OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
iproute 2.4.7 and earlier allows local users to cause a denial of service via spoofed messages as other users to the ker... oval:org.mitre.oval:def:10912 Vulnerability unix
IPv6 Memory Corruption Vulnerability oval:org.mitre.oval:def:11845 Vulnerability windows
ip_route_input in Linux kernel 2.6 before 2.6.16.8 allows local users to cause a denial of service (panic) via a request... oval:org.mitre.oval:def:10146 Vulnerability unix
ISATAP IPv6 Source Address Spoofing Vulnerability oval:org.mitre.oval:def:7574 Vulnerability windows
ISC BIND 9 Cache Poisoning Vulnerability oval:org.mitre.oval:def:7086 Vulnerability unix
ISC BIND 9 DNSSEC Bogus NXDOMAIN Response Remote Cache Poisoning Vulnerability oval:org.mitre.oval:def:7212 Vulnerability unix
ISC BIND 9 DNSSEC Query Response Additional Section Remote Cache Poisoning Vulnerability oval:org.mitre.oval:def:7512 Vulnerability unix
ISC BIND 9 through 9.5.0a5 uses a weak random number generator during generation of DNS query ids when answering resolve... oval:org.mitre.oval:def:10293 Vulnerability unix
ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta handles out-... oval:org.mitre.oval:def:11753 Vulnerability unix
ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P5, 9.5 before 9.5.2-P2, 9.6 before 9.6.1-P3, and 9.7.0 beta does not pro... oval:org.mitre.oval:def:9357 Vulnerability unix
ISC BIND 9.0.x, 9.1.x, 9.2.0 up to 9.2.7, 9.3.0 up to 9.3.3, 9.4.0a1 up to 9.4.0a6, 9.4.0b1 up to 9.4.0b4, 9.4.0rc1, and... oval:org.mitre.oval:def:11523 Vulnerability unix
Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypas... oval:org.mitre.oval:def:10499 Vulnerability unix
Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, and SDK and JRE 1.4.2_1... oval:org.mitre.oval:def:11592 Vulnerability unix
Java Web Start Improper Handling of Signed JAR Files oval:org.mitre.oval:def:6794 Vulnerability unix
Java Web Start in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 an... oval:org.mitre.oval:def:8758 Vulnerability unix
JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileg... oval:org.mitre.oval:def:9603 Vulnerability unix
JRE JPEG JFIF Decoder Vulnerability oval:org.mitre.oval:def:6963 Vulnerability unix
JRE TrueType Font Parsing Crash oval:org.mitre.oval:def:7537 Vulnerability unix
js/src/xpconnect/src/xpcwrappedjsclass.cpp in Mozilla Firefox before 3.0.11, Thunderbird before 2.0.0.22, and SeaMonkey ... oval:org.mitre.oval:def:9815 Vulnerability unix
jslock.cpp in Mozilla Firefox 3.x before 3.0.2, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMon... oval:org.mitre.oval:def:9157 Vulnerability unix
KAME IKE daemon (racoon) does not properly handle hash values, which allows remote attackers to delete certificates via ... oval:org.mitre.oval:def:9737 Vulnerability unix
kcheckpass in KDE 3.2.0 up to 3.4.2 allows local users to gain root access via a symlink attack on lock files. oval:org.mitre.oval:def:9388 Vulnerability unix
KDC in MIT Kerberos 5 (krb5kdc) does not set a global variable for some krb4 message types, which allows remote attacker... oval:org.mitre.oval:def:9496 Vulnerability unix
KDE before 3.3.0 does not properly handle when certain symbolic links point to "stale" locations, which could allow loca... oval:org.mitre.oval:def:9334 Vulnerability unix
KDE Display Manager (KDM) in KDE 3.2.0 up to 3.5.3 allows local users to read arbitrary files via a symlink attack relat... oval:org.mitre.oval:def:9844 Vulnerability unix
KDE Konqueror 3.5.7 allows remote attackers to spoof the URL address bar by calling setInterval with a small interval an... oval:org.mitre.oval:def:9879 Vulnerability unix
kdesktop_lock in kdebase before 3.1.3-5.11 for KDE in Red Hat Enterprise Linux (RHEL) 3 does not properly terminate, whi... oval:org.mitre.oval:def:10535 Vulnerability unix
Kerberos Null Pointer Dereference Vulnerability oval:org.mitre.oval:def:8428 Vulnerability windows
Kernel NDProxy Buffer Overflow Vulnerability oval:org.mitre.oval:def:12461 Vulnerability windows
kmod in the Linux kernel does not set its uid, suid, gid, or sgid to 0, which allows local users to cause a denial of se... oval:org.mitre.oval:def:9423 Vulnerability unix
Total number of results : 3543
Page : 1 11 21 31 32 33 34 35 36 37 38 39 40 41 (This Page) 42 43 44 45 46 47 48 49 50 51 52 61 71 81 91 101 111

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html