Vulnerabilities > Microsoft > Windows

DATE CVE VULNERABILITY TITLE RISK
2008-08-27 CVE-2008-3851 Path Traversal vulnerability in Pluck 4.5.2
Multiple directory traversal vulnerabilities in Pluck CMS 4.5.2 on Windows allow remote attackers to include and execute arbitrary local files via a ..\ (dot dot backslash) in the (1) blogpost, (2) cat, and (3) file parameters to data/inc/themes/predefined_variables.php, as reachable through index.php; and the (4) blogpost and (5) cat parameters to data/inc/blog_include_react.php, as reachable through index.php.
network
low complexity
microsoft pluck CWE-22
5.0
2008-07-30 CVE-2008-3365 Path Traversal vulnerability in Pixelpost 1.7.1
Directory traversal vulnerability in index.php in Pixelpost 1.7.1 on Windows, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a ..
6.8
2008-07-09 CVE-2008-3079 Remote Security vulnerability in Opera
Unspecified vulnerability in Opera before 9.51 on Windows allows attackers to execute arbitrary code via unknown vectors.
network
low complexity
microsoft opera
critical
10.0
2008-06-23 CVE-2008-2307 Resource Management Errors vulnerability in Apple Safari
Unspecified vulnerability in WebKit in Apple Safari before 3.1.2, as distributed in Mac OS X before 10.5.4, and standalone for Windows and Mac OS X 10.4, allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors involving JavaScript arrays that trigger memory corruption.
network
apple microsoft CWE-399
critical
9.3
2008-06-18 CVE-2008-2747 Information Exposure vulnerability in No-Ip Dynamic Update Client 2.2.1
No-IP Dynamic Update Client (DUC) 2.2.1 on Windows uses weak permissions for the HKLM\SOFTWARE\Vitalwerks\DUC registry key, which allows local users to obtain obfuscated passwords and other sensitive information by reading the (1) TrayPassword, (2) Username, (3) Password, and (4) Hosts registry values.
local
low complexity
microsoft no-ip CWE-200
2.1
2008-06-02 CVE-2008-2099 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in VMWare products
Unspecified vulnerability in VMCI in VMware Workstation 6 before 6.0.4 build 93057, VMware Player 2 before 2.0.4 build 93057, and VMware ACE 2 before 2.0.2 build 93057 on Windows allows guest OS users to execute arbitrary code on the host OS via unspecified vectors.
6.9
2008-04-28 CVE-2008-1998 Permissions, Privileges, and Access Controls vulnerability in IBM DB2 8.0/9.1/9.5
The NNSTAT (aka SYSPROC.NNSTAT) procedure in IBM DB2 8 before FP16, 9.1 before FP4a, and 9.5 before FP1 on Windows allows remote authenticated users to overwrite arbitrary files via the log file parameter.
8.5
2008-04-08 CVE-2008-0312 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Symantec products
Stack-based buffer overflow in the AutoFix Support Tool ActiveX control 2.7.0.1 in SYMADATA.DLL in multiple Symantec Norton products, including Norton 360 1.0, AntiVirus 2006 through 2008, Internet Security 2006 through 2008, and System Works 2006 through 2008, allows remote attackers to execute arbitrary code via a long argument to the GetEventLogInfo method.
network
microsoft symantec CWE-119
critical
9.3
2008-03-20 CVE-2008-1402 Resource Management Errors vulnerability in Mg-Soft NET Inspector
MG-SOFT Net Inspector 6.5.0.828 and earlier for Windows allows remote attackers to cause a (1) denial of service (exception and crash) via a UDP packet to the SNMP Trap Service (MgWTrap3.exe) or (2) denial of service (device freeze or memory consumption) via a malformed request to the Net Inspector Server (niengine).
7.1
2008-03-20 CVE-2008-1392 Configuration vulnerability in VMWare Ace, Player and VMWare Workstation
The default configuration of VMware Workstation 6.0.2, VMware Player 2.0.x before 2.0.3, and VMware ACE 2.0.x before 2.0.1 makes the console of the guest OS accessible through anonymous VIX API calls, which has unknown impact and attack vectors.
network
low complexity
microsoft vmware CWE-16
critical
10.0