OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
DHTML Object Memory Corruption Vulnerability (IE6,SP1) oval:org.mitre.oval:def:3752 Vulnerability windows
DHTML Object Memory Corruption Vulnerability (IE6 for Server 2003) oval:org.mitre.oval:def:3100 Vulnerability windows
DHTML Object Memory Corruption Vulnerability (IE6 for XP,SP2) oval:org.mitre.oval:def:1695 Vulnerability windows
DHTML Script Function Memory Corruption Vulnerability oval:org.mitre.oval:def:116 Vulnerability windows
Diameter dictionary file vulnerability in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 oval:org.mitre.oval:def:15045 Vulnerability windows
digestmd5.c in the CMU Cyrus Simple Authentication and Security Layer (SASL) library 2.1.18, and possibly other versions... oval:org.mitre.oval:def:9861 Vulnerability unix
Digital Signatures Vulnerability (CVE-2013-3869) - MS13-095 oval:org.mitre.oval:def:19112 Vulnerability windows
Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote... oval:org.mitre.oval:def:9795 Vulnerability unix
DirectAnimation ActiveX Controls Memory Corruption Vulnerability oval:org.mitre.oval:def:437 Vulnerability windows
DirectAnimation ActiveX Controls Memory Corruption Vulnerability oval:org.mitre.oval:def:1103 Vulnerability windows
directconn.c in the MSN protocol plugin in libpurple 2.7.6 through 2.7.8 in Pidgin before 2.7.9 allows remote authentica... oval:org.mitre.oval:def:18461 Vulnerability windows
Directory Authentication Bypass Vulnerability oval:org.mitre.oval:def:6942 Vulnerability windows
Directory traversal vulnerability in gftp before 2.0.18 for GTK+ allows remote malicious FTP servers to read arbitrary f... oval:org.mitre.oval:def:9923 Vulnerability unix
Directory traversal vulnerability in FastJar 0.93, as used in Gnu GCC 4.1.1 and earlier, and 3.4.6 and earlier, allows u... oval:org.mitre.oval:def:9617 Vulnerability unix
Directory traversal vulnerability in Free Download Manager (FDM). oval:org.mitre.oval:def:7284 Vulnerability windows
Directory traversal vulnerability in the Archive::Tar Perl module 1.36 and earlier allows user-assisted remote attackers... oval:org.mitre.oval:def:11658 Vulnerability unix
Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, ... oval:org.mitre.oval:def:11471 Vulnerability unix
Directory traversal vulnerability in smbfs in Linux 2.6.16 and earlier allows local users to escape chroot restrictions ... oval:org.mitre.oval:def:11327 Vulnerability unix
Directory traversal vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update ... oval:org.mitre.oval:def:11102 Vulnerability unix
Directory traversal vulnerability in extract.c in star before 1.5a84 allows user-assisted remote attackers to overwrite ... oval:org.mitre.oval:def:11098 Vulnerability unix
Directory traversal vulnerability in gunzip -N in gzip 1.2.4 through 1.3.5 allows remote attackers to write to arbitrary... oval:org.mitre.oval:def:11057 Vulnerability unix
Directory traversal vulnerability in index/mbox/mbox-storage.c in Dovecot before 1.0.rc29, when using the zlib plugin, a... oval:org.mitre.oval:def:10995 Vulnerability unix
Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when... oval:org.mitre.oval:def:10937 Vulnerability unix
Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, ... oval:org.mitre.oval:def:10770 Vulnerability unix
Directory traversal vulnerability in Mozilla Firefox before 2.0.0.12, Thunderbird before 2.0.0.12, and SeaMonkey before ... oval:org.mitre.oval:def:10705 Vulnerability unix
Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using c... oval:org.mitre.oval:def:10643 Vulnerability unix
Directory Traversal Vulnerability in CVS Server oval:org.mitre.oval:def:1060 Vulnerability unix
Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16,... oval:org.mitre.oval:def:10587 Vulnerability unix
Directory traversal vulnerability in the sanitize_path function in util.c for rsync 2.6.2 and earlier, when chroot is di... oval:org.mitre.oval:def:10561 Vulnerability unix
Directory traversal vulnerability in the ICC_Profile.getInstance method in Java Runtime Environment (JRE) in Sun Java SE... oval:org.mitre.oval:def:10520 Vulnerability unix

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html