Vulnerabilities > Microsoft

DATE CVE VULNERABILITY TITLE RISK
2006-04-11 CVE-2006-1190 Unspecified vulnerability in Microsoft Internet Explorer
Microsoft Internet Explorer 5.01 through 6 does not always return the correct IOleClientSite information when dynamically creating an embedded object, which could cause Internet Explorer to run the object in the wrong security context or zone, and allow remote attackers to execute arbitrary code.
network
low complexity
microsoft
critical
10.0
2006-04-11 CVE-2006-1189 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Microsoft Internet Explorer
Buffer overflow in URLMON.DLL in Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via a crafted URL with an International Domain Name (IDN) using double-byte character sets (DBCS), aka the "Double Byte Character Parsing Memory Corruption Vulnerability."
network
low complexity
microsoft CWE-119
critical
10.0
2006-04-11 CVE-2006-1188 Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via HTML elements with a certain crafted tag, which leads to memory corruption.
network
low complexity
microsoft canon
7.5
2006-04-11 CVE-2006-1186 Unspecified vulnerability in Microsoft IE and Internet Explorer
Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via by instantiating the (1) Mdt2gddr.dll, (2) Mdt2dd.dll, and (3) Mdt2gddo.dll COM objects as ActiveX controls, which leads to memory corruption.
network
low complexity
microsoft
critical
10.0
2006-04-11 CVE-2006-1185 Unspecified vulnerability in Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via certain invalid HTML that causes memory corruption.
network
low complexity
microsoft canon
7.5
2006-04-11 CVE-2006-0015 Cross-Site Scripting vulnerability in Microsoft products
Cross-site scripting (XSS) vulnerability in _vti_bin/_vti_adm/fpadmdll.dll in Microsoft FrontPage Server Extensions 2002 and SharePoint Team Services allows remote attackers to inject arbitrary web script or HTML, then leverage the attack to execute arbitrary programs or create new accounts, via the (1) operation, (2) command, and (3) name parameters.
network
microsoft
6.8
2006-04-05 CVE-2006-1626 Improper Input Validation vulnerability in Microsoft Internet Explorer 6.0
Internet Explorer 6 for Windows XP SP2 and earlier allows remote attackers to spoof the address bar and possibly conduct phishing attacks by re-opening the window to a malicious Shockwave Flash application, then changing the window location back to a trusted URL while the Flash application is still loading.
network
microsoft CWE-20
4.3
2006-04-03 CVE-2006-1591 Heap Overflow vulnerability in Microsoft Windows Help Image Processing
Heap-based buffer overflow in Microsoft Windows Help winhlp32.exe allows user-assisted attackers to execute arbitrary code via crafted embedded image data in a .hlp file.
network
high complexity
microsoft
5.1
2006-03-30 CVE-2006-1540 Code Injection vulnerability in Microsoft Office
MSO.DLL in Microsoft Office 2000, Office XP (2002), and Office 2003 allows user-assisted attackers to cause a denial of service and execute arbitrary code via multiple attack vectors, as originally demonstrated using a crafted document record with a malformed string, as demonstrated by replacing a certain "01 00 00 00" byte sequence with an "FF FF FF FF" byte sequence, possibly causing an invalid array index, in (1) an Excel .xls document, which triggers an access violation in ole32.dll; (2) an Excel .xlw document, which triggers an access violation in excel.exe; (3) a Word document, which triggers an access violation in mso.dll in winword.exe; and (4) a PowerPoint document, which triggers an access violation in powerpnt.txt.
network
microsoft CWE-94
critical
9.3
2006-03-30 CVE-2006-1511 Buffer Overflow vulnerability in Microsoft .NET Framework SDK MSIL Tools
Buffer overflow in the ILASM assembler in the Microsoft .NET 1.0 and 1.1 Framework might allow user-assisted attackers to execute arbitrary code via a .il file that calls a function with a long name.
network
high complexity
microsoft
5.1