Vulnerabilities > Microsoft > Critical

DATE CVE VULNERABILITY TITLE RISK
2013-05-15 CVE-2013-1319 Remote Code Execution vulnerability in Microsoft Publisher 2003
Microsoft Publisher 2003 SP3 does not properly check the return value of an unspecified method, which allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Return Value Handling Vulnerability."
network
low complexity
microsoft
critical
10.0
2013-05-15 CVE-2013-1318 Improper Input Validation vulnerability in Microsoft Publisher 2003
Microsoft Publisher 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Publisher file that triggers access to an invalid pointer, aka "Publisher Corrupt Interface Pointer Vulnerability."
network
low complexity
microsoft CWE-20
critical
10.0
2013-05-15 CVE-2013-1317 Integer Overflow OR Wraparound vulnerability in Microsoft Publisher 2003
Integer overflow in Microsoft Publisher 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Publisher file that triggers an improper allocation-size calculation, aka "Publisher Integer Overflow Vulnerability."
network
microsoft CWE-190
critical
9.3
2013-05-15 CVE-2013-1316 Improper Input Validation vulnerability in Microsoft Publisher 2003
Microsoft Publisher 2003 SP3 does not properly validate the size of an unspecified array, which allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Negative Value Allocation Vulnerability."
network
microsoft CWE-20
critical
9.3
2013-05-15 CVE-2013-1312 USE After Free vulnerability in Microsoft Internet Explorer 10/9
Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
network
microsoft CWE-416
critical
9.3
2013-05-15 CVE-2013-1311 USE After Free vulnerability in Microsoft Internet Explorer 8
Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
network
microsoft CWE-416
critical
9.3
2013-05-15 CVE-2013-1310 USE After Free vulnerability in Microsoft Internet Explorer 6/7
Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
network
microsoft CWE-416
critical
9.3
2013-05-15 CVE-2013-1309 USE After Free vulnerability in Microsoft Internet Explorer
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-2551.
network
microsoft CWE-416
critical
9.3
2013-05-15 CVE-2013-1308 USE After Free vulnerability in Microsoft Internet Explorer
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1309 and CVE-2013-2551.
network
microsoft CWE-416
critical
9.3
2013-05-15 CVE-2013-1307 USE After Free vulnerability in Microsoft Internet Explorer 8/9
Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-0811.
network
microsoft CWE-416
critical
9.3