OVAL Definitions - Family: unix

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
The DBLink module in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, 7.4 before 7.4.19, and 7.3 befor... oval:org.mitre.oval:def:11127 Vulnerability unix
The dbus_signature_validate function in the D-bus library (libdbus) before 1.2.4 allows remote attackers to cause a deni... oval:org.mitre.oval:def:10253 Vulnerability unix
The DCERPC/NT dissector in Wireshark 0.10.10 through 1.0.9 and 1.2.0 through 1.2.2 allows remote attackers to cause a de... oval:org.mitre.oval:def:10103 Vulnerability unix
The DCP ETSI dissector in Wireshark (formerly Ethereal) 0.99.6 allows remote attackers to cause a denial of service (lon... oval:org.mitre.oval:def:9880 Vulnerability unix
The decompress function in compress42.c in (1) ncompress 4.2.4 and (2) liblzw allows remote attackers to cause a denial ... oval:org.mitre.oval:def:9373 Vulnerability unix
The default catalina.policy in the JULI logging component in Apache Tomcat 5.5.9 through 5.5.25 and 6.0.0 through 6.0.15... oval:org.mitre.oval:def:10417 Vulnerability unix
The default configuration for autofs 5 (autofs5) in some Linux distributions, such as Red Hat Enterprise Linux (RHEL) 4 ... oval:org.mitre.oval:def:11457 Vulnerability unix
The default configuration of autofs 5 in some Linux distributions, such as Red Hat Enterprise Linux (RHEL) 5, omits the ... oval:org.mitre.oval:def:10158 Vulnerability unix
The default configuration of su in /etc/pam.d/su in GNU coreutils 5.2.1 allows local users to gain the privileges of a (... oval:org.mitre.oval:def:10029 Vulnerability unix
The delegate code in ImageMagick 6.2.4.5-0.3 allows remote attackers to execute arbitrary commands via shell metacharact... oval:org.mitre.oval:def:10353 Vulnerability unix
The der_chop script in the openssl package in Trustix Secure Linux 1.5 through 2.1 and other operating systems allows lo... oval:org.mitre.oval:def:10621 Vulnerability unix
The deserialization code in PHP before 4.3.10 and PHP 5.x up to 5.0.2 allows remote attackers to cause a denial of servi... oval:org.mitre.oval:def:10511 Vulnerability unix
The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including... oval:org.mitre.oval:def:10186 Vulnerability unix
The Device Mapper multipathing driver (aka multipath-tools or device-mapper-multipath) 0.4.8, as used in SUSE openSUSE, ... oval:org.mitre.oval:def:9214 Vulnerability unix
The dev_queue_xmit function in Linux kernel 2.6 can fail before calling the local_bh_disable function, which could lead ... oval:org.mitre.oval:def:11679 Vulnerability unix
The dhcp package should not be installed oval:gov.irs.rhel5:def:220 Compliance unix
The dhcp package should not be installed oval:org.fedoraproject.f13:def:220 Compliance unix
The DHCP server functionality should be enabled or disabled as appropriate. oval:gov.irs.sol10:def:43 Compliance unix
The die_if_kernel function in arch/ia64/kernel/unaligned.c in Linux kernel 2.6.x before 2.6.15.6, possibly when compiled... oval:org.mitre.oval:def:10742 Vulnerability unix
The directory-services functionality in the scheduler in CUPS 1.1.17 and 1.1.22 allows remote attackers to cause a denia... oval:org.mitre.oval:def:11855 Vulnerability unix
The directory-services functionality in the scheduler in CUPS 1.1.17 and 1.1.22 allows remote attackers to cause a denia... oval:org.mitre.oval:def:11217 Vulnerability unix
The disconnect method in the Philips USB Webcam (pwc) driver in Linux kernel 2.6.x before 2.6.22.6 "relies on user space... oval:org.mitre.oval:def:10494 Vulnerability unix
The dissect_attribute_value_pairs function in packet-radius.c for Ethereal 0.8.13 to 0.10.2 allows remote attackers to c... oval:org.mitre.oval:def:9196 Vulnerability unix
The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows... oval:org.mitre.oval:def:9821 Vulnerability unix
The Distributed Lock Manager (DLM) in the cluster manager for Linux kernel 2.6.15 allows remote attackers to cause a den... oval:org.mitre.oval:def:9337 Vulnerability unix
The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does ... oval:org.mitre.oval:def:9793 Vulnerability unix
The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windo... oval:org.mitre.oval:def:9627 Vulnerability unix
The DNS server functionality should be enabled or disabled as appropriate. oval:gov.irs.sol10:def:44 Compliance unix
The dns_db_findrdataset function in db.c in named in ISC BIND 9.4 before 9.4.3-P3, 9.5 before 9.5.1-P3, and 9.6 before 9... oval:org.mitre.oval:def:10414 Vulnerability unix
The DOC.print function in the Adobe JavaScript API, as used by Adobe Acrobat and Reader before 8.1.2, allows remote atta... oval:org.mitre.oval:def:9731 Vulnerability unix

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html