The host is installed with Microsoft Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a truetype font parsing vulnerability. A flaw is present in the applications, which fail to handle a crafted TrueType fonts. Successful exploitation could allow attackers to take complete control of the affected system.
The host is installed with Microsoft Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a truetype font parsing vulnerability. A flaw is present in the applications, which fail to handle a crafted TrueType fonts. Successful exploitation could allow attackers to take complete control of the affected system.
The host is installed with Microsoft Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a truetype font parsing vulnerability. A flaw is present in the applications, which fail to handle a crafted TrueType fonts. Successful exploitation could allow attackers to take complete control of the affected system.
The host is installed with Microsoft Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a truetype font parsing vulnerability. A flaw is present in the applications, which fail to handle a crafted TrueType fonts. Successful exploitation could allow attackers to take complete control of the affected system.
The host is installed with Microsoft Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a truetype font parsing vulnerability. A flaw is present in the applications, which fail to handle a crafted TrueType fonts. Successful exploitation could allow attackers to take complete control of the affected system.
The host is installed with Apple Mac OS X 10.7.0 before 10.7.2 and is prone to multiple vulnerabilities. The flaws are present in the application, which fails to handle errors during processing of a nonstandard extension in a Certificate Revocation list (CRL). Successful exploitation could allow attackers to crash the service or execute arbitrary code.
The host is installed with Silverlight 5 or Silverlight 5 Developer Runtime and is prone to a remote code execution vulnerability. A flaw is present in the application, which properly decodes strings using a malicious decoder that can return negative offsets. An attacker who successfully exploited this vulnerability could obtain the same permissions as the currently logged-on user.
The host is installed with Apple Mac OS X or Server 10.12 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to denial of service.
The host is installed with Apple Mac OS X or Server 10.11.6, 10.10.5 or 10.12 and is prone to an arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation may lead to unexpected system termination or arbitrary code execution in the kernel.
The host is installed with Apple Mac OS X 10.5.5 or 10.5.8 and is prone to a arbitrary code execution vulnerability. A flaw is present in the application, which fails to properly sanitize inputs before invoking the execute or system functional. Successful exploitation could allow attackers to execute arbitrary code.