to cause a denial of service ... oval:org.mitre.oval:def:10052 Vulnerability unix
Integer overflow in the DCTStream::reset method in xpdf/Stream.cc in Xpdf 3.02p11 allows remote attackers to execute arb... oval:org.mitre.oval:def:10036 Vulnerability unix
Integer overflow in the xmlBufferResize function in libxml2 2.7.2 allows context-dependent attackers to cause a denial o... oval:org.mitre.oval:def:10025 Vulnerability unix
Integer overflow in the "Max-dotdot" CVS protocol command oval:org.mitre.oval:def:1001 Vulnerability unix
Integer signedness error in the DNP3 dissector in Wireshark (formerly Ethereal) 0.10.12 to 0.99.6 allows remote attacker... oval:org.mitre.oval:def:9841 Vulnerability unix
Integer signedness error in the xrealloc function (rdesktop.c) in RDesktop 1.5.0 allows remote attackers to execute arbi... oval:org.mitre.oval:def:9800 Vulnerability unix
Integer signedness error in the zlib extension module in Python 2.5.2 and earlier allows remote attackers to execute arb... oval:org.mitre.oval:def:9407 Vulnerability unix
Integer signedness error in the NE2000 emulator in QEMU 0.8.2, as used in Xen and possibly other products, allows local ... oval:org.mitre.oval:def:9302 Vulnerability unix
Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) oval:org.mitre.oval:def:5726 Vulnerability unix
Integer Signedness Error in PINE oval:org.mitre.oval:def:503 Vulnerability unix
Integer signedness error in the _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in libgnutls in GnuTLS bef... oval:org.mitre.oval:def:11393 Vulnerability unix
Integer signedness error in truetype/ttgload.c in Freetype 2.3.4 and earlier might allow remote attackers to execute arb... oval:org.mitre.oval:def:11325 Vulnerability unix
Integer signedness error in the gssrpc__svcauth_unix function in svc_auth_unix.c in the RPC library in MIT Kerberos 5 (k... oval:org.mitre.oval:def:11277 Vulnerability unix
Integer signedness error in the cmsAllocGamma function in src/cmsgamma.c in Little cms color engine (aka lcms) before 1.... oval:org.mitre.oval:def:10685 Vulnerability unix
Total number of results : 9137
Page : 1 11 21 31 41 51 61 71 81 91 101 111 121 131 141 151 161 171 181 191 196 197 198 199 200 201 202 203 204 205 (This Page) 206 207 208 209 210 211 212 213 214 215 216 221 231 241 251 261 271 281 291 301

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html