Page 2 of 13 results (0.003 seconds)

CVSS: 9.3EPSS: 1%CPEs: 1EXPL: 0

Microsoft Silverlight 5 before 5.1.40416.00 allows remote attackers to bypass intended integrity-level restrictions via a crafted Silverlight application, aka "Microsoft Silverlight Out of Browser Application Vulnerability." Microsoft Silverlight 5 anterior a 5.1.40416.00 permite a atacantes remotos evadir restricciones de niveles de integridad a través de una aplicación Silverlight manipulada, también conocido como 'vulnerabilidad de la aplicación de fuera del navegador de Microsoft Silverlight.' • http://www.securitytracker.com/id/1032298 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-049 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 83%CPEs: 28EXPL: 0

Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview; Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Silverlight 4 before 4.1.10329; and Silverlight 5 before 5.1.10411 allow remote attackers to execute arbitrary code via a crafted TrueType font (TTF) file, aka "TrueType Font Parsing Vulnerability." Microsoft Windows XP SP2 y SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, y R2 SP1, Windows 7 Gold y SP1, y Windows 8 Consumer Preview; Office 2003 SP3, 2007 SP2 y SP3, y 2010 Gold y SP1; Silverlight v4 anterior a v4.1.10329; y Silverlight v5 anterior a v5.1.10411 permite a atacantes remotos ejecutar código arbitrario mediante un fichero de fuentes TrueType (TTF) manipulado, también conocido como "Vulnerabilidad TrueType Font Parsing " This vulnerability allows remote attackers to execute arbitrary code from the contact of kernelspace on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the kernel's support for TrueType font parsing of compound glyphs. A sign extension error exists in win32k.sys when processing compound glyphs having a total number of contours above 0x7FFF. This can be exploited to corrupt kernel heap memory placed below the space allocated for the "flags" buffer and potentially execute arbitrary code in kernel space. • http://secunia.com/advisories/49121 http://secunia.com/advisories/49122 http://www.securityfocus.com/bid/53335 http://www.securitytracker.com/id?1027039 http://www.us-cert.gov/cas/techalerts/TA12-129A.html http://www.us-cert.gov/cas/techalerts/TA12-164A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-034 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-039 https://exchange.xforce.ibmcloud.com/vulnerabilities/75124 https:& • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 91%CPEs: 12EXPL: 0

Double free vulnerability in Microsoft Silverlight 4 before 4.1.10329 on Windows allows remote attackers to execute arbitrary code via vectors involving crafted XAML glyphs, aka "Silverlight Double-Free Vulnerability." Vulnerabilidad de liberación doble en Microsoft Silverlight v4 anterior a v4.1.10329 en Windows permite a atacantes remotos ejecutar código arbitrario mediante vectores que comprenden la manipulación XAML glyphs, también conocido como "Vulnerabilidad de liberación doble en Silverlight" • http://secunia.com/advisories/49122 http://www.securityfocus.com/bid/53360 http://www.securitytracker.com/id?1027040 http://www.us-cert.gov/cas/techalerts/TA12-129A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-034 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15574 • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 28%CPEs: 26EXPL: 0

Microsoft .NET Framework 2.0 SP2, 3.5.1, and 4, and Silverlight 4 before 4.1.10111, does not properly restrict access to memory associated with unmanaged objects, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, (3) a crafted .NET Framework application, or (4) a crafted Silverlight application, aka ".NET Framework Unmanaged Objects Vulnerability." Microsoft .NET Framework v2.0 SP2 y v3.5.1 y v4, y Silverlight v4 antes de v4.1.10111, no restringe el acceso a la memoria asociada con objetos desatendidos, permiten a atacantes remotos ejecutar código de su elección a través de (1) una aplicación modificada de navegador XAML (también conocido como XBAP), (2) una aplicación ASP.NET modificada, o (3) una aplicación .NET Framework manipulada, también conocido como ".NET Framework Unmanaged Objects Vulnerability." • http://www.us-cert.gov/cas/techalerts/TA12-045A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-016 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13972 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

Multiple memory leaks in the DataGrid control implementation in Microsoft Silverlight 4 before 4.0.60310.0 allow remote attackers to cause a denial of service (memory consumption) via an application involving (1) subscriptions to an INotifyDataErrorInfo.ErrorsChanged event or (2) a TextBlock or TextBox element. Múltiples pérdidas de memoria en la implementación del control DataGrid en Microsoft Silverlight v4 antes de v4.0.60310.0, permite a atacantes remotos provocar una denegación de servicio (consumo de memoria) a través de una solicitud de participación en (1) la suscripción a un evento INotifyDataErrorInfo.ErrorsChanged o (2) un bloque de texto o elemento TextBox. • http://isc.sans.edu/diary.html?storyid=10747 http://support.microsoft.com/kb/2526954 • CWE-399: Resource Management Errors •