### [CVE-2007-0099](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0099) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Race condition in the msxml3 module in Microsoft XML Core Services 3.0, as used in Internet Explorer 6 and other applications, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via many nested tags in an XML document in an IFRAME, when synchronous document rendering is frequently disrupted with asynchronous events, as demonstrated using a JavaScript timer, which can trigger NULL pointer dereferences or memory corruption, aka "MSXML Memory Corruption Vulnerability." ### POC #### Reference - http://isc.sans.org/diary.php?storyid=2004 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-069 #### Github No PoCs found on GitHub currently.