The host is installed with Microsoft Silverlight 5 or Microsoft Silverlight 5 Developer Runtime and is prone to double dereference vulnerability. A flaw is present in the application, which fails to handle a specially crafted Silverlight application. Successful exploitation could allow an attacker to install programs, view, change, or delete data or create new accounts with full user rights.