Vulnerabilities > Microsoft > Critical

DATE CVE VULNERABILITY TITLE RISK
2005-05-02 CVE-2005-0050 Improper Input Validation vulnerability in Microsoft Windows 2000, Windows 2003 Server and Windows NT
The License Logging service for Windows NT Server, Windows 2000 Server, and Windows Server 2003 does not properly validate the length of messages, which leads to an "unchecked buffer" and allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, aka the "License Logging Service Vulnerability."
network
low complexity
microsoft CWE-20
critical
10.0
2005-02-09 CVE-2004-0978 Out-Of-Bounds Write vulnerability in Microsoft Internet Explorer 5.01/5.5/6
Heap-based buffer overflow in the Hrtbeat.ocx (Heartbeat) ActiveX control for Internet Explorer 5.01 through 6, when users who visit online gaming sites that are associated with MSN, allows remote attackers to execute arbitrary code via the SetupData parameter.
network
low complexity
microsoft CWE-787
critical
10.0
2005-02-09 CVE-2004-0963 Unspecified vulnerability in Microsoft Word 2002
Buffer overflow in Microsoft Word 2002 (10.6612.6714) SP3, and possibly other versions, allows remote attackers to cause a denial of service (application exception) and possibly execute arbitrary code in winword.exe via certain unexpected values in a .doc file, including (1) an offset that triggers an out-of-bounds memory access, (2) a certain value that causes a large memory copy as triggered by an integer conversion error, and other values.
network
low complexity
microsoft
critical
10.0
2005-01-11 CVE-2004-0897 Buffer Overflow vulnerability in Microsoft Windows 2003 Server and Windows XP
The Indexing Service for Microsoft Windows XP and Server 2003 does not properly validate the length of a message, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
network
low complexity
microsoft
critical
10.0
2005-01-10 CVE-2004-1134 Unspecified vulnerability in Microsoft W3Who.Dll
Buffer overflow in the Microsoft W3Who ISAPI (w3who.dll) allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long query string.
network
low complexity
microsoft
critical
10.0
2005-01-10 CVE-2004-1080 Remote Memory Corruption vulnerability in Microsoft Windows 2000, Windows 2003 Server and Windows NT
The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability."
network
low complexity
microsoft
critical
10.0
2005-01-10 CVE-2004-0901 Unspecified vulnerability in Microsoft products
Microsoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Font Conversion Vulnerability," a different vulnerability than CVE-2004-0571.
network
low complexity
microsoft
critical
10.0
2005-01-10 CVE-2004-0900 Unspecified vulnerability in Microsoft Windows NT 4.0
The DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition does not properly validate the length of certain messages, which allows remote attackers to execute arbitrary code via a malformed DHCP message, aka the "DHCP Request Vulnerability."
network
low complexity
microsoft
critical
10.0
2005-01-10 CVE-2004-0571 Unspecified vulnerability in Microsoft products
Microsoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Table Conversion Vulnerability," a different vulnerability than CVE-2004-0901.
network
low complexity
microsoft
critical
10.0
2005-01-10 CVE-2004-0568 Unspecified vulnerability in Microsoft products
HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.
network
low complexity
microsoft
critical
10.0