The Microsoft.XMLDOM ActiveX control in Microsoft Windows 8.1 and earlier allows remote attackers to determine the existence of local pathnames, UNC share pathnames, intranet hostnames, and intranet IP addresses by examining error codes, as demonstrated by a res:// URL, and exploited in the wild in February 2014.
History

Wed, 22 Oct 2025 01:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Mon, 10 Feb 2025 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-209
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L'}

kev

{'dateAdded': '2022-05-25'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2014-02-26T11:00:00.000Z

Updated: 2025-10-22T00:05:38.705Z

Reserved: 2014-02-25T00:00:00.000Z

Link: CVE-2013-7331

cve-icon Vulnrichment

Updated: 2024-08-06T18:01:20.441Z

cve-icon NVD

Status : Deferred

Published: 2014-02-26T14:55:08.520

Modified: 2025-10-22T01:15:52.873

Link: CVE-2013-7331

cve-icon Redhat

No data.