OVAL Definitions - Family: unix

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
The (1) tcltags or (2) vimspell.sh scripts in vim 6.3 allow local users to overwrite or create arbitrary files via a sym... oval:org.mitre.oval:def:9402 Vulnerability unix
The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlappi... oval:org.mitre.oval:def:9512 Vulnerability unix
The Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE 5.0 before Update 22 and 6 before Upd... oval:org.mitre.oval:def:10761 Vulnerability unix
The ACL plugin in Dovecot before 1.0.3 allows remote authenticated users with the insert right to save certain flags via... oval:org.mitre.oval:def:11558 Vulnerability unix
The ACL plugin in Dovecot before 1.1.4 treats negative access rights as if they are positive access rights, which allows... oval:org.mitre.oval:def:10376 Vulnerability unix
The acl_group_override function in smbd/posix_acls.c in smbd in Samba 3.0.x before 3.0.35, 3.1.x and 3.2.x before 3.2.13... oval:org.mitre.oval:def:10790 Vulnerability unix
The add_to_history function in svr_principal.c in libkadm5srv for MIT Kerberos 5 (krb5) up to 1.3.5, when performing a p... oval:org.mitre.oval:def:11911 Vulnerability unix
The aide package should be installed oval:gov.irs.rhel5:def:3 Compliance unix
The AIM dissector in Ethereal 0.10.3 allows remote attackers to cause a denial of service (assert error) via unknown att... oval:org.mitre.oval:def:9433 Vulnerability unix
The AIM/ICQ module in Gaim before 1.5.0 allows remote attackers to cause a denial of service (application crash) via a f... oval:org.mitre.oval:def:9283 Vulnerability unix
The aio_setup_ring function in Linux kernel does not properly initialize a variable, which allows local users to cause a... oval:org.mitre.oval:def:11234 Vulnerability unix
The alert-mailing implementation in HP Linux Imaging and Printing (HPLIP) 1.6.7 allows local users to gain privileges an... oval:org.mitre.oval:def:10136 Vulnerability unix
The allowed period of inactivity gnome desktop lockout should be configured correctly. oval:gov.irs.rhel5:def:71 Compliance unix
The alsa-lib package in Red Hat Linux 4 disables stack protection for the libasound.so library, which makes it easier fo... oval:org.mitre.oval:def:10355 Vulnerability unix
The anacron package should not be installed oval:gov.irs.rhel5:def:163 Compliance unix
The anacron package should not be installed oval:org.fedoraproject.f13:def:163 Compliance unix
The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to ... oval:org.mitre.oval:def:11452 Vulnerability unix
The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverr... oval:org.mitre.oval:def:11094 Vulnerability unix
The apache web servicer should be enabled or disabled as appropriate oval:gov.irs.sol10:def:24 Compliance unix
The APOP protocol allows remote attackers to guess the first 3 characters of a password via man-in-the-middle (MITM) att... oval:org.mitre.oval:def:9782 Vulnerability unix
The AppendAttributeValue function in the JavaScript engine in Mozilla Firefox 2.x before 2.0.0.18, Thunderbird 2.x befor... oval:org.mitre.oval:def:9449 Vulnerability unix
The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers ... oval:org.mitre.oval:def:10968 Vulnerability unix
The ap_get_mime_headers_core function in Apache httpd 2.0.49 allows remote attackers to cause a denial of service (memor... oval:org.mitre.oval:def:10605 Vulnerability unix
The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does... oval:org.mitre.oval:def:9935 Vulnerability unix
The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0... oval:org.mitre.oval:def:10981 Vulnerability unix
The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63... oval:org.mitre.oval:def:9577 Vulnerability unix
The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MP... oval:org.mitre.oval:def:10358 Vulnerability unix
The arrayShrink function (lib/Array.c) in Squid 2.6.STABLE17 allows attackers to cause a denial of service (process exit... oval:org.mitre.oval:def:11376 Vulnerability unix
The ASN.1 parser (pluto/asn1.c, libstrongswan/asn1/asn1.c, libstrongswan/asn1/asn1_parser.c) in (a) strongSwan 2.8 befor... oval:org.mitre.oval:def:11079 Vulnerability unix
The asn1buf_skiptail function in the ASN.1 decoder library for MIT Kerberos 5 (krb5) 1.2.2 through 1.3.4 allows remote a... oval:org.mitre.oval:def:10014 Vulnerability unix

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html