Vulnerabilities > Microsoft > Critical

DATE CVE VULNERABILITY TITLE RISK
2013-05-15 CVE-2013-1317 Integer Overflow OR Wraparound vulnerability in Microsoft Publisher 2003
Integer overflow in Microsoft Publisher 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Publisher file that triggers an improper allocation-size calculation, aka "Publisher Integer Overflow Vulnerability."
network
microsoft CWE-190
critical
9.3
2013-05-15 CVE-2013-1316 Improper Input Validation vulnerability in Microsoft Publisher 2003
Microsoft Publisher 2003 SP3 does not properly validate the size of an unspecified array, which allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Negative Value Allocation Vulnerability."
network
microsoft CWE-20
critical
9.3
2013-05-15 CVE-2013-1312 USE After Free vulnerability in Microsoft Internet Explorer 10/9
Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
network
microsoft CWE-416
critical
9.3
2013-05-15 CVE-2013-1311 USE After Free vulnerability in Microsoft Internet Explorer 8
Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
network
microsoft CWE-416
critical
9.3
2013-05-15 CVE-2013-1310 USE After Free vulnerability in Microsoft Internet Explorer 6/7
Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
network
microsoft CWE-416
critical
9.3
2013-05-15 CVE-2013-1309 USE After Free vulnerability in Microsoft Internet Explorer
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-2551.
network
microsoft CWE-416
critical
9.3
2013-05-15 CVE-2013-1308 USE After Free vulnerability in Microsoft Internet Explorer
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1309 and CVE-2013-2551.
network
microsoft CWE-416
critical
9.3
2013-05-15 CVE-2013-1307 USE After Free vulnerability in Microsoft Internet Explorer 8/9
Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-0811.
network
microsoft CWE-416
critical
9.3
2013-05-15 CVE-2013-1306 USE After Free vulnerability in Microsoft Internet Explorer 9
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1313.
network
microsoft CWE-416
critical
9.3
2013-05-15 CVE-2013-1302 Buffer Errors vulnerability in Microsoft Lync, Lync Server and Office Communicator
Microsoft Communicator 2007 R2, Lync 2010, Lync 2010 Attendee, and Lync Server 2013 do not properly handle objects in memory, which allows remote attackers to execute arbitrary code via an invitation that triggers access to a deleted object, aka "Lync RCE Vulnerability."
network
microsoft CWE-119
critical
9.3