oval:org.mitre.oval:tst:2812 Windows : Registry Test

active scripting is enabled for the current user

Related Definitions

Title Definition Id Comment
IE6,SP1 DHTML Method Heap Memory Corruption Vulnerability oval:org.mitre.oval:def:1005 active scripting is enabled for the current user
WinXP,SP2 Drag-and-Drop Vulnerability oval:org.mitre.oval:def:1015 active scripting is enabled for the current user
IE5.01,SP3 File Disclosure via Redirects Vulnerability oval:org.mitre.oval:def:1026 active scripting is enabled for the current user
IE6:XP,SP2 COM Object Instantiation Memory Corruption Vulnerability oval:org.mitre.oval:def:1061 active scripting is enabled for the current user
Scob and Toofer Internet Explorer v6.0,SP1 Vulnerabilities oval:org.mitre.oval:def:1133 active scripting is enabled for the current user
IE6 Installed XP,SP2 File Disclosure via Redirects Vulnerability oval:org.mitre.oval:def:1148 active scripting is enabled for the current user
Microsoft Agent Security Prompt Spoofing Vulnerability (Windows XP) oval:org.mitre.oval:def:1194 active scripting is enabled for the current user
URL Parsing Memory Corruption Vulnerability (IE5.01,SP3) oval:org.mitre.oval:def:1196 active scripting is enabled for the current user
IE6,SP1 File Disclosure via Redirects Vulnerability oval:org.mitre.oval:def:1207 active scripting is enabled for the current user
IE6:S03 COM Object Instantiation Memory Corruption Vulnerability oval:org.mitre.oval:def:1221 active scripting is enabled for the current user
IE6,SP1 COM Object Instantiation Memory Corruption Vulnerability oval:org.mitre.oval:def:1235 active scripting is enabled for the current user
IE5.01,SP4 Security Zone Restriction Bypass Vulnerability oval:org.mitre.oval:def:1308 active scripting is enabled for the current user
IE6:XP,SP2 Web Folder Behaviors Cross-Domain Vulnerability oval:org.mitre.oval:def:1319 active scripting is enabled for the current user
IE5.01,SP4 Java Proxy COM Object Instantiation Memory Corruption Vulnerability oval:org.mitre.oval:def:1326 active scripting is enabled for the current user
IE6 for Server 2003 Drag-and-Drop Vulnerability oval:org.mitre.oval:def:1334 active scripting is enabled for the current user
IE5.01,SP4 COM Object Instantiation Memory Corruption Vulnerability oval:org.mitre.oval:def:1337 active scripting is enabled for the current user
Server 2003 IE HTML Help ActiveX control Cross Domain Vulnerability oval:org.mitre.oval:def:1349 active scripting is enabled for the current user
IE6,SP1 Java Proxy COM Object Instantiation Memory Corruption Vulnerability oval:org.mitre.oval:def:1506 active scripting is enabled for the current user
IE6:S03 Java Proxy COM Object Instantiation Memory Corruption Vulnerability oval:org.mitre.oval:def:1518 active scripting is enabled for the current user
IE v6.0,SP1 Drag-and-Drop Code Execution Vulnerability oval:org.mitre.oval:def:1563 active scripting is enabled for the current user
DHTML Object Memory Corruption Vulnerability (IE6 for XP,SP2) oval:org.mitre.oval:def:1695 active scripting is enabled for the current user
IE5.01,SP3 Security Zone Restriction Bypass Vulnerability oval:org.mitre.oval:def:1736 active scripting is enabled for the current user
Windows XP IE HTML Help ActiveX control Cross Domain Vulnerability oval:org.mitre.oval:def:1963 active scripting is enabled for the current user
DEPRECATED: Windows Script Engine Heap Overflow (Test 1) oval:org.mitre.oval:def:200 active scripting is enabled for the current user
Windows 2000 Drag-and-Drop Vulnerability oval:org.mitre.oval:def:2046 active scripting is enabled for the current user
