OVALdb logo

Professional OVAL Repository

Skip Navigation LinksOVAL Items > OVAL Item Details
Id
oval:org.mitre.oval:tst:3118
Version
1
Scheme
http://oval.mitre.org/XMLSchema/oval-definitions-5#windows

Comment
the patch q323759 is installed (Installed Components key)

OVAL item
  • Collapse
    REGISTRY_TEST  (ID = oval:org.mitre.oval:tst:3118)  xmlns=http://oval.mitre.org/XMLSchema/oval-definitions-5#windows, version=1, check=at least one, comment=the patch q323759 is installed (Installed Components key), check_existence=at_least_one_exists
    • registry_object (ID = oval:org.mitre.oval:obj:1773)
      hive HKEY_LOCAL_MACHINE
      key operation=equals | value=SOFTWARE\Microsoft\Active Setup\Installed Components\{61E6EAE5-7821-4AC1-9BBD-AED032A8E273}
      name operation=equals | value=IsInstalled
    • registry_state (ID = oval:org.mitre.oval:ste:2921)
      value operation=equals | datatype=int | value=1

Referencing Items
Id 
Comment 
Type 
Open filter row popup menu
Open filter row popup menu
Open filter row popup menu
oval:org.mitre.oval:def:99 IE v6.0 Content Disposition/Type Arbitrary Code Executionvulnerability
oval:org.mitre.oval:def:98 Gopher Client Buffer Overflowvulnerability
oval:org.mitre.oval:def:974 IE Frame Domain Verification Vulnerabilityvulnerability
oval:org.mitre.oval:def:96 IE Cookie-based Script Executionvulnerability
oval:org.mitre.oval:def:925 MS IE HTML Directive Buffer Overflowvulnerability
oval:org.mitre.oval:def:923 Zone Spoofing through Malformed Web Page Vulnerabilityvulnerability
oval:org.mitre.oval:def:921 IE File Execution User-prompt Bypass Vulnerabilityvulnerability
oval:org.mitre.oval:def:77 IE v5.5 GetObject File Retrievalvulnerability
oval:org.mitre.oval:def:50 IE v5.01 GetObject File Retrievalvulnerability
oval:org.mitre.oval:def:40 IE v5.5,SP2 GetObject File Retrievalvulnerability
oval:org.mitre.oval:def:32 IE v6.0 Forced Script Executionvulnerability
oval:org.mitre.oval:def:27 IE v5.01 Content Disposition/Type Arbitrary Code Executionvulnerability
oval:org.mitre.oval:def:23 IE v5.5 Forced Script Executionvulnerability
oval:org.mitre.oval:def:19 IE Cross-Site Scriptingvulnerability
oval:org.mitre.oval:def:17 IE GetObject Security Bypassvulnerability
oval:org.mitre.oval:def:12 IE v5.5,SP2 Forced Script Executionvulnerability
oval:org.mitre.oval:def:1014 IE File Download Dialog Deception Vulnerabilityvulnerability
oval:ru.altx-soft.win:def:21342 Уязвимость проверки домена фрейма IE (CVE-2002-0027)vulnerability
oval:ru.altx-soft.win:def:21351 Переполнение буфера в директиве HTML (CVE-2002-0022)vulnerability
oval:ru.altx-soft.win:def:21353 Уязвимость подмены зоны через веб-страницу неправильного формата (CVE-2002-0190)vulnerability
oval:ru.altx-soft.win:def:21354 Уязвимость, позволяющая обойти запрос пользователя на выполнение файла в IE (CVE-2001-0727)vulnerability
oval:com.altx-soft.win:def:21342 IE Frame Domain Verification Vulnerability (CVE-2002-0027)vulnerability
oval:com.altx-soft.win:def:21351 MS IE HTML Directive Buffer Overflow (CVE-2002-0022)vulnerability
oval:com.altx-soft.win:def:21353 Zone Spoofing through Malformed Web Page Vulnerability (CVE-2002-0190)vulnerability
oval:com.altx-soft.win:def:21354 IE File Execution User-prompt Bypass Vulnerability (CVE-2001-0727)vulnerability

company ALTEX-SOFT 2008-2019, © AO ALTEX-SOFT , ovaldb@altx-soft.com

OVAL and the OVAL logo are registered trademarks of The MITRE Corporation. Other names may be trademarks of their respective owners.