OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
rad_decode in FreeRADIUS 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a short RADI... oval:org.mitre.oval:def:10917 Vulnerability unix
Raw character devices (raw.c) in the Linux kernel 2.6.x call the wrong function before passing an ioctl to the block dev... oval:org.mitre.oval:def:10264 Vulnerability unix
rdesktop 1.3.1 with xscreensaver 4.14, and possibly other versions, when running on Fedora and possibly other platforms,... oval:org.mitre.oval:def:10096 Vulnerability unix
Real time clock (RTC) routines in Linux kernel 2.4.23 and earlier do not properly initialize their structures, which cou... oval:org.mitre.oval:def:9406 Vulnerability unix
Real Time Data Array Record Vulnerability oval:org.mitre.oval:def:7196 Vulnerability windows
Red Hat Cluster Project 2.x allows local users to modify or overwrite arbitrary files via symlink attacks on files in /t... oval:org.mitre.oval:def:11404 Vulnerability unix
Red Hat Enterprise Linux 5 and Fedora install the Bind /etc/rndc.key file with world-readable permissions, which allows ... oval:org.mitre.oval:def:9977 Vulnerability unix
Red Hat Enterprise Linux (RHEL) 5 ships the rpm for the Advanced Intrusion Detection Environment (AIDE) before 0.13.1 wi... oval:org.mitre.oval:def:10217 Vulnerability unix
Red Hat Linux Kernel 'qla2xxx' DriverSecurity Bypass Vulnerability oval:org.mitre.oval:def:6744 Vulnerability unix
Red Hat Linux Kernel Routing Implementation Multiple Remote Denial of Service Vulnerabilities oval:org.mitre.oval:def:7026 Vulnerability unix
Remote code execution in Opera before 10.54 due to failure to enforce permission requirements for widget filesystem acce... oval:org.mitre.oval:def:11950 Vulnerability windows
Remote code execution in Opera before 10.60 due to failure to prevent certain double-click operations from running a pro... oval:org.mitre.oval:def:11856 Vulnerability windows
Remote Code Execution vulnerability in VBScript oval:org.mitre.oval:def:8654 Vulnerability windows
Remote code execution vulnerability in Canonical Display Driver oval:org.mitre.oval:def:7195 Vulnerability windows
Request Header Buffer Overflow Vulnerability oval:org.mitre.oval:def:6933 Vulnerability windows
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses se... oval:org.mitre.oval:def:10034 Vulnerability unix
rfc1867.c in PHP before 5.0.2 allows local users to upload files to arbitrary locations via a PHP script with a certain ... oval:org.mitre.oval:def:10961 Vulnerability unix
RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly enforce RIPv2 authentication requirements, which allows r... oval:org.mitre.oval:def:10775 Vulnerability unix
RIPd in Quagga 0.98 and 0.99 before 20060503 does not properly implement configurations that (1) disable RIPv1 or (2) re... oval:org.mitre.oval:def:9985 Vulnerability unix
RPC Memory Corruption Vulnerability oval:org.mitre.oval:def:7177 Vulnerability windows
rpc.mountd in nfs-utils after 1.0.3 and before 1.0.6 allows attackers to cause a denial of service (crash) via an NFS mo... oval:org.mitre.oval:def:9673 Vulnerability unix
rquotad in nfs-utils (rquota_server.c) before 1.0.6-r6 on 64-bit architectures does not properly perform an integer conv... oval:org.mitre.oval:def:10464 Vulnerability unix
rsync before 2.6.1 does not properly sanitize paths when running a read/write daemon without using chroot, which allows ... oval:org.mitre.oval:def:9495 Vulnerability unix
RTF Stack Buffer Overflow Vulnerability oval:org.mitre.oval:def:11931 Vulnerability windows
RTSP Use After Free Vulnerability oval:org.mitre.oval:def:6684 Vulnerability windows
Ruby 1.6.x up to 1.6.8, 1.8.x up to 1.8.2, and 1.9.0 development up to 2005-09-01 allows attackers to bypass safe level ... oval:org.mitre.oval:def:10564 Vulnerability unix
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly rest... oval:org.mitre.oval:def:11602 Vulnerability unix
Samba 3.0.6 and earlier allows remote attackers to cause a denial of service (infinite loop and memory exhaustion) via c... oval:org.mitre.oval:def:11141 Vulnerability unix
Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in ... oval:org.mitre.oval:def:9191 Vulnerability unix
Samba file permission vulnerability oval:org.mitre.oval:def:7087 Vulnerability unix
Total number of results : 3543
Page : 1 11 21 31 41 51 61 62 63 64 65 66 67 68 69 70 71 (This Page) 72 73 74 75 76 77 78 79 80 81 82 91 101 111

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html