OVAL Definitions - Class: Vulnerability Family: unix

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
kcheckpass in KDE 3.2.0 up to 3.4.2 allows local users to gain root access via a symlink attack on lock files. oval:org.mitre.oval:def:9388 Vulnerability unix
KCMS KCS_OPEN_PROFILE File Disclosure Vulnerability oval:org.mitre.oval:def:2592 Vulnerability unix
KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attacker... oval:org.mitre.oval:def:9496 Vulnerability unix
KDE before 3.3.0 does not properly handle when certain symbolic links point to "stale" locations, which could allow loca... oval:org.mitre.oval:def:9334 Vulnerability unix
KDE Display Manager (KDM) in KDE 3.2.0 up to 3.5.3 allows local users to read arbitrary files via a symlink attack relat... oval:org.mitre.oval:def:9844 Vulnerability unix
KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar by calling setInterval with a small interval an... oval:org.mitre.oval:def:9879 Vulnerability unix
KDE Konqueror Userid/Password Disclosure Vulnerability oval:org.mitre.oval:def:411 Vulnerability unix
kdesktop_lock in kdebase before 3.1.3-5.11 for KDE in Red Hat Enterprise Linux (RHEL) 3 does not properly terminate, whi... oval:org.mitre.oval:def:10535 Vulnerability unix
KDM pam_setcred Privilege Escalation Vulnerability oval:org.mitre.oval:def:193 Vulnerability unix
KDM Weak Cookie Vulnerability oval:org.mitre.oval:def:215 Vulnerability unix
Kerberos 5 ASN.1 Library DoS oval:org.mitre.oval:def:2139 Vulnerability unix
Kerberos 5 Double-free Vulnerability in krb5_rd_cred Function oval:org.mitre.oval:def:3322 Vulnerability unix
Kerberos 5 KDC ASN.1 Error Handling Double-free Vulnerabilities oval:org.mitre.oval:def:4936 Vulnerability unix
Kerberos 5 KDC Buffer Underrun in Principle Name Handling oval:org.mitre.oval:def:4430 Vulnerability unix
Kerberos 5 KDC Heap Corruption Vulnerability oval:org.mitre.oval:def:2536 Vulnerability unix
Kerberos ASN.1 GeneralizedTime Decoder Bug Lets Remote Users Execute Arbitrary Code oval:org.mitre.oval:def:5483 Vulnerability unix
Kerberos Client Plaintext Password Vulnerability oval:org.mitre.oval:def:2065 Vulnerability unix
Kerberos Command Execution Vulnerability rexec Daemon oval:org.mitre.oval:def:1580 Vulnerability unix
Kerberos GSS-API SPNEGO Null Pointer Dereference and Invalid Memory Access Bugs Let Remote Denial of Service oval:org.mitre.oval:def:6449 Vulnerability unix
Kerberos KDC Heap Corruption Denial of Service oval:org.mitre.oval:def:244 Vulnerability unix
Kerberos krb4 Plaintext Attack Vulnerability oval:org.mitre.oval:def:248 Vulnerability unix
Kerberos krb4 Ticket Splicing Vulnerability oval:org.mitre.oval:def:250 Vulnerability unix
Kerberos V5 Null Pointer DoS Vulnerability oval:org.mitre.oval:def:1110 Vulnerability unix
Kermit communications software contains a buffer overflow. oval:org.mitre.oval:def:5637 Vulnerability unix
Klima-Pokorny-Rosa Attack Vulnerability oval:org.mitre.oval:def:461 Vulnerability unix
kmod in the Linux kernel does not set its uid, suid, gid, or sgid to 0, which allows local users to cause a denial of se... oval:org.mitre.oval:def:9423 Vulnerability unix
Konqueror 3.1.3, 3.2.2, and possibly other versions does not properly prevent a frame in one domain from injecting conte... oval:org.mitre.oval:def:11371 Vulnerability unix
Konqueror 3.3.1 allows remote attackers to execute arbitrary FTP commands via an ftp:// URL that contains a URL-encoded ... oval:org.mitre.oval:def:9645 Vulnerability unix
Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote attackers to spoof arbitrary web sites by inject... oval:org.mitre.oval:def:9260 Vulnerability unix
Konqueror 3.x up to 3.2.2-6, and possibly other versions, allows remote attackers to spoof arbitrary web sites by inject... oval:org.mitre.oval:def:11056 Vulnerability unix
Total number of results : 9137
Page : 1 11 21 31 41 51 61 71 81 91 101 111 121 131 141 151 161 171 181 191 200 201 202 203 204 205 206 207 208 209 (This Page) 210 211 212 213 214 215 216 217 218 219 220 221 231 241 251 261 271 281 291 301

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html