Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft silverlight 2.0.31005.00 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-1844
Memory leak in Microsoft Silverlight 4 prior to 4.0.60310.0 allows remote malicious users to cause a denial of service (memory consumption) via an application involving a popup control and a custom DependencyProperty property, related to lack of garbage collection.
Microsoft Silverlight 3.0.40624.00
Microsoft Silverlight 2.0.31005.00
Microsoft Silverlight
Microsoft Silverlight 3.0.50106.0
Microsoft Silverlight 3.0.40818.0
Microsoft Silverlight 3.0.40723.0
Microsoft Silverlight 2.0.40115.00
NA
CVE-2011-1845
Multiple memory leaks in the DataGrid control implementation in Microsoft Silverlight 4 prior to 4.0.60310.0 allow remote malicious users to cause a denial of service (memory consumption) via an application involving (1) subscriptions to an INotifyDataErrorInfo.ErrorsChanged even...
Microsoft Silverlight
Microsoft Silverlight 3.0.50106.0
Microsoft Silverlight 3.0.40818.0
Microsoft Silverlight 3.0.40723.0
Microsoft Silverlight 2.0.40115.00
Microsoft Silverlight 3.0.40624.00
Microsoft Silverlight 2.0.31005.00
NA
CVE-2010-1898
The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0 SP1, 2.0 SP2, 3.5, 3.5 SP1, and 3.5.1, and Microsoft Silverlight 2 and 3 prior to 3.0.50611.0 on Windows and prior to 3.0.41130.0 on Mac OS X, does not properly handle interfaces and delegations to virtual methods,...
Microsoft .net Framework 2.0
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft Silverlight
Microsoft Silverlight 3.0.40723.0
Microsoft Silverlight 3.0.40624.00
Microsoft Silverlight 2.0.40115.00
Microsoft Silverlight 2.0.31005.00
Microsoft Silverlight 3.0.40818.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-3611
CVE-2024-4947
CVE-2024-32988
CVE-2020-35165
local file inclusion
CVE-2024-4980
bypass
malicious code
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started