OVAL Definitions - Family: unix

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
ptrace vulnerability in AIX oval:org.mitre.oval:def:24867 Vulnerability unix
Puppet Enterprise before 3.2.0 does not properly restrict access to node endpoints in the console oval:org.mitre.oval:def:23842 Vulnerability unix
Puppet Enterprise is installed on Ubuntu oval:org.mitre.oval:def:24464 Inventory unix
pwlib, as used by Ekiga 2.0.5 and possibly other products, allows remote attackers to cause a denial of service (applica... oval:org.mitre.oval:def:10928 Vulnerability unix
pwmconfig in LM_sensors before 2.9.1 creates temporary files insecurely, which allows local users to overwrite arbitrary... oval:org.mitre.oval:def:9993 Vulnerability unix
pygrub (tools/pygrub/src/GrubConf.py) in Xen 3.0.3, when booting a guest domain, allows local users with elevated privil... oval:org.mitre.oval:def:11240 Vulnerability unix
Python 2.5.2 and earlier allows context-dependent attackers to execute arbitrary code via multiple vectors that cause a ... oval:org.mitre.oval:def:10407 Vulnerability unix
QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on t... oval:org.mitre.oval:def:9905 Vulnerability unix
Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host us... oval:org.mitre.oval:def:9706 Vulnerability unix
qemu-dm.debug in Xen 3.2.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/args tempora... oval:org.mitre.oval:def:9576 Vulnerability unix
Race condition in backend/ctrl.c in KDM in KDE Software Compilation (SC) 2.2.0 through 4.4.2 allows local users to chang... oval:org.mitre.oval:def:9999 Vulnerability unix
Race condition in Unzip 5.52 allows local users to modify permissions of arbitrary files via a hard link attack on a fil... oval:org.mitre.oval:def:9975 Vulnerability unix
Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for t... oval:org.mitre.oval:def:9938 Vulnerability unix
Race condition in cpio 2.6 and earlier allows local users to modify permissions of arbitrary files via a hard link attac... oval:org.mitre.oval:def:9783 Vulnerability unix
Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlie... oval:org.mitre.oval:def:9715 Vulnerability unix
Race condition in the rmtree function in File::Path 1.08 (lib/File/Path.pm) in Perl 5.8.8 allows local users to allows l... oval:org.mitre.oval:def:9699 Vulnerability unix
Race condition in shtool 2.0.1 and earlier allows local users to create or modify arbitrary files via a symlink attack o... oval:org.mitre.oval:def:9639 Vulnerability unix
Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.4... oval:org.mitre.oval:def:9567 Vulnerability unix
Race condition in the (1) add_key, (2) request_key, and (3) keyctl functions in Linux kernel 2.6.x allows local users to... oval:org.mitre.oval:def:9566 Vulnerability unix
Race condition in the do_setlk function in fs/nfs/file.c in the Linux kernel before 2.6.26 allows local users to cause a... oval:org.mitre.oval:def:9233 Vulnerability unix
Race condition between the kfree_skb and __skb_unlink functions in the socket buffer handling in Linux kernel 2.6.9, and... oval:org.mitre.oval:def:9117 Vulnerability unix
Race condition in Linux 2.6, when threads are sharing memory mapping via CLONE_VM (such as linuxthreads and vfork), migh... oval:org.mitre.oval:def:9108 Vulnerability unix
Race Condition Security Vulnerability in Solaris Auditing Related to Extended File Attributes May Allow Local Unprivileg... oval:org.mitre.oval:def:6168 Vulnerability unix
Race condition in the directory notification subsystem (dnotify) in Linux kernel 2.6.x before 2.6.24.6, and 2.6.25 befor... oval:org.mitre.oval:def:11843 Vulnerability unix
Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, a... oval:org.mitre.oval:def:11723 Vulnerability unix
Race condition in the SystemTap stap tool 0.0.20080705 and 0.0.20090314 allows local users in the stapusr group to inser... oval:org.mitre.oval:def:11613 Vulnerability unix
Race condition in the mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to ... oval:org.mitre.oval:def:11583 Vulnerability unix
Race condition in ebtables netfilter module (ebtables.c) in Linux 2.6, when running on an SMP system that is operating u... oval:org.mitre.oval:def:11403 Vulnerability unix
Race condition in sudo 1.3.1 up to 1.6.8p8, when the ALL pseudo-command is used after a user entry in the sudoers file, ... oval:org.mitre.oval:def:11341 Vulnerability unix
Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.4... oval:org.mitre.oval:def:11249 Vulnerability unix

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html