OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows lo... oval:org.mitre.oval:def:10989 Vulnerability unix
Array index error in the hb_ot_layout_build_glyph_classes function in pango/opentype/hb-ot-layout.cc in Pango before 1.2... oval:org.mitre.oval:def:9417 Vulnerability unix
Array index error in the DCTStream::readProgressiveDataUnit method in xpdf/Stream.cc in Xpdf 3.02pl1, as used in poppler... oval:org.mitre.oval:def:9979 Vulnerability unix
Array index error in the XFree86-Misc extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to exec... oval:org.mitre.oval:def:11718 Vulnerability unix
Array index error in the make_table function in unlzh.c in the LZH decompression component in gzip 1.3.5, when running o... oval:org.mitre.oval:def:10391 Vulnerability unix
Array index error in gd_gif_in.c in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers ... oval:org.mitre.oval:def:10348 Vulnerability unix
Array index error in the imageRotate function in PHP 5.2.8 and earlier allows context-dependent attackers to read the co... oval:org.mitre.oval:def:9667 Vulnerability unix
Array index error in the qtdemux_parse_samples function in gst/qtdemux/qtdemux.c in GStreamer Good Plug-ins (aka gst-plu... oval:org.mitre.oval:def:10611 Vulnerability unix
Array index error in the gst_qtp_trak_handler function in gst/qtdemux/qtdemux.c in GStreamer Plug-ins (aka gstreamer-plu... oval:org.mitre.oval:def:9886 Vulnerability unix
Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c in Linux kernel 2.6 allows local users to caus... oval:org.mitre.oval:def:10858 Vulnerability unix
Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable ... oval:org.mitre.oval:def:10026 Vulnerability unix
Array Indexing Memory Corruption Vulnerability oval:org.mitre.oval:def:11525 Vulnerability windows
backend/parser/parse_coerce.c in PostgreSQL 7.4.1 through 7.4.14, 8.0.x before 8.0.9, and 8.1.x before 8.1.5 allows remo... oval:org.mitre.oval:def:10905 Vulnerability unix
backend/parser/analyze.c in PostgreSQL 8.1.x before 8.1.5 allows remote authenticated users to cause a denial of service... oval:org.mitre.oval:def:11425 Vulnerability unix
backend/session.c in KDM in KDE 3.3.0 through 3.5.7, when autologin is configured and "shutdown with password" is enable... oval:org.mitre.oval:def:10359 Vulnerability unix
backend/tcop/postgres.c in PostgreSQL 8.1.x before 8.1.5 allows remote authenticated users to cause a denial of service ... oval:org.mitre.oval:def:10122 Vulnerability unix
bgpd in Quagga 0.98 and 0.99 before 20060504 allows local users to cause a denial of service (CPU consumption) via a cer... oval:org.mitre.oval:def:10651 Vulnerability unix
bgpd/bgp_attr.c in Quagga 0.98.6 and earlier, and 0.99.6 and earlier 0.99 versions, does not validate length values in t... oval:org.mitre.oval:def:11048 Vulnerability unix
BIND 9.6.0, 9.5.1, 9.5.0, 9.4.3, and earlier does not properly check the return value from the OpenSSL DSA_verify functi... oval:org.mitre.oval:def:10879 Vulnerability unix
BIND before 9.2.6-P1 and 9.3.x before 9.3.2-P1 allows remote attackers to cause a denial of service (crash) via a flood ... oval:org.mitre.oval:def:9623 Vulnerability unix
browser.js in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 uses the requesti... oval:org.mitre.oval:def:9884 Vulnerability unix
Buffer overflow in the bufprint function in capiutil.c in libcapi, as used in Linux kernel 2.6.9 to 2.6.20 and isdn4k-ut... oval:org.mitre.oval:def:10503 Vulnerability unix
Buffer overflow in the intT1_EnvGetCompletePath function in lib/t1lib/t1env.c in t1lib 5.1.1 allows context-dependent at... oval:org.mitre.oval:def:10557 Vulnerability unix
Buffer overflow in the ReadFontAlias function in XFree86 4.1.0 to 4.3.0, when using the CopyISOLatin1Lowered function, a... oval:org.mitre.oval:def:10405 Vulnerability unix
Buffer overflow in the imageloadfont function in ext/gd/gd.c in PHP 4.4.x before 4.4.9 and PHP 5.2 before 5.2.6-r6 allow... oval:org.mitre.oval:def:9724 Vulnerability unix
Buffer overflow in xloadimage 4.1 and earlier, and xli, might allow user-assisted attackers to execute arbitrary code vi... oval:org.mitre.oval:def:10590 Vulnerability unix
Buffer overflow in the usb_host_handle_control function in the USB passthrough handling implementation in usb-linux.c in... oval:org.mitre.oval:def:11786 Vulnerability unix
Buffer overflow in Evolution 2.22.1, when the ITip Formatter plugin is disabled, allows remote attackers to execute arbi... oval:org.mitre.oval:def:10471 Vulnerability unix
Buffer overflow in the readImageData function in giftopnm.c in netpbm before 10.27 in netpbm before 10.27 allows remote ... oval:org.mitre.oval:def:10975 Vulnerability unix
Buffer overflow in UnZip 5.50 and earlier allows user-assisted attackers to execute arbitrary code via a long filename c... oval:org.mitre.oval:def:11252 Vulnerability unix
Total number of results : 2406
Page : 1 2 3 (This Page) 4 5 6 7 8 9 10 11 12 13 14 21 31 41 51 61 71 81

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html