9.3
CVSSv2

CVE-2014-0282

Published: 11/06/2014 Updated: 12/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 941
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Microsoft Internet Explorer 6 through 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1775, CVE-2014-1779, CVE-2014-1799, CVE-2014-1803, and CVE-2014-2757.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft internet explorer 7

microsoft internet explorer 6

microsoft internet explorer 11

microsoft internet explorer 8

microsoft internet explorer 10

microsoft internet explorer 9

Exploits

<!-- Exploit Title: MS14-035 Internet Explorer CInput Use-after-free POC Product: Internet Explorer Vulnerable version: 8,9,10 Date: 23062014 Exploit Author: Drozdova Liudmila, ITDefensor Vulnerability Research Team (itdefensorru/) Vendor Homepage: wwwmicrosoftcom/ Tested on: Window 7 SP1 x86 IE 7,8,9,10 CVE : unknown --> ...
<!-- Exploit Title: MS14-035 Internet Explorer CFormElement Use-after-free and memory corruption POC (no crash! see trace) Product: Internet Explorer Vulnerable version: 9,10 Date: 8072014 Exploit Author: Drozdova Liudmila, ITDefensor Vulnerability Research Team (itdefensorru/) Vendor Homepage: wwwmicrosoftcom/ Tested on: Wind ...

Github Repositories

πŸ‘‹πŸΌ About my Sponsor Program

Hi πŸ‘‹πŸΌ It's nice to have you here and thanks for sponsoring! Your sponsorships are meaning a lot to me as them support me focusing on maintaining my projects and dreaming up new ideas instead of worrying much about money In this GitHub Sponsor Program, I have several private working-in-progress projects that sponsors reaching certain tiers can have early access to t

Web application security project to deliver Javascript exploits in steganographically encoded JPG and PNG files

python-stegosploit How Stegosploit Works The exploit code is inserted within the pixels of the image so that the image contains the exploit code IMAJS then creates a polyglot image that will be read as an image and contains a decoder that will extract and run the javascript exploit The exploit that we will use is an Internet Explorer Use-after-free exploit (CVE-2014-0282) W

PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282

PyStegosploit - Exploit Delivery via Steganography and Polyglots [video1] | [video2] | [page] by Charmve - yidazhang1 [at] gmail[dot]com, @Charmve @therealsaumil @amichael May 2021 Stegosploit creates a new way to encode "drive-by" browser exploits and deliver them through image files These payloads are undetectable using current means This paper discusses two br

Python port of stegosploit toolkit

python-stegosploit How Stegosploit Works The exploit code is inserted within the pixels of the image so that the image contains the exploit code IMAJS then creates a polyglot image that will be read as an image and contains a decoder that will extract and run the javascript exploit The exploit that we will use is an Internet Explorer Use-after-free exploit (CVE-2014-0282) W