[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15027 Download | Alert*

The host is installed with Microsoft .NET Framework or Microsoft Silverlight and is prone to a remote code execution vulnerability. Flaws are present in the Microsoft ASP.NET and Microsoft Silverlight, which fails to handle specially crafted web pages. Successful exploitation could allow attackers to execute arbitrary code on the affected system.

The host is installed with Microsoft .Net framework 2.0 SP1 or 2.0 SP2 or 3.5 or 3.5 SP1 or 4.0 or Microsoft Silverlight 4 and is prone to remote code execution vulnerability. A flaw is present in the applications which is caused when the .NET Framework or Microsoft Silverlight improperly validate arguments passed to built-in networking functions. Successful exploitation allows attacker to take co ...

The host is installed with Microsoft Silverlight 5 or Microsoft Silverlight 5 Developer Runtime and is prone to double dereference vulnerability. A flaw is present in the application, which fails to handle a specially crafted Silverlight application. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new accounts with full user rights.

The host is installed with Microsoft Office, Windows, and Silverlight and is prone TrueType Font parsing vulnerability. A flaw is present in the applications, which fails to handle a specially crafted TrueType font file. Successful exploitation could allow remote attackers to install programs, view, change, or delete data or create new accounts with full user rights.

The host is installed with Microsoft Office, Windows, .NET Framework, and Silverlight and is prone TrueType Font parsing vulnerability. A flaw is present in the applications, which fail to handle a specially crafted TrueType font file. Successful exploitation could allow remote attackers to install programs, view, change, or delete data or create new accounts with full user rights.

The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a memory corruption vulnerability. A flaw is present in the application, which improperly allows applications to access objects in memory. An attacker who successfully exploited this vulnerability could corrupt system memory and execute arbitrary code.

The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a remote code execution vulnerability. A flaw is present in the application, which properly decodes strings using a malicious decoder that can return negative offsets. An attacker who successfully exploited this vulnerability could obtain the same permissions as the currently logged-on user.

The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle certain open and close requests. Successful exploitation could allow attackers to obtain the same permissions as the currently logged-on user.

The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to more reliably predict pointer values and degrade the efficacy of the Address Space Layout Randomization (ASLR) security feature.

The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to more reliably predict pointer values and degrade the efficacy of the Address Space Layout Randomization (ASLR) security feature.


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1502

© SecPod Technologies