CVE-2013-7331

MEDIUM KEV RANSOMWARE

Microsoft XMLDOM - Info Disclosure

Title source: llm

Description

The Microsoft.XMLDOM ActiveX control in Microsoft Windows 8.1 and earlier allows remote attackers to determine the existence of local pathnames, UNC share pathnames, intranet hostnames, and intranet IP addresses by examining error codes, as demonstrated by a res:// URL, and exploited in the wild in February 2014.

Exploits (1)

metasploit WORKING POC
by Soroush Dalili, sinn3r · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/ms14_052_xmldom.rb

Scores

CVSS v3 6.5
EPSS 0.8181
EPSS Percentile 99.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L

Details

CISA KEV 2022-05-25
VulnCheck KEV 2014-02-26
InTheWild.io 2019-05-14
ENISA EUVD EUVD-2013-7105
Ransomware Use Confirmed
CWE
CWE-209
Status published
Products (6)
microsoft/internet_explorer 6
microsoft/internet_explorer 7
microsoft/internet_explorer 8
microsoft/internet_explorer 9
microsoft/internet_explorer 10
microsoft/internet_explorer 11
Published Feb 26, 2014
KEV Added May 25, 2022
Tracked Since Feb 18, 2026