Mandrakesoft Mandrake Linux : OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All Family: All Windows Unix IOS Pixos
Title Definition Id Class Family
Buffer overflow in the MSN protocol plugins (1) object.c and (2) slp.c for Gaim before 0.82 allows remote attackers to c... oval:org.mitre.oval:def:9429 Vulnerability unix
Code Execution Vulnerability in XPDF PDF Viewer oval:org.mitre.oval:def:664 Vulnerability unix
cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files us... oval:org.mitre.oval:def:10888 Vulnerability unix
Cross-site scripting (XSS) vulnerability in ht://dig (htdig) before 3.1.6-r7 allows remote attackers to execute arbitrar... oval:org.mitre.oval:def:10878 Vulnerability unix
CVE-2004-0633 oval:org.opensuse.security:def:20040633 Vulnerability unix
CVE-2004-0634 oval:org.opensuse.security:def:20040634 Vulnerability unix
CVE-2004-0635 oval:org.opensuse.security:def:20040635 Vulnerability unix
CVE-2004-0803 oval:org.opensuse.security:def:20040803 Vulnerability unix
CVE-2004-0807 oval:org.opensuse.security:def:20040807 Vulnerability unix
CVE-2004-0809 oval:org.opensuse.security:def:20040809 Vulnerability unix
CVE-2004-0817 oval:org.opensuse.security:def:20040817 Vulnerability unix
CVE-2004-0827 oval:org.opensuse.security:def:20040827 Vulnerability unix
CVE-2004-0886 oval:org.opensuse.security:def:20040886 Vulnerability unix
CVE-2004-0983 oval:org.opensuse.security:def:20040983 Vulnerability unix
CVE-2004-1158 oval:org.opensuse.security:def:20041158 Vulnerability unix
CVE-2004-1187 oval:org.opensuse.security:def:20041187 Vulnerability unix
CVE-2004-1188 oval:org.opensuse.security:def:20041188 Vulnerability unix
CVE-2004-1235 oval:org.opensuse.security:def:20041235 Vulnerability unix
CVE-2005-0085 oval:org.opensuse.security:def:20050085 Vulnerability unix
CVE-2005-0472 oval:org.opensuse.security:def:20050472 Vulnerability unix
CVE-2005-0473 oval:org.opensuse.security:def:20050473 Vulnerability unix
CVE-2005-0605 oval:org.opensuse.security:def:20050605 Vulnerability unix
CVE-2007-6284 oval:org.opensuse.security:def:20076284 Vulnerability unix
CVE-2008-0595 oval:org.opensuse.security:def:20080595 Vulnerability unix
dbus-daemon in D-Bus before 1.0.3, and 1.1.x before 1.1.20, recognizes send_interface attributes in allow directives in ... oval:org.mitre.oval:def:9353 Vulnerability unix
FakeBasicAuth overflow oval:org.apache.httpd:def:20040488 Vulnerability
Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify t... oval:org.mitre.oval:def:10714 Vulnerability unix
Gaim before 1.1.3 allows remote attackers to cause a denial of service (infinite loop) via malformed SNAC packets from (... oval:org.mitre.oval:def:10433 Vulnerability unix
Insecure permissions for the /proc/scsi/qla2300/HbaApiNode file in Linux allows local users to cause a denial of service... oval:org.mitre.oval:def:9398 Vulnerability unix
Integer overflow in the TIFFFetchStripThing function in tif_dirread.c for libtiff 3.6.1 allows remote attackers to execu... oval:org.mitre.oval:def:11175 Vulnerability unix
Total number of results : 65
Page : 1 (This Page) 2 3

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html