Vulnerabilities > Microsoft > Critical

DATE CVE VULNERABILITY TITLE RISK
2015-04-14 CVE-2015-1652 Resource Management Errors vulnerability in Microsoft Internet Explorer
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1666.
network
microsoft CWE-399
critical
9.3
2015-04-14 CVE-2015-1651 Use After Free Remote Code Execution vulnerability in Microsoft Office Compatibility Pack, Word and Word Viewer
Use-after-free vulnerability in Microsoft Word 2007 SP3, Word Viewer, and Office Compatibility Pack SP3 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability." <a href="http://cwe.mitre.org/data/definitions/416.html">CWE-416: Use After Free</a>
network
microsoft
critical
9.3
2015-04-14 CVE-2015-1650 Use After Free Remote Code Execution vulnerability in Microsoft Office
Use-after-free vulnerability in Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability." <a href="http://cwe.mitre.org/data/definitions/416.html">CWE-416: Use After Free</a>
network
microsoft
critical
9.3
2015-04-14 CVE-2015-1649 Use After Free Remote Code Execution vulnerability in Microsoft Office
Use-after-free vulnerability in Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps Server 2010 SP2 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability." <a href="http://cwe.mitre.org/data/definitions/416.html">CWE-416: Use After Free</a>
network
microsoft
critical
9.3
2015-04-14 CVE-2015-1645 Code Injection vulnerability in Microsoft products
Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allow remote attackers to execute arbitrary code via a crafted Enhanced Metafile (EMF) image, aka "EMF Processing Remote Code Execution Vulnerability."
network
microsoft CWE-94
critical
9.3
2015-04-14 CVE-2015-1635 Code Injection vulnerability in Microsoft products
HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka "HTTP.sys Remote Code Execution Vulnerability."
network
low complexity
microsoft CWE-94
critical
10.0
2015-03-13 CVE-2015-0342 Use After Free Remote Code Execution vulnerability in Adobe Flash Player
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0341.
network
low complexity
adobe linux apple microsoft
critical
10.0
2015-03-13 CVE-2015-0341 Use After Free Remote Code Execution vulnerability in Adobe Flash Player
Use-after-free vulnerability in Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0342.
network
low complexity
adobe linux apple microsoft
critical
10.0
2015-03-13 CVE-2015-0339 Resource Management Errors vulnerability in Adobe Flash Player
Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0332, CVE-2015-0333, and CVE-2015-0335.
network
low complexity
adobe linux apple microsoft CWE-399
critical
10.0
2015-03-13 CVE-2015-0338 Remote Integer Overflow vulnerability in Adobe Flash Player
Integer overflow in Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code via unspecified vectors.
network
low complexity
adobe linux apple microsoft
critical
10.0