CVE-2014-2824Improper Restriction of Operations within the Bounds of a Memory Buffer in Microsoft Internet Explorer

Severity
9.3CRITICALNVD
OSV9.8
EPSS
16.3%
top 5.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 12
Latest updateJun 15

Description

Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0

Affected Packages2 packages

Ubuntuzabbix/zabbix< 1:2.2.2+dfsg-1ubuntu1+esm4+3

🔴Vulnerability Details

2
OSV
zabbix vulnerabilities2022-06-15
GHSA
GHSA-5hq3-g6f4-988x: Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web sit2022-05-14

🕵️Threat Intelligence

1
Zscaler
Zscaler Protects against Memory Corruption Vulnerabilities
CVE-2014-2824 — Microsoft vulnerability | cvebase