Lucene search

K
HistoryMar 13, 2015 - 12:00 a.m.

(0Day) Oracle Data Quality DscXB onloadstatechange Use-After-Free Remote Code Execution Vulnerability

2015-03-1300:00:00
www.zerodayinitiative.com
17

0.786 High

EPSS

Percentile

98.3%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle Data Quality. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the TSS12.DscXB.XB ActiveX control. By modifying the HTML document within the onloadstatechange handler of the control, an attacker can cause an object to be used after it has been freed. An attacker could leverage this to execute arbitrary code in the context of the browser.

0.786 High

EPSS

Percentile

98.3%