OVAL Definitions - Family: unix

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
backend/parser/analyze.c in PostgreSQL 8.1.x before 8.1.5 allows remote authenticated users to cause a denial of service... oval:org.mitre.oval:def:11425 Vulnerability unix
backend/parser/parse_coerce.c in PostgreSQL 7.4.1 through 7.4.14, 8.0.x before 8.0.9, and 8.1.x before 8.1.5 allows remo... oval:org.mitre.oval:def:10905 Vulnerability unix
backend/session.c in KDM in KDE 3.3.0 through 3.5.7, when autologin is configured and "shutdown with password" is enable... oval:org.mitre.oval:def:10359 Vulnerability unix
backend/tcop/postgres.c in PostgreSQL 8.1.x before 8.1.5 allows remote authenticated users to cause a denial of service ... oval:org.mitre.oval:def:10122 Vulnerability unix
bgpd in Quagga 0.98 and 0.99 before 20060504 allows local users to cause a denial of service (CPU consumption) via a cer... oval:org.mitre.oval:def:10651 Vulnerability unix
bgpd/bgp_attr.c in Quagga 0.98.6 and earlier, and 0.99.6 and earlier 0.99 versions, does not validate length values in t... oval:org.mitre.oval:def:11048 Vulnerability unix
BIND 9.6.0, 9.5.1, 9.5.0, 9.4.3, and earlier does not properly check the return value from the OpenSSL DSA_verify functi... oval:org.mitre.oval:def:10879 Vulnerability unix
BIND before 9.2.6-P1 and 9.3.x before 9.3.2-P1 allows remote attackers to cause a denial of service (crash) via a flood ... oval:org.mitre.oval:def:9623 Vulnerability unix
BIND DoS via SIG RR Elements oval:org.mitre.oval:def:2094 Vulnerability unix
Bind OPT Resource Record DoS Vulnerability oval:org.mitre.oval:def:449 Vulnerability unix
BIND SIG Resource Records Buffer Overflow oval:org.mitre.oval:def:2539 Vulnerability unix
BO in Samba call_trans2open Function oval:org.mitre.oval:def:567 Vulnerability unix
Bourne Shell Local-DoS Vulnerability oval:org.mitre.oval:def:881 Vulnerability unix
browser.js in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 uses the requesti... oval:org.mitre.oval:def:9884 Vulnerability unix
BSM Audit Kernel Panic oval:org.mitre.oval:def:2426 Vulnerability unix
Buffer Management Error in OpenSSH oval:org.mitre.oval:def:2719 Vulnerability unix
Buffer overflow in the extract_one function from lhext.c in LHA may allow attackers to execute arbitrary code via a long... oval:org.mitre.oval:def:9981 Vulnerability unix
Buffer overflow in the QFILEPATHINFO request handler in Samba 3.0.x through 3.0.7 may allow remote attackers to execute ... oval:org.mitre.oval:def:9969 Vulnerability unix
Buffer overflow in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update ... oval:org.mitre.oval:def:9956 Vulnerability unix
Buffer overflow in the X render (Xrender) extension in X.org X server 6.8.0 up to allows attackers to cause a denial of ... oval:org.mitre.oval:def:9929 Vulnerability unix
Buffer overflow in the Extract Info Field Function for (1) MSN and (2) YMSG protocol handlers in Gaim 0.74 and earlier, ... oval:org.mitre.oval:def:9906 Vulnerability unix
Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0... oval:org.mitre.oval:def:9859 Vulnerability unix
Buffer overflow in the mail_valid_net_parse_work function in mail.c for Washington's IMAP Server (UW-IMAP) before imap-2... oval:org.mitre.oval:def:9858 Vulnerability unix
Buffer overflow in Info-Zip 2.3 and possibly earlier versions, when using recursive folder compression, allows remote at... oval:org.mitre.oval:def:9848 Vulnerability unix
Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unkno... oval:org.mitre.oval:def:9846 Vulnerability unix
Buffer overflow in the JBIG2Bitmap::JBIG2Bitmap function in JBIG2Stream.cc in Xpdf, as used in products such as gpdf, kp... oval:org.mitre.oval:def:9801 Vulnerability unix
Buffer overflow in the t2p_write_pdf_string function in tiff2pdf in libtiff 3.8.2 and earlier allows attackers to cause ... oval:org.mitre.oval:def:9788 Vulnerability unix
Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (c... oval:org.mitre.oval:def:9785 Vulnerability unix
Buffer overflow in the PPP dissector Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of s... oval:org.mitre.oval:def:9772 Vulnerability unix
Buffer overflow in the MoxaDriverIoctl function for the moxa serial driver (moxa.c) in Linux 2.2.x, 2.4.x, and 2.6.x bef... oval:org.mitre.oval:def:9770 Vulnerability unix

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html