Microsoft XML Core Services allows developers to create XML-based applications.
A memory corruption vulnerability allows command execution when a user opens a specially crafted web page, which causes MSXML to access an uninitialized object.
See Microsoft Security Advisory 2719615 for fix information and workarounds.
Exploit works on Windows XP and Windows 7 and requires a user to open the exploit page in Internet Explorer 8 or 9.
JRE 6 must be installed on Windows 7 targets.