Vulnerabilities > Microsoft > Critical

DATE CVE VULNERABILITY TITLE RISK
2007-08-14 CVE-2007-1749 Unspecified vulnerability in Microsoft Internet Explorer 5.01/6/7
Integer underflow in the CDownloadSink class code in the Vector Markup Language (VML) component (VGX.DLL), as used in Internet Explorer 5.01, 6, and 7 allows remote attackers to execute arbitrary code via compressed content with an invalid buffer size, which triggers a heap-based buffer overflow.
network
microsoft
critical
9.3
2007-08-14 CVE-2007-0948 Heap Overflow vulnerability in Microsoft Virtual PC and Virtual Server
Heap-based buffer overflow in Microsoft Virtual PC 2004 and PC for Mac 7.1 and 7, and Virtual Server 2005 and 2005 R2, allows local guest OS administrators to execute arbitrary code on the host OS via unspecified vectors related to "interaction and initialization of components."
network
microsoft
critical
9.3
2007-08-14 CVE-2007-3890 Remote Code Execution vulnerability in Microsoft Excel and Office
Microsoft Excel in Office 2000 SP3, Office XP SP3, Office 2003 SP2, and Office 2004 for Mac allows remote attackers to execute arbitrary code via a Workspace with a certain index value that triggers memory corruption.
network
microsoft
critical
9.3
2007-08-14 CVE-2007-3041 Unspecified vulnerability in Microsoft Internet Explorer 5.01/6/7
Unspecified vulnerability in the pdwizard.ocx ActiveX object for Internet Explorer 5.01, 6 SP1, and 7 allows remote attackers to execute arbitrary code via unknown vectors related to Microsoft Visual Basic 6 objects and memory corruption, aka "ActiveX Object Memory Corruption Vulnerability."
network
microsoft
critical
9.3
2007-08-14 CVE-2007-3034 Numeric Errors vulnerability in Microsoft products
Integer overflow in the AttemptWrite function in Graphics Rendering Engine (GDI) on Microsoft Windows 2000 SP4, XP SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via a crafted metafile (image) with a large record length value, which triggers a heap-based buffer overflow.
network
microsoft CWE-189
critical
9.3
2007-08-14 CVE-2007-2224 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Microsoft Office and Visual Basic
Object linking and embedding (OLE) Automation, as used in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Office 2004 for Mac, and Visual Basic 6.0 allows remote attackers to execute arbitrary code via the substringData method on a TextNode object, which causes an integer overflow that leads to a buffer overflow.
network
microsoft CWE-119
critical
9.3
2007-08-14 CVE-2007-2223 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Microsoft XML Core Services
Microsoft XML Core Services (MSXML) 3.0 through 6.0 allows remote attackers to execute arbitrary code via the substringData method on a (1) TextNode or (2) XMLDOM object, which causes an integer overflow that leads to a buffer overflow.
network
microsoft CWE-119
critical
9.3
2007-08-14 CVE-2007-2216 Configuration vulnerability in Microsoft Internet Explorer 5.01/6/7
The tblinf32.dll (aka vstlbinf.dll) ActiveX control for Internet Explorer 5.01, 6 SP1, and 7 uses an incorrect IObjectsafety implementation, which allows remote attackers to execute arbitrary code by requesting the HelpString property, involving a crafted DLL file argument to the TypeLibInfoFromFile function, which overwrites the HelpStringDll property to call the DLLGetDocumentation function in another DLL file, aka "ActiveX Object Vulnerability."
network
microsoft CWE-16
critical
9.3
2007-07-17 CVE-2007-3826 Unspecified vulnerability in Microsoft Internet Explorer 7
Microsoft Internet Explorer 7 on Windows XP SP2 allows remote attackers to prevent users from leaving a site, spoof the address bar, and conduct phishing and other attacks via repeated document.open function calls after a user requests a new page, but before the onBeforeUnload function is called.
network
microsoft
critical
9.3
2007-07-15 CVE-2007-3794 Buffer Overflow vulnerability in Multiple Hitachi Products GIF Image
Buffer overflow in Hitachi Cosminexus V4 through V7, Processing Kit for XML before 20070511, Developer's Kit for Java before 20070312, and third-party products that use this software, allows attackers to have an unknown impact via certain GIF images, related to use of GIF image processing APIs by a Java application.
network
low complexity
microsoft hitachi linux hp ibm sun
critical
10.0