[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 14840 Download | Alert*

The host is installed with Microsoft Silverlight 5 or Microsoft Silverlight 5 Developer Runtime and is prone to double dereference vulnerability. A flaw is present in the application, which fails to handle a specially crafted Silverlight application. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new accounts with full user rights.

The host is installed with Microsoft Office, Windows, and Silverlight and is prone TrueType Font parsing vulnerability. A flaw is present in the applications, which fails to handle a specially crafted TrueType font file. Successful exploitation could allow remote attackers to install programs, view, change, or delete data or create new accounts with full user rights.

The host is installed with Microsoft Office, Windows, .NET Framework, and Silverlight and is prone TrueType Font parsing vulnerability. A flaw is present in the applications, which fail to handle a specially crafted TrueType font file. Successful exploitation could allow remote attackers to install programs, view, change, or delete data or create new accounts with full user rights.

The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a memory corruption vulnerability. A flaw is present in the application, which improperly allows applications to access objects in memory. An attacker who successfully exploited this vulnerability could corrupt system memory and execute arbitrary code.

The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a remote code execution vulnerability. A flaw is present in the application, which properly decodes strings using a malicious decoder that can return negative offsets. An attacker who successfully exploited this vulnerability could obtain the same permissions as the currently logged-on user.

The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to properly handle certain open and close requests. Successful exploitation could allow attackers to obtain the same permissions as the currently logged-on user.

The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to more reliably predict pointer values and degrade the efficacy of the Address Space Layout Randomization (ASLR) security feature.

The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle objects in memory. Successful exploitation could allow attackers to more reliably predict pointer values and degrade the efficacy of the Address Space Layout Randomization (ASLR) security feature.

The host is installed with Microsoft Windows Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, Server 2012, Windows 8.1, Server 2012 R2, .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6, Office 2007 SP3 or 2010 SP2, Live Meeting 2007 Console, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, Lync Basic 2013 SP1, Silverlight 5 or Silverlight 5 Developer Runtime and ...

The host is installed with Microsoft Microsoft Windows Vista SP2, Server 2008 SP2, Windows 7 SP1, Server 2008 R2 SP1, Windows 8, Server 2012, Windows 8.1, Server 2012 R2, .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6, Office 2007 SP3 or 2010 SP2, Live Meeting 2007 Console, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, Lync Basic 2013 SP1, Silverlight 5 or Silverlight 5 Developer Ru ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   1483

© SecPod Technologies