CVE-2014-2825 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Microsoft Internet Explorer
CWE-119 — Improper Restriction of Operations within the Bounds of a Memory Buffer13 documents3 sources
Severity
9.3CRITICALNVD
OSV9.8
EPSS
16.3%
top 5.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 12
Latest updateJun 15
Description
Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2796, CVE-2014-2808, CVE-2014-4050, CVE-2014-4055, and CVE-2014-4067.
CVSS vector
AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0
Affected Packages2 packages
🔴Vulnerability Details
7GHSA▶
GHSA-5wpx-2446-794j: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted↗2022-05-14
GHSA▶
GHSA-4r4h-w86r-vj96: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted↗2022-05-14
GHSA▶
GHSA-fq35-2hm7-6r52: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted↗2022-05-14
GHSA▶
GHSA-q5hw-rc8m-cf9j: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted↗2022-05-14