ID CVE-2014-1763
Summary Use-after-free vulnerability in Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code and bypass a sandbox protection mechanism via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2014.
References
Vulnerable Configurations
  • cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*
    cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*
  • cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*
    cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 12-10-2018 - 22:05)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
msbulletin via4
bulletin_id MS14-037
bulletin_url
date 2014-07-08T00:00:00
impact Remote Code Execution
knowledgebase_id 2975687
knowledgebase_url
severity Critical
title Cumulative Security Update for Internet Explorer
refmap via4
bugtraq 20140716 VUPEN Security Research - Microsoft Internet Explorer CSS @import Memory Corruption (Pwn2Own 2014)
misc
sectrack 1030532
secunia 59775
Last major update 12-10-2018 - 22:05
Published 27-04-2014 - 10:55
Last modified 12-10-2018 - 22:05
Back to Top