The Microsoft.XMLDOM ActiveX control in Microsoft Windows 8.1 and earlier allows remote attackers to determine the existence of local pathnames, UNC share pathnames, intranet hostnames, and intranet IP addresses by examining error codes, as demonstrated by a res:// URL, and exploited in the wild in February 2014.
History

Mon, 10 Feb 2025 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-209
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L'}

kev

{'dateAdded': '2022-05-25'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-02-10T20:12:05.095Z

Reserved: 2014-02-25T00:00:00.000Z

Link: CVE-2013-7331

cve-icon Vulnrichment

Updated: 2024-08-06T18:01:20.441Z

cve-icon NVD

Status : Modified

Published: 2014-02-26T14:55:08.520

Modified: 2025-02-10T21:15:10.747

Link: CVE-2013-7331

cve-icon Redhat

No data.