9.3
CVSSv2

CVE-2014-0282

Published: 11/06/2014 Updated: 12/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 941
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Microsoft Internet Explorer 6 through 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-1775, CVE-2014-1779, CVE-2014-1799, CVE-2014-1803, and CVE-2014-2757.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft internet explorer 7

microsoft internet explorer 6

microsoft internet explorer 11

microsoft internet explorer 8

microsoft internet explorer 10

microsoft internet explorer 9

Exploits

<!-- Exploit Title: MS14-035 Internet Explorer CInput Use-after-free POC Product: Internet Explorer Vulnerable version: 8,9,10 Date: 23062014 Exploit Author: Drozdova Liudmila, ITDefensor Vulnerability Research Team (itdefensorru/) Vendor Homepage: wwwmicrosoftcom/ Tested on: Window 7 SP1 x86 IE 7,8,9,10 CVE : unknown --> ...
<!-- Exploit Title: MS14-035 Internet Explorer CFormElement Use-after-free and memory corruption POC (no crash! see trace) Product: Internet Explorer Vulnerable version: 9,10 Date: 8072014 Exploit Author: Drozdova Liudmila, ITDefensor Vulnerability Research Team (itdefensorru/) Vendor Homepage: wwwmicrosoftcom/ Tested on: Wind ...

Github Repositories

PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282

PyStegosploit - Exploit Delivery via Steganography and Polyglots [video1] | [video2] | [page] by Charmve - yidazhang1 [at] gmail[dot]com, @Charmve @therealsaumil @amichael May 2021 Stegosploit creates a new way to encode "drive-by" browser exploits and deliver them through image files These payloads are undetectable using current means This paper discusses two br

Web application security project to deliver Javascript exploits in steganographically encoded JPG and PNG files

python-stegosploit How Stegosploit Works The exploit code is inserted within the pixels of the image so that the image contains the exploit code IMAJS then creates a polyglot image that will be read as an image and contains a decoder that will extract and run the javascript exploit The exploit that we will use is an Internet Explorer Use-after-free exploit (CVE-2014-0282) W

πŸ‘‹πŸΌ About my Sponsor Program

Hi πŸ‘‹πŸΌ It's nice to have you here and thanks for sponsoring! Your sponsorships are meaning a lot to me as them support me focusing on maintaining my projects and dreaming up new ideas instead of worrying much about money In this GitHub Sponsor Program, I have several private working-in-progress projects that sponsors reaching certain tiers can have early access to t

Python port of stegosploit toolkit

python-stegosploit How Stegosploit Works The exploit code is inserted within the pixels of the image so that the image contains the exploit code IMAJS then creates a polyglot image that will be read as an image and contains a decoder that will extract and run the javascript exploit The exploit that we will use is an Internet Explorer Use-after-free exploit (CVE-2014-0282) W