Vulnerabilities > Microsoft > Critical

DATE CVE VULNERABILITY TITLE RISK
2010-11-22 CVE-2010-3805 Numeric Errors vulnerability in Apple Safari and Webkit
Integer underflow in WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving WebSockets.
network
apple microsoft CWE-189
critical
9.3
2010-11-22 CVE-2010-3803 Numeric Errors vulnerability in Apple Safari and Webkit
Integer overflow in WebKit in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string.
network
apple microsoft CWE-189
critical
9.3
2010-11-10 CVE-2010-3337 Unspecified vulnerability in Microsoft Office 2007/2010
Untrusted search path vulnerability in Microsoft Office 2007 SP2 and 2010 allows local users to gain privileges via a Trojan horse DLL in the current working directory, aka "Insecure Library Loading Vulnerability." NOTE: this might overlap CVE-2010-3141 and CVE-2010-3142.
network
microsoft
critical
9.3
2010-11-10 CVE-2010-3336 Buffer Errors vulnerability in Microsoft Office and Open XML File Format Converter
Microsoft Office XP SP3, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via a crafted Office document that triggers memory corruption, aka "MSO Large SPID Read AV Vulnerability."
network
microsoft CWE-119
critical
9.3
2010-11-10 CVE-2010-3335 Buffer Errors vulnerability in Microsoft Office and Open XML File Format Converter
Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via a crafted Office document that triggers memory corruption, aka "Drawing Exception Handling Vulnerability."
network
microsoft CWE-119
critical
9.3
2010-11-10 CVE-2010-3334 Buffer Errors vulnerability in Microsoft Office and Open XML File Format Converter
Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via an Office document containing an Office Art Drawing record with crafted msofbtSp records and unspecified flags, which triggers memory corruption, aka "Office Art Drawing Records Vulnerability."
network
microsoft CWE-119
critical
9.3
2010-11-10 CVE-2010-2573 Numeric Errors vulnerability in Microsoft Office, Powerpoint and Powerpoint Viewer
Integer underflow in Microsoft PowerPoint 2002 SP3 and 2003 SP3, PowerPoint Viewer SP2, and Office 2004 for Mac allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka "PowerPoint Integer Underflow Causes Heap Corruption Vulnerability."
network
microsoft CWE-189
critical
9.3
2010-11-07 CVE-2010-4091 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Adobe Acrobat and Acrobat Reader
The EScript.api plugin in Adobe Reader and Acrobat 10.x before 10.0.1, 9.x before 9.4.1, and 8.x before 8.2.6 on Windows and Mac OS X allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document that triggers memory corruption, involving the printSeps function.
network
adobe apple microsoft CWE-119
critical
9.3
2010-11-07 CVE-2010-3637 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Adobe Flash Player
An unspecified ActiveX control in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 (Flash10h.ocx) on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted FLV video.
network
adobe microsoft CWE-119
critical
9.3
2010-11-05 CVE-2010-3962 Use After Free vulnerability in Microsoft Internet Explorer 6/7/8
Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka an "invalid flag reference" issue or "Uninitialized Memory Corruption Vulnerability," as exploited in the wild in November 2010.
network
microsoft CWE-416
critical
9.3