Mandrakesoft Mandrake Multi Network Firewall : OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All Family: All Windows Unix IOS Pixos
Title Definition Id Class Family
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows contex... oval:org.mitre.oval:def:10669 Vulnerability unix
CVE-2004-1235 oval:org.opensuse.security:def:20041235 Vulnerability unix
CVE-2007-1351 oval:org.opensuse.security:def:20071351 Vulnerability unix
CVE-2007-1352 oval:org.opensuse.security:def:20071352 Vulnerability unix
CVE-2007-5116 oval:org.opensuse.security:def:20075116 Vulnerability unix
FakeBasicAuth overflow oval:org.apache.httpd:def:20040488 Vulnerability
Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify t... oval:org.mitre.oval:def:10714 Vulnerability unix
Integer overflow in the bdfReadCharacters function in bdfread.c in (1) X.Org libXfont before 20070403 and (2) freetype 2... oval:org.mitre.oval:def:11266 Vulnerability unix
Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users t... oval:org.mitre.oval:def:10523 Vulnerability unix
Linux Kernel execve Race Condition Vulnerability oval:org.mitre.oval:def:309 Vulnerability unix
Multiple vulnerabilities in libfreetype, Xsun(1) and Xorg(1) oval:org.mitre.oval:def:13243 Vulnerability unix
Multiple vulnerabilities in libfreetype, Xsun(1) and Xorg(1) oval:org.mitre.oval:def:1810 Vulnerability unix
Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.4... oval:org.mitre.oval:def:9567 Vulnerability unix
Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl, when mod_ssl is c... oval:org.mitre.oval:def:11458 Vulnerability unix
The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlappi... oval:org.mitre.oval:def:9512 Vulnerability unix
The der_chop script in the openssl package in Trustix Secure Linux 1.5 through 2.1 and other operating systems allows lo... oval:org.mitre.oval:def:10621 Vulnerability unix
The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initialize memory before using it, which allows l... oval:org.mitre.oval:def:11136 Vulnerability unix
Trustix Secure Linux der_chop Script Symlink Attack Vulnerability oval:org.mitre.oval:def:164 Vulnerability unix
Unknown vulnerability in Linux kernel 2.x may allow local users to modify the group ID of files, such as NFS exported fi... oval:org.mitre.oval:def:9867 Vulnerability unix
Total number of results : 19
Page : 1 (This Page)

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html