Vulnerabilities > Microsoft > Critical

DATE CVE VULNERABILITY TITLE RISK
2009-01-21 CVE-2009-0005 Resource Management Errors vulnerability in Apple Quicktime
Unspecified vulnerability in Apple QuickTime before 7.6 allows remote attackers to cause a denial of service (application termination) and possibly execute arbitrary code via a crafted H.263 encoded movie file that triggers memory corruption.
network
apple microsoft CWE-399
critical
9.3
2009-01-21 CVE-2009-0004 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apple Quicktime
Buffer overflow in Apple QuickTime before 7.6 allows remote attackers to cause a denial of service (application termination) and possibly execute arbitrary code via a crafted MP3 audio file.
network
apple microsoft CWE-119
critical
9.3
2009-01-21 CVE-2009-0003 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apple Quicktime
Heap-based buffer overflow in Apple QuickTime before 7.6 allows remote attackers to cause a denial of service (application termination) and execute arbitrary code via an AVI movie file with an invalid nBlockAlign value in the _WAVEFORMATEX structure.
network
apple microsoft CWE-119
critical
9.3
2009-01-21 CVE-2009-0002 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apple Quicktime
Heap-based buffer overflow in Apple QuickTime before 7.6 allows remote attackers to cause a denial of service (application termination) and possibly execute arbitrary code via a QTVR movie file with crafted THKD atoms.
network
apple microsoft CWE-119
critical
9.3
2009-01-21 CVE-2009-0001 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Apple Quicktime
Heap-based buffer overflow in Apple QuickTime before 7.6 allows remote attackers to cause a denial of service (application termination) and possibly execute arbitrary code via a crafted RTSP URL.
network
apple microsoft CWE-119
critical
9.3
2009-01-15 CVE-2009-0133 Buffer Errors vulnerability in Microsoft Html Help Workshop 4.74
Buffer overflow in Microsoft HTML Help Workshop 4.74 and earlier allows context-dependent attackers to execute arbitrary code via a .hhp file with a long "Index file" field, possibly a related issue to CVE-2006-0564.
network
low complexity
microsoft CWE-119
critical
10.0
2009-01-14 CVE-2009-0119 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Microsoft Windows XP
Buffer overflow in Microsoft Windows XP SP3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted .chm file.
network
low complexity
microsoft CWE-119
critical
10.0
2008-12-12 CVE-2008-5548 Improper Input Validation vulnerability in Virusbuster 4.5.11.0
VirusBuster 4.5.11.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
network
virusbuster microsoft CWE-20
critical
9.3
2008-12-12 CVE-2008-5546 Improper Input Validation vulnerability in Virusblokada Vba32 Antivirus 3.12.8.5
VirusBlokAda VBA32 3.12.8.5, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
network
virusblokada microsoft CWE-20
critical
9.3
2008-12-12 CVE-2008-5545 Improper Input Validation vulnerability in Trend Micro Trend Micro Antivirus 8.700.0.1004
Trend Micro VSAPI 8.700.0.1004 in Trend Micro AntiVirus, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit.
network
trend-micro microsoft CWE-20
critical
9.3