Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2008-10-15 CVE-2008-4020 Cross-Site Scripting vulnerability in Microsoft Office XP
Cross-site scripting (XSS) vulnerability in Microsoft Office XP SP3 allows remote attackers to inject arbitrary web script or HTML via a document that contains a "Content-Disposition: attachment" header and is accessed through a cdo: URL, which renders the content instead of raising a File Download dialog box, aka "Vulnerability in Content-Disposition Header Vulnerability."
network
microsoft CWE-79
4.3
2008-10-15 CVE-2008-4019 Integer Overflow or Wraparound vulnerability in Microsoft products
Integer overflow in the REPT function in Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2 and SP3, and 2007 Gold and SP1; Office Excel Viewer 2003 SP3; Office Excel Viewer; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office SharePoint Server 2007 Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via an Excel file containing a formula within a cell, aka "Formula Parsing Vulnerability."
network
microsoft CWE-190
critical
9.3
2008-10-15 CVE-2008-3479 Improper Input Validation vulnerability in Microsoft Windows 2000
Heap-based buffer overflow in the Microsoft Message Queuing (MSMQ) service (mqsvc.exe) in Microsoft Windows 2000 SP4 allows remote attackers to read memory contents and execute arbitrary code via a crafted RPC call, related to improper processing of parameters to string APIs, aka "Message Queuing Service Remote Code Execution Vulnerability."
network
low complexity
microsoft CWE-20
critical
10.0
2008-10-15 CVE-2008-3475 Use of Uninitialized Resource vulnerability in Microsoft Internet Explorer 5.01/6/7.0
Microsoft Internet Explorer 6 does not properly handle errors related to using the componentFromPoint method on xml objects that have been (1) incorrectly initialized or (2) deleted, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "Uninitialized Memory Corruption Vulnerability."
network
low complexity
microsoft CWE-908
8.8
2008-10-15 CVE-2008-3473 Permissions, Privileges, and Access Controls vulnerability in Microsoft Internet Explorer 5.01/6/7
Microsoft Internet Explorer 6 and 7 does not properly determine the domain or security zone of origin of web script, which allows remote attackers to bypass the intended cross-domain security policy, and execute arbitrary code or obtain sensitive information, via a crafted HTML document, aka "Event Handling Cross-Domain Vulnerability."
network
microsoft CWE-264
critical
9.3
2008-10-15 CVE-2008-3471 Out-of-bounds Write vulnerability in Microsoft products
Stack-based buffer overflow in Microsoft Excel 2000 SP3, 2002 SP3, 2003 SP2 and SP3, and 2007 Gold and SP1; Office Excel Viewer 2003 SP3; Office Excel Viewer; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via a BIFF file with a malformed record that triggers a user-influenced size calculation, aka "File Format Parsing Vulnerability."
network
microsoft CWE-787
critical
9.3
2008-10-15 CVE-2008-3466 Improper Authentication vulnerability in Microsoft products
Microsoft Host Integration Server (HIS) 2000, 2004, and 2006 does not limit RPC access to administrative functions, which allows remote attackers to bypass authentication and execute arbitrary programs via a crafted SNA RPC message using opcode 1 or 6 to call the CreateProcess function, aka "HIS Command Execution Vulnerability."
network
low complexity
microsoft CWE-287
critical
10.0
2008-10-15 CVE-2008-3464 Permissions, Privileges, and Access Controls vulnerability in Microsoft Windows 2003 Server and Windows XP
afd.sys in the Ancillary Function Driver (AFD) component in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP1 and SP2 does not properly validate input sent from user mode to the kernel, which allows local users to gain privileges via a crafted application, as demonstrated using crafted pointers and lengths that bypass intended ProbeForRead and ProbeForWrite restrictions, aka "AFD Kernel Overwrite Vulnerability."
local
low complexity
microsoft CWE-264
7.2
2008-10-15 CVE-2008-2252 Permissions, Privileges, and Access Controls vulnerability in Microsoft products
The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 does not properly validate parameters sent from user mode to the kernel, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Corruption Vulnerability."
local
low complexity
microsoft CWE-264
7.2
2008-10-15 CVE-2008-1446 Integer Overflow OR Wraparound vulnerability in Microsoft Internet Information Services
Integer overflow in the Internet Printing Protocol (IPP) ISAPI extension in Microsoft Internet Information Services (IIS) 5.0 through 7.0 on Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, and Server 2008 allows remote authenticated users to execute arbitrary code via an HTTP POST request that triggers an outbound IPP connection from a web server to a machine operated by the attacker, aka "Integer Overflow in IPP Service Vulnerability."
network
low complexity
microsoft CWE-190
critical
9.0