[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:835
The host is installed with Microsoft Silverlight and is prone to denial of service vulnerability. A flaw is present in the application, which fails to perform garbage collection. Successful exploitation allow remote attackers to cause denial of service via applications involving a popup control and ...

oval:org.secpod.oval:def:834
Microsoft Silverlight is installed

oval:org.secpod.oval:def:836
The host is installed with Microsoft Silverlight and is prone to denial of service vulnerability. A flaw is present in the datagrid control, which fails to release memory used by INotifyDataErrorInfo.ErrorsChanged event. Successful exploitation allow remote attackers to cause denial of service.

oval:org.secpod.oval:def:4156
The host is missing a critical security update according to Microsoft security bulletin, MS12-016. The update is required to fix remote code execution vulnerabilities. The flaws are present in Microsoft .NET Framework and Microsoft Silverlight, which fails to handle a specially crafted web page usin ...

oval:org.secpod.oval:def:4157
The host is installed with Microsoft .NET Framework 2.0 SP2, 3.5.1, 4.0 or Silverlight and is prone unmanaged objects vulnerability. A flaw is present in the applications, which fails to handle a specially crafted Microsoft .NET Framework application. Successful exploitation could allow remote attac ...

oval:org.secpod.oval:def:14317
The host is installed with Microsoft Office 2003 SP3 /2007 SP3 /2010 SP1, Windows, Visual Studio .NET 2003 SP1, Lync 2010, Lync Basic 2013 or Lync 2010 Attendee, and is prone to remote code execution vulnerability. A flaw is present in the application, which fails to properly process crafted TrueTyp ...

oval:org.secpod.oval:def:14323
The host is installed with Microsoft Silverlight 5 before 5.1.20513.0 and is prone to null pointer vulnerability. A flaw is present in the application, which fails to properly initialize arrays. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

oval:org.secpod.oval:def:14328
The host is installed with Microsoft .NET Framework 2.0 SP2, 3.5.1, 4 or 4.5 or Silverlight 5 before 5.1.20513.0 and is prone to array access violation vulnerability. A flaw is present in the applications, which fail to properly prevent changes to data in multidimensional arrays of structures. Succe ...

oval:org.secpod.oval:def:15637
The host is installed with Microsoft Silverlight 5 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to properly handle certain objects in memory. Successful exploitation allows attackers to disclose information on the local system.

oval:org.secpod.oval:def:16973
The host is installed with Microsoft Silverlight 5 and is prone to security feature bypass vulnerability. A flaw is present in the application, which fails to correctly implement the DEP/ASLR security features. Successful exploitation allows attackers to more reliably predict the memory offsets of s ...

oval:org.secpod.oval:def:24287
The host is installed with Microsoft Silverlight 5 and is prone to elevation of privilege vulnerability. A flaw is present in the application, which fails to validate user supplied information. Successful exploitation allows attackers to execute the specially crafted application.

oval:org.secpod.oval:def:15636
The host is missing an important security update according to Microsoft bulletin, MS13-087. The update is required to fix information disclosure vulnerability. A flaw is present in the application, which fails to properly handle certain objects in memory. Successful exploitation allows attackers to ...

oval:org.secpod.oval:def:16974
The host is missing an important security update according to Microsoft bulletin, MS14-014. The update is required to fix security feature bypass vulnerability. A flaw is present in the application, which fails to correctly implement the DEP/ASLR security features. Successful exploitation allows att ...

oval:org.secpod.oval:def:1171
The host is installed with Microsoft .Net framework 2.0 SP1 or 2.0 SP2 or 3.5 or 3.5 SP1 or 4.0 or Microsoft Silverlight 4 and is prone to remote code execution vulnerability. A flaw is present in the applications which is caused when the .NET Framework or Microsoft Silverlight improperly validate a ...

oval:org.secpod.oval:def:1172
The host is missing an critical security update according to Microsoft security bulletin, MS11-039. The update is required to fix remote code execution vulnerability in Microsoft .Net framework and Microsoft Silverlight. A flaw is present in the applications which is caused when the .NET Framework a ...

oval:org.secpod.oval:def:24286
The host is missing an important security update according to Microsoft bulletin, MS15-049. The update is required to fix elevation of privilege vulnerability. A flaw is present in the application, which fails to validate user supplied information. Successful exploitation allows attackers to execute ...

oval:org.secpod.oval:def:2548
The host is installed with Microsoft .NET Framework or Microsoft Silverlight and is prone to a remote code execution vulnerability. Flaws are present in the Microsoft ASP.NET and Microsoft Silverlight, which fails to handle specially crafted web pages. Successful exploitation could allow attackers t ...

oval:org.secpod.oval:def:2547
The host is missing a critical security update according to Microsoft security bulletin, MS11-078. The update is required to fix a remote code execution vulnerability. Flaws are present in the Microsoft .NET Framework and Microsoft Silverlight, which fails to handle specially crafted web pages by a ...

oval:org.secpod.oval:def:14322
The host is missing a critical security update according to Microsoft bulletin, ms13-052. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to properly handle certain vectors and improper validations. Successful exploitation allows attacker ...

*CPE
cpe:/a:microsoft:silverlight

© SecPod Technologies