CVE-2014-4130Improper Input Validation in Microsoft Internet Explorer

Severity
9.3CRITICALNVD
EPSS
19.3%
top 4.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 15
Latest updateMay 14

Description

Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-4132 and CVE-2014-4138.

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0

Affected Packages1 packages

🔴Vulnerability Details

3
GHSA
GHSA-wh5r-m2hg-jcv2: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web si2022-05-14
GHSA
GHSA-4cr4-j8fx-567m: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web si2022-05-14
GHSA
GHSA-jrf9-mm8v-9gp9: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web si2022-05-14

🕵️Threat Intelligence

2
Zscaler
Angler EK Utilizing 302 Cushioning & Domain Shadowing | Blog2015-04-03
Zscaler
Zscaler found Multiple Security Vulnerabilities | 10-14-2014
CVE-2014-4130 — Improper Input Validation in Microsoft | cvebase