Vulnerabilities > Microsoft > Office Communicator

DATE CVE VULNERABILITY TITLE RISK
2013-05-15 CVE-2013-1302 Buffer Errors vulnerability in Microsoft Lync, Lync Server and Office Communicator
Microsoft Communicator 2007 R2, Lync 2010, Lync 2010 Attendee, and Lync Server 2013 do not properly handle objects in memory, which allows remote attackers to execute arbitrary code via an invitation that triggers access to a deleted object, aka "Lync RCE Vulnerability."
network
microsoft CWE-119
critical
9.3
2012-10-09 CVE-2012-2520 Cross-Site Scripting vulnerability in Microsoft products
Cross-site scripting (XSS) vulnerability in Microsoft InfoPath 2007 SP2 and SP3 and 2010 SP1, Communicator 2007 R2, Lync 2010 and 2010 Attendee, SharePoint Server 2007 SP2 and SP3 and 2010 SP1, Groove Server 2010 SP1, Windows SharePoint Services 3.0 SP2, SharePoint Foundation 2010 SP1, and Office Web Apps 2010 SP1 allows remote attackers to inject arbitrary web script or HTML via a crafted string, aka "HTML Sanitization Vulnerability."
network
microsoft CWE-79
4.3
2008-11-20 CVE-2008-5181 Resource Management Errors vulnerability in Microsoft Office Communicator
Microsoft Communicator allows remote attackers to cause a denial of service (application or device outage) via instant messages containing large numbers of emoticons.
network
low complexity
microsoft CWE-399
5.0
2008-11-20 CVE-2008-5179 Remote Denial of Service vulnerability in Microsoft products
Unspecified vulnerability in Microsoft Office Communications Server (OCS), Office Communicator, and Windows Live Messenger allows remote attackers to cause a denial of service (crash) via a crafted Real-time Transport Control Protocol (RTCP) receiver report packet.
network
low complexity
microsoft
5.0
2008-07-07 CVE-2008-3068 Remote Information Disclosure vulnerability in Microsoft Crypto API X.509 Certificate Validation
Microsoft Crypto API 5.131.2600.2180 through 6.0, as used in Outlook, Windows Live Mail, and Office 2007, performs Certificate Revocation List (CRL) checks by using an arbitrary URL from a certificate embedded in a (1) S/MIME e-mail message or (2) signed document, which allows remote attackers to obtain reading times and IP addresses of recipients, and port-scan results, via a crafted certificate with an Authority Information Access (AIA) extension.
network
low complexity
microsoft
7.5