OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
.NET Framework Serialization Vulnerability (CVE-2012-0161) oval:org.mitre.oval:def:14951 Vulnerability windows
.NET Framework Buffer Allocation Vulnerability oval:org.mitre.oval:def:14655 Vulnerability windows
.NET Framework Insecure Library Loading Vulnerability - MS12-074 oval:org.mitre.oval:def:15520 Vulnerability windows
.NET Framework remote code execution vulnerability - CVE-2014-4121 (MS14-057) oval:org.mitre.oval:def:26757 Vulnerability windows
.NET framework denial of service vulnerability - CVE-2014-4072 (MS14-053) oval:org.mitre.oval:def:26601 Vulnerability windows
.NET JIT Compiler Vulnerability oval:org.mitre.oval:def:1873 Vulnerability windows
.NET PE Loader Vulnerability oval:org.mitre.oval:def:2093 Vulnerability windows
.NET XML decryption denial of service vulnerability - CVE-2015-1672 (MS15-048) oval:org.mitre.oval:def:28739 Vulnerability windows
/opt/audio/bin/Aserver can be used to gain root access. oval:org.mitre.oval:def:5728 Vulnerability unix
/opt/audio/bin/Aserver can be used to gain root access. oval:org.mitre.oval:def:5635 Vulnerability unix
/opt/audio/bin/Aserver can be used to gain root access. oval:org.mitre.oval:def:5549 Vulnerability unix
/proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow lo... oval:org.mitre.oval:def:9330 Vulnerability unix
/usr/lib/print/conv_fix Privilege Escalation Vulnerability oval:org.mitre.oval:def:1732 Vulnerability unix
A "missing serialization" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, a... oval:org.mitre.oval:def:11384 Vulnerability unix
A "stack overwrite" vulnerability in GnuPG (gpg) 1.x before 1.4.6, 2.x before 2.0.2, and 1.9.0 through 1.9.95 allows att... oval:org.mitre.oval:def:11245 Vulnerability unix
A Buffer Overflow Security Vulnerability in the Solaris sadmind(1M) Daemon May Lead to Execution of Arbitrary Code oval:org.mitre.oval:def:5543 Vulnerability unix
A case-sensitive comparison when checking for dangerous extensions oval:org.mitre.oval:def:26201 Vulnerability windows
A certain Red Hat modification to the ChrootDirectory feature in OpenSSH 4.8, as used in sshd in OpenSSH 4.3 in Red Hat ... oval:org.mitre.oval:def:9862 Vulnerability unix
A certain Red Hat configuration step for the qla2xxx driver in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL... oval:org.mitre.oval:def:9738 Vulnerability unix
A certain Red Hat patch for tog-pegasus in OpenGroup Pegasus 2.7.0 does not properly configure the PAM tty name, which a... oval:org.mitre.oval:def:9556 Vulnerability unix
A certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 4 on the ia64 platform allows local user... oval:org.mitre.oval:def:8687 Vulnerability unix
A certain Red Hat patch for net/ipv4/route.c in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 allows remo... oval:org.mitre.oval:def:11167 Vulnerability unix
A certain Red Hat build script for nfs-utils before 1.0.9-35z.el5_2 on Red Hat Enterprise Linux (RHEL) 5 omits TCP wrapp... oval:org.mitre.oval:def:10638 Vulnerability unix
A certain Red Hat patch for acpid 1.0.4 effectively triggers a call to the open function with insufficient arguments, wh... oval:org.mitre.oval:def:10555 Vulnerability unix
A certain Red Hat patch for SquirrelMail 1.4.8 sets the same SQMSESSID cookie value for all sessions, which allows remot... oval:org.mitre.oval:def:10366 Vulnerability unix
A cross-site scripting issue in events oval:org.mitre.oval:def:22690 Vulnerability windows
A denial of service caused via an animated PNG image in Opera before 10.61. oval:org.mitre.oval:def:11933 Vulnerability windows
A JavaScript API in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attack... oval:org.mitre.oval:def:16864 Vulnerability windows
A potential security vulnerability has been identified in the HP-UX running PAM using libpam_updbe in pam.conf... oval:org.mitre.oval:def:28359 Vulnerability unix
A regression error in Mozilla Firefox 2.x before and 1.x before, and SeaMonkey 1.1 before 1.1.1 and 1.0... oval:org.mitre.oval:def:9749 Vulnerability unix
Total number of results : 17127
Page : 1 2 (This Page) 3 4 5 6 7 8 9 10 11 12 13 21 31 41 51 61 71 81 91 101 111 121 131 141 151 161 171 181 191 201 211 221 231 241 251 261 271 281 291 301 311 321 331 341 351 361 371 381 391 401 411 421 431 441 451 461 471 481 491 501 511 521 531 541 551 561 571

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html