Predictable Address Vulnerability in Microsoft Enhanced Mitigation Experience Toolkit (EMET) before 4.0
CVE-2013-6791 · MEDIUM Severity
AV:N/AC:M/AU:N/C:N/I:P/A:N
Microsoft Enhanced Mitigation Experience Toolkit (EMET) before 4.0 uses predictable addresses for hooked functions, which makes it easier for context-dependent attackers to defeat the ASLR protection mechanism via a return-oriented programming (ROP) attack.
Learn more about our Web Application Penetration Testing UK.