Vulnerability Details : CVE-2014-1763
Use-after-free vulnerability in Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code and bypass a sandbox protection mechanism via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2014.
Vulnerability category: Memory CorruptionExecute code
Products affected by CVE-2014-1763
- cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-1763
27.19%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-1763
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2014-1763
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-1763
-
http://www.securityfocus.com/archive/1/532797/100/0/threaded
SecurityFocus
-
http://www.securitytracker.com/id/1030532
Microsoft Internet Explorer Mulitple Flaws Let Remote Users Execute Arbitrary Code and Bypass EV Certificate Guidelines - SecurityTracker
-
http://www.pwn2own.com/2014/03/pwn2own-results-for-wednesday-day-one/
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-037
Microsoft Security Bulletin MS14-037 - Critical | Microsoft Docs
-
http://twitter.com/thezdi/statuses/443855973673754624
Zero Day Initiative on Twitter: "VUPEN collects another laptop as IE falls. Microsoft, prepare for validation and responsible disclosure. Next round 3pm. #pwn2own"
Jump to