Vulnerabilities > Microsoft > Windows

DATE CVE VULNERABILITY TITLE RISK
2008-09-11 CVE-2007-5348 Numeric Errors vulnerability in Microsoft products
Integer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via an image file with crafted gradient sizes in gradient fill input, which triggers a heap-based buffer overflow related to GdiPlus.dll and VGX.DLL, aka "GDI+ VML Buffer Overrun Vulnerability."
network
microsoft CWE-189
critical
9.3
2008-09-03 CVE-2008-3897 Information Exposure vulnerability in Freed0M Disckcryptor 0.2.6
DiskCryptor 0.2.6 on Windows stores pre-boot authentication passwords in the BIOS Keyboard buffer and does not clear this buffer before and after use, which allows local users to obtain sensitive information by reading the physical memory locations associated with this buffer.
local
low complexity
microsoft freed0m CWE-200
2.1
2008-09-02 CVE-2008-3538 Remote Privilege Escalation vulnerability in HP Enterprise Discovery
Unspecified vulnerability in HP Enterprise Discovery 2.0 through 2.52 on Windows allows remote authenticated users to execute arbitrary code via unknown vectors.
network
low complexity
hp microsoft
critical
9.0
2008-08-27 CVE-2008-3851 Path Traversal vulnerability in Pluck 4.5.2
Multiple directory traversal vulnerabilities in Pluck CMS 4.5.2 on Windows allow remote attackers to include and execute arbitrary local files via a ..\ (dot dot backslash) in the (1) blogpost, (2) cat, and (3) file parameters to data/inc/themes/predefined_variables.php, as reachable through index.php; and the (4) blogpost and (5) cat parameters to data/inc/blog_include_react.php, as reachable through index.php.
network
low complexity
microsoft pluck CWE-22
5.0
2008-07-30 CVE-2008-3365 Path Traversal vulnerability in Pixelpost 1.7.1
Directory traversal vulnerability in index.php in Pixelpost 1.7.1 on Windows, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a ..
6.8
2008-07-09 CVE-2008-3079 Remote Security vulnerability in Opera
Unspecified vulnerability in Opera before 9.51 on Windows allows attackers to execute arbitrary code via unknown vectors.
network
low complexity
microsoft opera
critical
10.0
2008-06-23 CVE-2008-2307 Resource Management Errors vulnerability in Apple Safari
Unspecified vulnerability in WebKit in Apple Safari before 3.1.2, as distributed in Mac OS X before 10.5.4, and standalone for Windows and Mac OS X 10.4, allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors involving JavaScript arrays that trigger memory corruption.
network
apple microsoft CWE-399
critical
9.3
2008-06-18 CVE-2008-2747 Information Exposure vulnerability in No-Ip Dynamic Update Client 2.2.1
No-IP Dynamic Update Client (DUC) 2.2.1 on Windows uses weak permissions for the HKLM\SOFTWARE\Vitalwerks\DUC registry key, which allows local users to obtain obfuscated passwords and other sensitive information by reading the (1) TrayPassword, (2) Username, (3) Password, and (4) Hosts registry values.
local
low complexity
microsoft no-ip CWE-200
2.1
2008-06-02 CVE-2008-2099 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in VMWare products
Unspecified vulnerability in VMCI in VMware Workstation 6 before 6.0.4 build 93057, VMware Player 2 before 2.0.4 build 93057, and VMware ACE 2 before 2.0.2 build 93057 on Windows allows guest OS users to execute arbitrary code on the host OS via unspecified vectors.
6.9
2008-04-28 CVE-2008-1998 Permissions, Privileges, and Access Controls vulnerability in IBM DB2 8.0/9.1/9.5
The NNSTAT (aka SYSPROC.NNSTAT) procedure in IBM DB2 8 before FP16, 9.1 before FP4a, and 9.5 before FP1 on Windows allows remote authenticated users to overwrite arbitrary files via the log file parameter.
8.5