Vulnerabilities > Microsoft > Windows > High

DATE CVE VULNERABILITY TITLE RISK
2010-07-15 CVE-2010-1965 Unspecified vulnerability in HP Insight Orchestration
Unspecified vulnerability in HP Insight Orchestration for Windows before 6.1 allows remote attackers to read or modify data via unknown vectors.
network
low complexity
hp microsoft
7.5
2010-07-13 CVE-2010-0903 Remote Net Foundation Layer vulnerability in Oracle Database Server
Unspecified vulnerability in the Net Foundation Layer component in Oracle Database Server 9.2.0.8, 10.1.0.5, 10.2.0.4, 11.1.0.7, and 11.2.0.1, when running on Windows, allows remote attackers to affect availability via unknown vectors.
network
low complexity
oracle microsoft
7.8
2010-07-12 CVE-2010-2489 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Ruby-Lang Ruby
Buffer overflow in Ruby 1.9.x before 1.9.1-p429 on Windows might allow local users to gain privileges via a crafted ARGF.inplace_mode value that is not properly handled when constructing the filenames of the backup files.
local
low complexity
ruby-lang microsoft CWE-119
7.2
2010-05-13 CVE-2010-1939 Resource Management Errors vulnerability in Apple Safari 4.0.5
Use-after-free vulnerability in Apple Safari 4.0.5 on Windows allows remote attackers to execute arbitrary code by using window.open to create a popup window for a crafted HTML document, and then calling the parent window's close method, which triggers improper handling of a deleted window object.
network
high complexity
apple microsoft CWE-399
7.6
2010-04-12 CVE-2010-1142 Permissions, Privileges, and Access Controls vulnerability in VMWare products
VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x before 2.5.4 build 246459; VMware ACE 2.5.x before 2.5.4 build 246459; VMware Server 2.x before 2.0.2 build 203138; VMware Fusion 2.x before 2.0.6 build 246742; VMware ESXi 3.5 and 4.0; and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0 does not properly load VMware programs, which might allow Windows guest OS users to gain privileges by placing a Trojan horse program at an unspecified location on the guest OS disk.
8.5
2010-04-12 CVE-2010-1141 Permissions, Privileges, and Access Controls vulnerability in VMWare products
VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x before 2.5.4 build 246459; VMware ACE 2.5.x before 2.5.4 build 246459; VMware Server 2.x before 2.0.2 build 203138; VMware Fusion 2.x before 2.0.6 build 246742; VMware ESXi 3.5 and 4.0; and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0 does not properly access libraries, which allows user-assisted remote attackers to execute arbitrary code by tricking a Windows guest OS user into clicking on a file that is stored on a network share.
8.5
2009-12-10 CVE-2009-3951 Information Exposure vulnerability in Adobe AIR and Flash Player
Unspecified vulnerability in the Flash Player ActiveX control in Adobe Flash Player before 10.0.42.34 and Adobe AIR before 1.5.3 on Windows allows remote attackers to obtain the names of local files via unknown vectors.
7.1
2009-11-05 CVE-2009-3864 Multiple Security vulnerability in Sun Java SE November 2009
The Java Update functionality in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22 and JDK and JRE 6 before Update 17, when a non-English version of Windows is used, does not retrieve available new JRE versions, which allows remote attackers to leverage vulnerabilities in older releases of this software, aka Bug Id 6869694.
network
low complexity
microsoft sun
7.5
2009-10-02 CVE-2009-3532 SQL Injection vulnerability in Logrover 2.3/2.3.3
Multiple SQL injection vulnerabilities in login.asp (aka the login screen) in LogRover 2.3 and 2.3.3 on Windows allow remote attackers to execute arbitrary SQL commands via the (1) uname and (2) pword parameters.
network
low complexity
logrover microsoft CWE-89
7.5
2009-09-08 CVE-2009-3097 Information Exposure vulnerability in HP Performance Insight 5.3
Multiple unspecified vulnerabilities in HP Performance Insight 5.3 on Windows allow attackers to obtain sensitive information via unknown vectors, as demonstrated by certain modules in VulnDisco Pack Professional 8.11.
network
low complexity
hp microsoft CWE-200
7.8