Item Search

NameAudit NamePluginCategory
ALMA-09-044570 - AlmaLinux OS 9 must implement nonexecutable data to protect its memory from unauthorized code execution.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

ALMA-09-044680 - AlmaLinux OS 9 must enable mitigations against processor-based vulnerabilities.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

ALMA-09-044790 - AlmaLinux OS 9 must clear memory when it is freed to prevent use-after-free attacks.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

ALMA-09-044900 - AlmaLinux OS 9 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

OL07-00-040201 - The Oracle Linux operating system must implement virtual address space randomization.DISA Oracle Linux 7 STIG v3r2Unix

SYSTEM AND INFORMATION INTEGRITY

OL08-00-010420 - OL 8 must implement non-executable data to protect its memory from unauthorized code execution.DISA Oracle Linux 8 STIG v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

OL08-00-010430 - OL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.DISA Oracle Linux 8 STIG v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

PHTN-30-000065 - The Photon operating system must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.DISA STIG VMware vSphere 7.0 Photon OS v1r4Unix

SYSTEM AND INFORMATION INTEGRITY

PHTN-40-000160 The Photon operating system must implement address space layout randomization to protect its memory from unauthorized code execution.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

SYSTEM AND INFORMATION INTEGRITY

PHTN-67-000069 - The Photon operating system must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-08-010420 - RHEL 8 must implement non-executable data to protect its memory from unauthorized code execution.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-08-010430 - RHEL 8 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-09-212045 - RHEL 9 must clear memory when it is freed to prevent use-after-free attacks.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

RHEL-09-212050 - RHEL 9 must enable mitigations against processor-based vulnerabilities.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

RHEL-09-213025 - RHEL 9 must restrict exposed kernel pointer addresses access.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

RHEL-09-213070 - RHEL 9 must implement address space layout randomization (ASLR) to protect its memory from unauthorized code execution.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-09-213110 - RHEL 9 must implement nonexecutable data to protect its memory from unauthorized code execution.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

SLES-12-030330 - Address space layout randomization (ASLR) must be implemented by the SUSE operating system to protect memory from unauthorized code execution.DISA SLES 12 STIG v3r2Unix

SYSTEM AND INFORMATION INTEGRITY

SLES-15-010540 - The SUSE operating system must implement kptr-restrict to prevent the leaking of internal kernel addresses.DISA SLES 15 STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

SLES-15-010550 - Address space layout randomization (ASLR) must be implemented by the SUSE operating system to protect memory from unauthorized code execution.DISA SLES 15 STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-16-030130 - The Ubuntu operating system must implement non-executable data to protect its memory from unauthorized code execution.DISA STIG Ubuntu 16.04 LTS v2r3Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-16-030140 - The Ubuntu operating system must implement address space layout randomization to protect its memory from unauthorized code execution.DISA STIG Ubuntu 16.04 LTS v2r3Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-18-010513 - The Ubuntu operating system must implement non-executable data to protect its memory from unauthorized code execution.DISA STIG Ubuntu 18.04 LTS v2r15Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-18-010514 - The Ubuntu operating system must implement address space layout randomization to protect its memory from unauthorized code execution.DISA STIG Ubuntu 18.04 LTS v2r15Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-20-010447 - The Ubuntu operating system must implement nonexecutable data to protect its memory from unauthorized code execution.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-20-010448 - The Ubuntu operating system must implement address space layout randomization to protect its memory from unauthorized code execution.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-22-213020 - Ubuntu 22.04 LTS must implement address space layout randomization to protect its memory from unauthorized code execution.DISA Canonical Ubuntu 22.04 LTS STIG v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-22-213025 - Ubuntu 22.04 LTS must implement nonexecutable data to protect its memory from unauthorized code execution.DISA Canonical Ubuntu 22.04 LTS STIG v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-24-700300 - Ubuntu 24.04 LTS must implement nonexecutable data to protect its memory from unauthorized code execution.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-24-700310 - Ubuntu 24.04 LTS must implement address space layout randomization to protect its memory from unauthorized code execution.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

SYSTEM AND INFORMATION INTEGRITY

WINCC-000078 - EMET system-wide Address Space Layout Randomization (ASLR) must be enabled and configured to Application Opt In.DISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WINCC-000080 - EMET Default Protections for Recommended Software must be enabled. - AcroRd32.exeDISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WINCC-000080 - EMET Default Protections for Recommended Software must be enabled. - OIS.EXEDISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WINCC-000081 - EMET Default Protections for Popular Software must be enabled. - *\opera.exeDISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WINCC-000081 - EMET Default Protections for Popular Software must be enabled. - chrome.exeDISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WINCC-000081 - EMET Default Protections for Popular Software must be enabled. - communicator.exeDISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WINCC-000081 - EMET Default Protections for Popular Software must be enabled. - googletalk.exeDISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WINCC-000081 - EMET Default Protections for Popular Software must be enabled. - iTunes.exeDISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WINCC-000081 - EMET Default Protections for Popular Software must be enabled. - opera.exeDISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WINCC-000081 - EMET Default Protections for Popular Software must be enabled. - winzip32.exeDISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WINCC-000081 - EMET Default Protections for Popular Software must be enabled. - WLXPhotoGallery.exeDISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WINCC-000082 - EMET system-wide Data Execution Prevention (DEP) must be enabled and configured to at least Application Opt Out.DISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WN11-00-000145 - Data Execution Prevention (DEP) must be configured to at least OptOut.DISA Microsoft Windows 11 STIG v2r3Windows

SYSTEM AND INFORMATION INTEGRITY

WN11-00-000150 - Structured Exception Handling Overwrite Protection (SEHOP) must be enabled.DISA Microsoft Windows 11 STIG v2r3Windows

SYSTEM AND INFORMATION INTEGRITY

WN11-CC-000215 - Explorer Data Execution Prevention must be enabled.DISA Microsoft Windows 11 STIG v2r3Windows

SYSTEM AND INFORMATION INTEGRITY

WN12-CC-000089 - Explorer Data Execution Prevention must be enabled.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND INFORMATION INTEGRITY

WN16-CC-000340 - Explorer Data Execution Prevention must be enabled.DISA Microsoft Windows Server 2016 STIG v2r10Windows

SYSTEM AND INFORMATION INTEGRITY

WN19-CC-000310 - Windows Server 2019 Explorer Data Execution Prevention must be enabled.DISA Microsoft Windows Server 2019 STIG v3r4Windows

SYSTEM AND INFORMATION INTEGRITY

WN22-CC-000310 - Windows Server 2022 Explorer Data Execution Prevention must be enabled.DISA Microsoft Windows Server 2022 STIG v2r4Windows

SYSTEM AND INFORMATION INTEGRITY

WN22-UR-000160 - Windows Server 2022 lock pages in memory user right must not be assigned to any groups or accounts.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY