The Microsoft.XMLDOM ActiveX control in Microsoft Windows...
Moderate severity
Unreviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Dec 20, 2024
Description
Published by the National Vulnerability Database
Feb 26, 2014
Published to the GitHub Advisory Database
May 14, 2022
Last updated
Dec 20, 2024
The Microsoft.XMLDOM ActiveX control in Microsoft Windows 8.1 and earlier allows remote attackers to determine the existence of local pathnames, UNC share pathnames, intranet hostnames, and intranet IP addresses by examining error codes, as demonstrated by a res:// URL, and exploited in the wild in February 2014.
References