Vulnerabilities > Microsoft > Critical

DATE CVE VULNERABILITY TITLE RISK
2005-01-10 CVE-2004-1134 Unspecified vulnerability in Microsoft W3Who.Dll
Buffer overflow in the Microsoft W3Who ISAPI (w3who.dll) allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long query string.
network
low complexity
microsoft
critical
10.0
2005-01-10 CVE-2004-1080 Remote Memory Corruption vulnerability in Microsoft Windows 2000, Windows 2003 Server and Windows NT
The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability."
network
low complexity
microsoft
critical
10.0
2005-01-10 CVE-2004-0901 Unspecified vulnerability in Microsoft products
Microsoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Font Conversion Vulnerability," a different vulnerability than CVE-2004-0571.
network
low complexity
microsoft
critical
10.0
2005-01-10 CVE-2004-0900 Unspecified vulnerability in Microsoft Windows NT 4.0
The DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition does not properly validate the length of certain messages, which allows remote attackers to execute arbitrary code via a malformed DHCP message, aka the "DHCP Request Vulnerability."
network
low complexity
microsoft
critical
10.0
2005-01-10 CVE-2004-0571 Unspecified vulnerability in Microsoft products
Microsoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Table Conversion Vulnerability," a different vulnerability than CVE-2004-0901.
network
low complexity
microsoft
critical
10.0
2005-01-10 CVE-2004-0568 Unspecified vulnerability in Microsoft products
HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow.
network
low complexity
microsoft
critical
10.0
2004-12-31 CVE-2004-2289 Unspecified vulnerability in Microsoft Windows XP
Microsoft Windows XP Explorer allows local users to execute arbitrary code via a system folder with a Desktop.ini file containing a .ShellClassInfo specifier with a CLSID value that is associated with an executable file.
network
low complexity
microsoft
critical
10.0
2004-12-31 CVE-2004-1050 Heap-based buffer overflow in Internet Explorer 6 allows remote attackers to execute arbitrary code via long (1) SRC or (2) NAME attributes in IFRAME, FRAME, and EMBED elements, as originally discovered using the mangleme utility, aka "the IFRAME vulnerability" or the "HTML Elements Vulnerability."
network
low complexity
avaya microsoft
critical
10.0
2004-12-31 CVE-2004-0985 Remote Security vulnerability in Microsoft IE 6.0
Internet Explorer 6.x on Windows XP SP2 allows remote attackers to execute arbitrary code, as demonstrated using a document with a draggable file type such as .xml, .doc, .py, .cdf, .css, .pdf, or .ppt, and using ADODB.Connection and ADODB.recordset to write to a .hta file that is interpreted in the Local Zone by HTML Help.
network
low complexity
microsoft
critical
10.0
2004-11-23 CVE-2004-0597 Remote vulnerability in LibPNG Graphics Library
Multiple buffer overflows in libpng 1.2.5 and earlier, as used in multiple products, allow remote attackers to execute arbitrary code via malformed PNG images in which (1) the png_handle_tRNS function does not properly validate the length of transparency chunk (tRNS) data, or the (2) png_handle_sBIT or (3) png_handle_hIST functions do not perform sufficient bounds checking.
network
low complexity
greg-roelofs microsoft
critical
10.0