Vulnerabilities > Critical

DATE CVE VULNERABILITY TITLE RISK
2015-04-14 CVE-2015-1652 Resource Management Errors vulnerability in Microsoft Internet Explorer
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1666.
network
microsoft CWE-399
critical
9.3
2015-04-14 CVE-2015-1651 Use After Free Remote Code Execution vulnerability in Microsoft Office Compatibility Pack, Word and Word Viewer
Use-after-free vulnerability in Microsoft Word 2007 SP3, Word Viewer, and Office Compatibility Pack SP3 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability." <a href="http://cwe.mitre.org/data/definitions/416.html">CWE-416: Use After Free</a>
network
microsoft
critical
9.3
2015-04-14 CVE-2015-1650 Use After Free Remote Code Execution vulnerability in Microsoft Office
Use-after-free vulnerability in Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability." <a href="http://cwe.mitre.org/data/definitions/416.html">CWE-416: Use After Free</a>
network
microsoft
critical
9.3
2015-04-14 CVE-2015-1649 Use After Free Remote Code Execution vulnerability in Microsoft Office
Use-after-free vulnerability in Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps Server 2010 SP2 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability." <a href="http://cwe.mitre.org/data/definitions/416.html">CWE-416: Use After Free</a>
network
microsoft
critical
9.3
2015-04-14 CVE-2015-1645 Code Injection vulnerability in Microsoft products
Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allow remote attackers to execute arbitrary code via a crafted Enhanced Metafile (EMF) image, aka "EMF Processing Remote Code Execution Vulnerability."
network
microsoft CWE-94
critical
9.3
2015-04-14 CVE-2015-1635 Code Injection vulnerability in Microsoft products
HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka "HTTP.sys Remote Code Execution Vulnerability."
network
low complexity
microsoft CWE-94
critical
10.0
2015-04-14 CVE-2015-2788 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Debian Dbd-Firebird and Debian Linux
Multiple stack-based buffer overflows in the ib_fill_isqlda function in dbdimp.c in DBD-Firebird before 1.19 allow remote attackers to have unspecified impact via unknown vectors that trigger an error condition, related to binding octets to columns.
network
low complexity
debian CWE-119
critical
10.0
2015-04-14 CVE-2014-9488 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
The is_utf8_well_formed function in GNU less before 475 allows remote attackers to have unspecified impact via malformed UTF-8 characters, which triggers an out-of-bounds read.
network
low complexity
opensuse gnu CWE-119
critical
10.0
2015-04-13 CVE-2015-2846 Command Injection vulnerability in Bittorrent Sync
BitTorrent Sync allows remote attackers to execute arbitrary commands via a crafted btsync: link.
network
bittorrent CWE-77
critical
9.3
2015-04-10 CVE-2015-1132 Improper Input Validation vulnerability in Apple mac OS X
fontd in Apple Type Services (ATS) in Apple OS X before 10.10.3 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-1131, CVE-2015-1133, CVE-2015-1134, and CVE-2015-1135.
network
low complexity
apple CWE-20
critical
10.0