OVAL Definitions - Class: Vulnerability

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
Stack-based buffer overflow in the ASN.1 BER dissector in Wireshark oval:org.mitre.oval:def:12047 Vulnerability windows
Stack-based buffer overflow in SigPlus Pro 3.74 ActiveX control oval:org.mitre.oval:def:11304 Vulnerability windows
Stack-based buffer overflow in the browser plugin in Novell iPrint Client before 5.42 oval:org.mitre.oval:def:12046 Vulnerability windows
Stack-based buffer overflow in Novell iPrint Client before 5.44 oval:org.mitre.oval:def:11973 Vulnerability windows
Stack-based buffer overflow in mfc42.dll on Windows 2000 SP4 and XP SP2 and SP3 oval:org.mitre.oval:def:7192 Vulnerability windows
Stack-based buffer overflow in the text-rendering functionality in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11... oval:org.mitre.oval:def:11675 Vulnerability windows
Stack-based buffer overflow in the Intel Indeo41 codec oval:org.mitre.oval:def:11596 Vulnerability windows
Stack-based buffer overflow in dirapi.dll in Adobe Shockwave Player before 11.5.9.615 oval:org.mitre.oval:def:12077 Vulnerability windows
Stack-based buffer overflow in the GD extension in PHP before 5.2.15 and 5.3.x before 5.3.4 oval:org.mitre.oval:def:11939 Vulnerability windows
Stack-based buffer overflow in rt3d.dll of Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.2, and 8.x before... oval:org.mitre.oval:def:12550 Vulnerability windows
Stack-based buffer overflow in the ActionScript Virtual Machine (AVM) component in Adobe Flash Player before 10.3.183.10... oval:org.mitre.oval:def:14125 Vulnerability windows
Stack-based buffer overflow in the ActionScript Virtual Machine (AVM) component in Adobe Flash Player before 10.3.183.10... oval:org.mitre.oval:def:14070 Vulnerability windows
Stack-based buffer overflow in Adobe Flash Player before 10.3.183.11 and 11.x before 11.1.102.55 on Windows, Mac OS X, L... oval:org.mitre.oval:def:14165 Vulnerability windows
Stack-based buffer overflow in the validateUser implementation in the com.ibm.db2.das.core.DasSysCmd function in db2dasr... oval:org.mitre.oval:def:14687 Vulnerability windows
Stack-based buffer overflow in mw8sr.dll in Autonomy KeyView, as used in IBM Lotus Notes before 8.5.2 FP3, allows remote... oval:org.mitre.oval:def:14650 Vulnerability windows
Stack-based buffer overflow in IBM Lotus Notes 8.5 and 8.5fp1, and possibly other versions, allows remote attackers to e... oval:org.mitre.oval:def:14489 Vulnerability windows
Stack-based buffer overflow in rtfsr.dll in Autonomy KeyView, as used in IBM Lotus Notes before 8.5.2 FP3, allows remote... oval:org.mitre.oval:def:14309 Vulnerability windows
Stack-based buffer overflow in assr.dll in Autonomy KeyView, as used in IBM Lotus Notes before 8.5.2 FP3, allows remote ... oval:org.mitre.oval:def:13796 Vulnerability windows
Stack-based buffer overflow in FileWatcher in Google Chrome before 16.0.912.63 allows remote attackers to cause a denial... oval:org.mitre.oval:def:14847 Vulnerability windows
Stack-based buffer overflow in Google Chrome before 16.0.912.75 allows remote attackers to cause a denial of service or ... oval:org.mitre.oval:def:14871 Vulnerability windows
Stack-based buffer overflow in the ParseSSA function (modules/demux/subtitle.c) in VLC 0.8.6e oval:org.mitre.oval:def:14872 Vulnerability windows
Stack-based buffer overflow in the parse_master function in the Ty demux plugin (modules/demux/ty.c) in VLC Media Player... oval:org.mitre.oval:def:14803 Vulnerability windows
Stack-based buffer overflow in the Win32AddConnection function in modules/access/smb.c in VideoLAN VLC media player 0.9.... oval:org.mitre.oval:def:14800 Vulnerability windows
Stack-based buffer overflow in VideoLAN VLC media player 0.5.0 through 0.9.5 oval:org.mitre.oval:def:14798 Vulnerability windows
Stack-based buffer overflow in VideoLAN VLC Media Player 0.8.6 oval:org.mitre.oval:def:14342 Vulnerability windows
Stack-based buffer overflow in modules/demux/subtitle.c in VideoLAN VLC 0.8.6d oval:org.mitre.oval:def:14334 Vulnerability windows
Stack-based buffer overflow in VideoLAN VLC media player 0.9.x before 0.9.6 oval:org.mitre.oval:def:14329 Vulnerability windows
Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 oval:org.mitre.oval:def:15000 Vulnerability windows
Stack-based buffer overflow in VideoLAN VLC media player before 2.0.1 oval:org.mitre.oval:def:14820 Vulnerability windows
Stack-based buffer overflow in Nullsoft Winamp 5.32 oval:org.mitre.oval:def:15562 Vulnerability windows

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html