OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
Sun Java Runtime Environment Java Plug-in Javascript code unauthorized access oval:org.mitre.oval:def:6584 Vulnerability unix
Sun Java Runtime Environment Java Plug-in signed applet unauthorized access oval:org.mitre.oval:def:6585 Vulnerability unix
Sun Java Runtime Environment and Java Development Kit Multiple Security Vulnerabilities oval:org.mitre.oval:def:6598 Vulnerability unix
Sun Java Runtime Environment Java Plug-in crossdomain.xml information disclosure oval:org.mitre.oval:def:6619 Vulnerability unix
Sun Java Runtime Environment Java Plug-in weak security oval:org.mitre.oval:def:6642 Vulnerability unix
The oggplay_data_handle_theora_frame in liboggplay in Mozilla Firefox 3.5.x before 3.5.4 to cuase denial of service oval:org.mitre.oval:def:6443 Vulnerability windows
Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.4 allows remote attackers to cause a denial of service oval:org.mitre.oval:def:6464 Vulnerability windows
Vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4 to cause a denial of service oval:org.mitre.oval:def:6582 Vulnerability windows
vulnerabilities in liboggz, as used in Mozilla Firefox 3.5.x before 3.5.4 allow remote attackers to cause a denial of se... oval:org.mitre.oval:def:6375 Vulnerability windows
Vulnerability in the XPCVariant::VariantDataToJS function in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 oval:org.mitre.oval:def:6565 Vulnerability windows
Web Services on Devices API Memory Corruption Vulnerability oval:org.mitre.oval:def:6079 Vulnerability windows
WebKit in Apple Safari Multiple Unspecified Vulnerabilities. oval:org.mitre.oval:def:6362 Vulnerability windows
WebKit in Apple Safari Numeric Character References Remote Memory Corruption Vulnerability. oval:org.mitre.oval:def:6475 Vulnerability windows
Win32k EOT Parsing Vulnerability oval:org.mitre.oval:def:6406 Vulnerability windows
Win32k Insufficient Data Validation Vulnerability oval:org.mitre.oval:def:6277 Vulnerability windows
Win32k NULL Pointer Dereferencing Vulnerability oval:org.mitre.oval:def:5588 Vulnerability windows
Wireshark Denial of Service vulnerability caused by packet-paltalk.c in the Paltalk dissector oval:org.mitre.oval:def:6391 Vulnerability windows
Wireshark DoS Vulnerability due to DOCSIS dissector oval:org.mitre.oval:def:7331 Vulnerability windows
Wireshark DoS Vulnerability due to the DCERPC/NT dissector oval:org.mitre.oval:def:6005 Vulnerability windows
Wireshark Integer overflow vulnerability in wiretap/erf.c oval:org.mitre.oval:def:5979 Vulnerability windows
Wireshark Off-by-one error in the dissect_negprot_response function in packet-smb.c in the SMB dissector to cause DoS Vu... oval:org.mitre.oval:def:6049 Vulnerability windows
Word Bookmarks Vulnerability oval:org.mitre.oval:def:7529 Vulnerability windows
Word Boundary Check Vulnerability oval:org.mitre.oval:def:7375 Vulnerability windows
Word Heap Overflow Vulnerability oval:org.mitre.oval:def:7010 Vulnerability windows
Word HTML Linked Objects Memory Corruption Vulnerability oval:org.mitre.oval:def:12039 Vulnerability windows
Word Index Parsing Vulnerability oval:org.mitre.oval:def:7019 Vulnerability windows
Word Index Vulnerability oval:org.mitre.oval:def:7582 Vulnerability windows
Word Parsing Vulnerability oval:org.mitre.oval:def:6792 Vulnerability windows
Word Parsing Vulnerability oval:org.mitre.oval:def:7032 Vulnerability windows
Word Pointer Vulnerability oval:org.mitre.oval:def:6695 Vulnerability windows
Total number of results : 96
Page : 1 2 3 (This Page) 4

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html