Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w256-55mp-mjfh

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Microsoft msxml.dll, as used in Internet Explorer 8 on Windows 7, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function. NOTE: this might overlap CVE-2011-1202.

Microsoft msxml.dll, as used in Internet Explorer 8 on Windows 7, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function. NOTE: this might overlap CVE-2011-1202.

EPSS

Процентиль: 95%
0.17628
Средний

Дефекты

CWE-200

Связанные уязвимости

nvd
почти 15 лет назад

Microsoft msxml.dll, as used in Internet Explorer 8 on Windows 7, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function. NOTE: this might overlap CVE-2011-1202.

EPSS

Процентиль: 95%
0.17628
Средний

Дефекты

CWE-200