Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fw9f-x7gq-r4jp

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Microsoft XML Core Services (aka MSXML) 3.0 and 6.0 does not properly restrict the information transmitted by Internet Explorer during a download action, which allows remote attackers to discover (1) full pathnames on the client system and (2) local usernames embedded in these pathnames via a crafted web site, aka "MSXML Entity URI Vulnerability."

Microsoft XML Core Services (aka MSXML) 3.0 and 6.0 does not properly restrict the information transmitted by Internet Explorer during a download action, which allows remote attackers to discover (1) full pathnames on the client system and (2) local usernames embedded in these pathnames via a crafted web site, aka "MSXML Entity URI Vulnerability."

EPSS

Процентиль: 93%
0.10855
Средний

Связанные уязвимости

nvd
больше 11 лет назад

Microsoft XML Core Services (aka MSXML) 3.0 and 6.0 does not properly restrict the information transmitted by Internet Explorer during a download action, which allows remote attackers to discover (1) full pathnames on the client system and (2) local usernames embedded in these pathnames via a crafted web site, aka "MSXML Entity URI Vulnerability."

fstec
больше 11 лет назад

Уязвимость программного обеспечения Microsoft XML Core Services, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации

EPSS

Процентиль: 93%
0.10855
Средний