Логотип exploitDog
bind:CVE-2011-1713
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2011-1713

Количество 2

Количество 2

nvd логотип

CVE-2011-1713

почти 15 лет назад

Microsoft msxml.dll, as used in Internet Explorer 8 on Windows 7, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function. NOTE: this might overlap CVE-2011-1202.

CVSS2: 4.3
EPSS: Средний
github логотип

GHSA-w256-55mp-mjfh

больше 3 лет назад

Microsoft msxml.dll, as used in Internet Explorer 8 on Windows 7, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function. NOTE: this might overlap CVE-2011-1202.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2011-1713

Microsoft msxml.dll, as used in Internet Explorer 8 on Windows 7, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function. NOTE: this might overlap CVE-2011-1202.

CVSS2: 4.3
18%
Средний
почти 15 лет назад
github логотип
GHSA-w256-55mp-mjfh

Microsoft msxml.dll, as used in Internet Explorer 8 on Windows 7, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function. NOTE: this might overlap CVE-2011-1202.

18%
Средний
больше 3 лет назад

Уязвимостей на страницу