Avaya S8700 : OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All Family: All Windows Unix IOS Pixos
Title Definition Id Class Family
CVE-2004-1235 oval:org.opensuse.security:def:20041235 Vulnerability unix
Header parsing memory leak oval:org.apache.httpd:def:20040493 Vulnerability
Linux Kernel Denial of Service Vulnerability via fsave and frstor Instructions oval:org.mitre.oval:def:2915 Vulnerability unix
Multiple Privilege Escalation Vulnerabilities in Linux Kernel oval:org.mitre.oval:def:2961 Vulnerability unix
Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memor... oval:org.mitre.oval:def:10155 Vulnerability unix
Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memor... oval:org.mitre.oval:def:9426 Vulnerability unix
Multiple Vendor OpenSSL 0.9.6x, 0.9.7x Null-Pointer DoS Vulnerability oval:org.mitre.oval:def:5770 Vulnerability ios
OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a den... oval:org.mitre.oval:def:11755 Vulnerability unix
OpenSSL Denial of Service Vulnerabilities oval:org.mitre.oval:def:2621 Vulnerability unix
Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.4... oval:org.mitre.oval:def:9567 Vulnerability unix
Red Hat Enterprise 3 OpenSSL Kerberos Handshake Vulnerability oval:org.mitre.oval:def:928 Vulnerability unix
Red Hat Enterprise 3 OpenSSL do_change_cipher_spec Function Denial of Service oval:org.mitre.oval:def:870 Vulnerability unix
Red Hat Enterprise 3 OpenSSL Improper Unknown Message Handling Vulnerability oval:org.mitre.oval:def:871 Vulnerability unix
Red Hat OpenSSL Improper Unknown Message Handling Vulnerability oval:org.mitre.oval:def:902 Vulnerability unix
Red Hat OpenSSL Kerberos Handshake Vulnerability oval:org.mitre.oval:def:1049 Vulnerability unix
Red Hat OpenSSL do_change_cipher_spec Function Denial of Service oval:org.mitre.oval:def:975 Vulnerability unix
The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlappi... oval:org.mitre.oval:def:9512 Vulnerability unix
The ap_get_mime_headers_core function in Apache httpd 2.0.49 allows remote attackers to cause a denial of service (memor... oval:org.mitre.oval:def:10605 Vulnerability unix
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a... oval:org.mitre.oval:def:9779 Vulnerability unix
The memory_limit functionality in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such as when reg... oval:org.mitre.oval:def:10896 Vulnerability unix
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly ... oval:org.mitre.oval:def:9580 Vulnerability unix
The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\0) characters within tag ... oval:org.mitre.oval:def:10619 Vulnerability unix
Total number of results : 22
Page : 1 (This Page)

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html