Used Microsoft XML 3.0 Core Services Vulnerability Patch for Windows? Share your experience and help other users.
Key Details of Microsoft XML 3.0 Core Services Vulnerability Patch
- System administrators using Microsoft XML Core Services 2.6 and later should download this patch.
- Last updated on
- There have been 9 updates
Developer’s Description
A flaw exists in how the XMLHTTP control applies IE security zone settings to a redirected data stream returned in response to a request for data from a web site. A vulnerability results because an attacker could seek to exploit this flaw and specify a data source that is on the user's local system. The attacker could then use this to return information from the local system to the attacker's web site. An attacker would have to entice the user to a site under his control to exploit this vulnerability. It cannot be exploited by HTML email. In addition, the attacker would have to know the full path and file name of any file he would attempt to read. Finally, this vulnerability does not give an attacker any ability to add, change or delete data.
Used Microsoft XML 3.0 Core Services Vulnerability Patch for Windows? Share your experience and help other users.
Explore More
Secure Album for Windows 8
PaidProxy Magnet
FreeStaffCop
Trial versionCyberoam Web Filter Control
Trial versionWireshark Portable Development Release
FreeVideo Surveillance WebCam Software (Basic 4 Camera)
Trial versionWebAllow
Trial versionDigital File Shredder Pro
Trial versionExploitShield
FreeSecuBrowser for Windows 7
FreeLuJoSoft DeskLockII
FreeSecuBrowser for Windows XP
Free