Scob and Toofer Internet Explorer v6.0,SP1 for Server 2003 Vulnerabilities oval:org.mitre.oval:def:207 active scripting is enabled for the current user
IE v5.01,SP3 Drag-and-Drop Code Execution Vulnerability oval:org.mitre.oval:def:2073 active scripting is enabled for the current user
IE5.01,SP3 Content Advisor Memory Corruption Vulnerability oval:org.mitre.oval:def:2077 active scripting is enabled for the current user
URL Parsing Memory Corruption Vulnerability (IE5.01,SP4) oval:org.mitre.oval:def:2253 active scripting is enabled for the current user
IE5.01,SP3 Channel Definition Format Cross Domain Vulnerability oval:org.mitre.oval:def:2385 active scripting is enabled for the current user
Scob and Toofer Internet Explorer v5.5,SP2 Vulnerabilities oval:org.mitre.oval:def:241 active scripting is enabled for the current user
Address Bar Spoofing on Double Byte Character Set Systems Vulnerability (Server 2003) oval:org.mitre.oval:def:2448 active scripting is enabled for the current user
IE v6.0 Plug-in Navigation Address Bar Spoofing Vulnerability oval:org.mitre.oval:def:2487 active scripting is enabled for the current user
IE v5.01,SP4 Plug-in Navigation Address Bar Spoofing Vulnerability oval:org.mitre.oval:def:2537 active scripting is enabled for the current user
URL Parsing Memory Corruption Vulnerability (IE6 for Server 2003) oval:org.mitre.oval:def:2559 active scripting is enabled for the current user
IE v6.0 HijackClick 3 / Script in Image Tag File Download Vulnerability oval:org.mitre.oval:def:2611 active scripting is enabled for the current user
IE5.01,SP3 DHTML Method Heap Memory Corruption Vulnerability oval:org.mitre.oval:def:2692 active scripting is enabled for the current user
IE5.01,SP4 Content Advisor Memory Corruption Vulnerability oval:org.mitre.oval:def:2786 active scripting is enabled for the current user
IE for Server 2003 Channel Definition Format Cross Domain Vulnerability oval:org.mitre.oval:def:2817 active scripting is enabled for the current user
Windows 2000 IE HTML Help ActiveX control Cross Domain Vulnerability oval:org.mitre.oval:def:2830 active scripting is enabled for the current user
Windows 2000, IE v5.01 CSS Heap Memory Corruption Vulnerability oval:org.mitre.oval:def:2906 active scripting is enabled for the current user
IE5.01,SP3 Drag-and-Drop Vulnerability oval:org.mitre.oval:def:3006 active scripting is enabled for the current user
IE6 for Server 2003 Security Zone Restriction Bypass Vulnerability oval:org.mitre.oval:def:3060 active scripting is enabled for the current user
DHTML Object Memory Corruption Vulnerability (IE6 for Server 2003) oval:org.mitre.oval:def:3100 active scripting is enabled for the current user
IE6 DHTML Method Heap Memory Corruption Vulnerability (Server 2003) oval:org.mitre.oval:def:3137 active scripting is enabled for the current user
IE6 (for XP,SP2) Content Advisor Memory Corruption Vulnerability oval:org.mitre.oval:def:3157 active scripting is enabled for the current user
IE6.0,SP2 Security Zone Restriction Bypass Vulnerability oval:org.mitre.oval:def:3196 active scripting is enabled for the current user
IE6,SP1 Channel Definition Format Cross Domain Vulnerability oval:org.mitre.oval:def:3318 active scripting is enabled for the current user
IE v5.01,SP2 ExecCommand Cross Domain Zone Restriction Bypass oval:org.mitre.oval:def:335 active scripting is enabled for the current user
Windows Server 2003, IE v6,SP1 CSS Heap Memory Corruption Vulnerability oval:org.mitre.oval:def:3372 active scripting is enabled for the current user
Total number of results : 154
Page : 1 (This Page) 2 3 4

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html