OVAL Definitions - Family: unix

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
VMware third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX oval:org.mitre.oval:def:20301 Vulnerability unix
VMware third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX oval:org.mitre.oval:def:20243 Vulnerability unix
VMware third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX oval:org.mitre.oval:def:20226 Vulnerability unix
VMware third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX oval:org.mitre.oval:def:20190 Vulnerability unix
VMware third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX oval:org.mitre.oval:def:20186 Vulnerability unix
VMware third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX oval:org.mitre.oval:def:20077 Vulnerability unix
VMware third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX oval:org.mitre.oval:def:20014 Vulnerability unix
VMware third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX oval:org.mitre.oval:def:19986 Vulnerability unix
VMware third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX oval:org.mitre.oval:def:19972 Vulnerability unix
VMware third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX oval:org.mitre.oval:def:19857 Vulnerability unix
VMware third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX oval:org.mitre.oval:def:19776 Vulnerability unix
VMware third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX oval:org.mitre.oval:def:19768 Vulnerability unix
VMware third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX oval:org.mitre.oval:def:19752 Vulnerability unix
VMware third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX oval:org.mitre.oval:def:19749 Vulnerability unix
VMware third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX oval:org.mitre.oval:def:19678 Vulnerability unix
VMware Tools Input Validation Flaw in Windows Guest OS Lets Local Users Gain Elevated Privileges oval:org.mitre.oval:def:5688 Vulnerability unix
VMware Tools Input Validation Flaw in Windows Guest OS Lets Local Users Gain Elevated Privileges oval:org.mitre.oval:def:5358 Vulnerability unix
VMware Unsafe Library Path in vmware-authd Lets Local Users Gain Elevated Privileges oval:org.mitre.oval:def:5583 Vulnerability unix
VMware Unsafe Library Path in vmware-authd Lets Local Users Gain Elevated Privileges oval:org.mitre.oval:def:4768 Vulnerability unix
VMware vCenter Server, ESXi and ESX address an NFC Protocol memory corruption and third party library security issues. oval:org.mitre.oval:def:20707 Vulnerability unix
VMware vCenter Server, Orchestrator, Update Manager, vShield, vSphere Client, Workstation, Player, ESXi and ESX address ... oval:org.mitre.oval:def:20659 Vulnerability unix
VMware vCenter Server, Orchestrator, Update Manager, vShield, vSphere Client, Workstation, Player, ESXi and ESX address ... oval:org.mitre.oval:def:20657 Vulnerability unix
VMware vCenter Server, Orchestrator, Update Manager, vShield, vSphere Client, Workstation, Player, ESXi and ESX address ... oval:org.mitre.oval:def:20594 Vulnerability unix
VMware vCenter Server, Orchestrator, Update Manager, vShield, vSphere Client, Workstation, Player, ESXi and ESX address ... oval:org.mitre.oval:def:20494 Vulnerability unix
VMware vCenter Server, Orchestrator, Update Manager, vShield, vSphere Client, Workstation, Player, ESXi and ESX address ... oval:org.mitre.oval:def:20278 Vulnerability unix
VMware vCenter Server, Orchestrator, Update Manager, vShield, vSphere Client, Workstation, Player, ESXi and ESX address ... oval:org.mitre.oval:def:20252 Vulnerability unix
VMware vCenter Server, ESXi and ESX address an NFC Protocol memory corruption and third party library security issues. oval:org.mitre.oval:def:19831 Vulnerability unix
VMware vCenter, ESX patch and vCenter Lab Manager cross-site scripting issues oval:org.mitre.oval:def:5944 Vulnerability unix
VMware Virtual Infrastructure Client Password Disclosure Weakness oval:org.mitre.oval:def:6376 Vulnerability unix
VMware vmkernel third party e1000 Driver Packet Filter Bypass oval:org.mitre.oval:def:12440 Vulnerability unix

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html