OVAL Definitions - Class: Vulnerability Family: unix

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
libtiff tif_dirread divide-by-zero Denial of Service oval:org.mitre.oval:def:100115 Vulnerability unix
libungif library before 4.1.0 allows attackers to corrupt memory and possibly execute arbitrary code via a crafted GIF f... oval:org.mitre.oval:def:9314 Vulnerability unix
libungif library before 4.1.0 allows attackers to cause a denial of service via a crafted GIF file that triggers a null ... oval:org.mitre.oval:def:10994 Vulnerability unix
libvorbis 1.1.2, and possibly other versions before 1.2.0, allows context-dependent attackers to cause a denial of servi... oval:org.mitre.oval:def:10570 Vulnerability unix
libvorbis before r16182, as used in Mozilla Firefox 3.5.x before 3.5.2 and other products, allows context-dependent atta... oval:org.mitre.oval:def:9506 Vulnerability unix
libxml2 2.6.32 and earlier does not properly detect recursion during entity expansion in an attribute value, which allow... oval:org.mitre.oval:def:9812 Vulnerability unix
Libxml2 Heap Overflow in xmlParseAttValueComplex() Lets Remote Users Execute Arbitrary Code oval:org.mitre.oval:def:6103 Vulnerability unix
Libxml2 Integer Overflow in xmlBufferResize() Lets Remote Users Deny Service oval:org.mitre.oval:def:6415 Vulnerability unix
Libxml2 Integer Overflow in xmlSAX2Characters() May Let Remote Users Execute Arbitrary Code oval:org.mitre.oval:def:6360 Vulnerability unix
Libxml2 Recursive Entity Evaluation Bug Lets Remote Users Deny Service oval:org.mitre.oval:def:6496 Vulnerability unix
Links web browser 1.00pre12 and Elinks 0.9.2 with smbclient installed allows remote attackers to execute arbitrary code ... oval:org.mitre.oval:def:11213 Vulnerability unix
Linux e1000 Driver 'Jumbo Frame' Handling Remote Security Bypass Vulnerability oval:org.mitre.oval:def:7453 Vulnerability unix
Linux e1000e Driver 'Jumbo Frame' Handling Remote Security Bypass Vulnerability oval:org.mitre.oval:def:7016 Vulnerability unix
Linux ioperm Privilege Restriction Vulnerability oval:org.mitre.oval:def:278 Vulnerability unix
Linux Kernel '/drivers/net/r8169.c' Out-of-IOMMU Error Local Denial of Service Vulnerability oval:org.mitre.oval:def:7377 Vulnerability unix
Linux Kernel 'drivers/firewire/ohci.c' NULL Pointer Dereference Denial of Service Vulnerability oval:org.mitre.oval:def:7376 Vulnerability unix
Linux Kernel 'drivers/scsi/gdth.c' Local Privilege Escalation Vulnerability oval:org.mitre.oval:def:7101 Vulnerability unix
Linux Kernel 'fasync_helper()' Local Privilege Escalation Vulnerability oval:org.mitre.oval:def:7054 Vulnerability unix
Linux Kernel 'fuse_direct_io()' Invalid Pointer Dereference Local Denial of Service Vulnerability oval:org.mitre.oval:def:6955 Vulnerability unix
Linux Kernel 'megaraid_sas' Driver Insecure File Permission Local Privilege Escalation Vulnerability oval:org.mitre.oval:def:7540 Vulnerability unix
Linux Kernel 'megaraid_sas' Driver Insecure File Permission Local Privilege Escalation Vulnerability oval:org.mitre.oval:def:7163 Vulnerability unix
Linux Kernel 'nfs4_proc_lock()' Local Denial of Service Vulnerability oval:org.mitre.oval:def:6636 Vulnerability unix
Linux kernel 'O_EXCL' NFSv4 Privilege Escalation Vulnerability oval:org.mitre.oval:def:7527 Vulnerability unix
Linux Kernel 'pipe.c' Local Privilege Escalation Vulnerability oval:org.mitre.oval:def:7608 Vulnerability unix
Linux Kernel 'truncate()' Local Privilege Escalation Vulnerability oval:org.mitre.oval:def:6386 Vulnerability unix
Linux Kernel 'unix_stream_connect()' Local Denial of Service Vulnerability oval:org.mitre.oval:def:6895 Vulnerability unix
Linux Kernel /proc/self setuid Vulnerability oval:org.mitre.oval:def:328 Vulnerability unix
Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment ... oval:org.mitre.oval:def:9978 Vulnerability unix
Linux kernel 2.6.x up to 2.6.18 and possibly other versions, when SELinux hooks are enabled, allows local users to cause... oval:org.mitre.oval:def:9949 Vulnerability unix
Linux kernel 2.4.x and 2.6.x allows local users to cause a denial of service (CPU and memory consumption) and bypass RLI... oval:org.mitre.oval:def:9890 Vulnerability unix
Total number of results : 9137
Page : 1 11 21 31 41 51 61 71 81 91 101 111 121 131 141 151 161 171 181 191 201 202 203 204 205 206 207 208 209 210 211 (This Page) 212 213 214 215 216 217 218 219 220 221 222 231 241 251 261 271 281 291 301

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html