Searching
..

Click anywhere to stop

KLA10602
Multiple vulnerabilities in Microsoft Internet Explorer

Updated: 03/06/2024
Detect date
?
09/09/2014
Severity
?
Critical
Description

Multiple overflows and other unknown vulnerabilities were found in Microsoft Internet Explorer. By exploiting these vulnerabilities malicious users can gain privileges, execute arbitrary code or obtain sensitive information. These vulnerabilities can be exploited remotely via a specially designed web site or URL.

Affected products

Microsoft Internet Explorer from 6 through 11

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories

CVE-2014-6374
CVE-2014-2803
CVE-2014-2800
CVE-2014-4133
CVE-2014-2802
CVE-2014-2807
CVE-2014-2804
CVE-2014-2801
CVE-2014-4138
CVE-2014-0283
CVE-2014-0280
CVE-2014-4132
CVE-2014-0269
CVE-2014-2808
CVE-2014-4134
CVE-2014-4130
CVE-2014-4137
CVE-2014-6329
CVE-2014-2791
CVE-2014-2798
CVE-2014-6328
CVE-2014-2789
CVE-2014-2788
CVE-2014-1755
CVE-2014-2785
CVE-2014-1752
CVE-2014-1751
CVE-2014-2786
CVE-2014-2783
CVE-2014-2784
CVE-2014-2787
CVE-2014-1763
CVE-2014-1760
CVE-2014-6376
CVE-2014-1776
CVE-2014-1815
CVE-2014-4063
CVE-2014-4067
CVE-2014-0310
CVE-2014-2811
CVE-2014-1765
CVE-2014-0325
CVE-2014-0278
CVE-2014-4052
CVE-2014-2774
CVE-2014-4050
CVE-2014-4051
CVE-2014-4057
CVE-2014-4058
CVE-2014-4055
CVE-2014-4056
CVE-2014-1753
CVE-2014-0289
CVE-2014-6375
CVE-2014-6373
CVE-2014-2827
CVE-2014-2806
CVE-2014-6363
CVE-2014-0267
CVE-2014-6365
CVE-2014-4078
CVE-2014-0287
CVE-2014-6368
CVE-2014-6369
CVE-2014-4126
CVE-2014-2817
CVE-2014-4129
CVE-2014-4128
CVE-2014-2819
CVE-2014-2818
CVE-2014-2813
CVE-2014-4127
CVE-2014-4123
CVE-2014-2810
CVE-2014-0277
CVE-2014-0270
CVE-2014-0275
CVE-2014-0276
CVE-2014-0273
CVE-2014-4124
CVE-2014-0271
CVE-2014-0272
CVE-2014-0279
CVE-2014-0274
CVE-2014-0268
CVE-2014-0235
CVE-2014-6351
CVE-2014-2809
CVE-2014-6353
CVE-2014-6350
CVE-2014-2790
CVE-2014-6327
CVE-2014-2795
CVE-2014-2794
CVE-2014-2797
CVE-2014-6323
CVE-2014-0293
CVE-2014-0290
CVE-2014-2796
CVE-2014-6366
CVE-2014-6348
CVE-2014-6341
CVE-2014-6340
CVE-2014-6343
CVE-2014-4140
CVE-2014-4143
CVE-2014-2792
CVE-2014-6349
CVE-2014-6342
CVE-2014-6345
CVE-2014-6347
CVE-2014-6344
CVE-2014-2820
CVE-2014-6346
CVE-2014-2822
CVE-2014-2821
CVE-2014-2824
CVE-2014-2823
CVE-2014-2826
CVE-2014-2825
CVE-2014-6330
CVE-2014-6337
CVE-2014-0288
CVE-2014-0285
CVE-2014-0284
CVE-2014-6339
CVE-2014-0286
CVE-2014-0281
CVE-2014-4141
CVE-2014-8966

Impacts
?
ACE 
[?]

OSI 
[?]

SB 
[?]

PE 
[?]

RLF 
[?]

SUI 
[?]
Related products
Microsoft Internet Explorer
CVE-IDS
?
CVE-2014-63749.3Critical
CVE-2014-28039.3Critical
CVE-2014-28009.3Critical
CVE-2014-41339.3Critical
CVE-2014-28029.3Critical
CVE-2014-28079.3Critical
CVE-2014-28049.3Critical
CVE-2014-28019.3Critical
CVE-2014-41389.3Critical
CVE-2014-02839.3Critical
CVE-2014-02809.3Critical
CVE-2014-41329.3Critical
CVE-2014-02699.3Critical
CVE-2014-28089.3Critical
CVE-2014-41349.3Critical
CVE-2014-41309.3Critical
CVE-2014-41379.3Critical
CVE-2014-63299.3Critical
CVE-2014-27919.3Critical
CVE-2014-27989.3Critical
CVE-2014-63285.0Warning
CVE-2014-27899.3Critical
CVE-2014-27889.3Critical
CVE-2014-17559.3Critical
CVE-2014-27859.3Critical
CVE-2014-17529.3Critical
CVE-2014-17519.3Critical
CVE-2014-27869.3Critical
CVE-2014-27836.4High
CVE-2014-27849.3Critical
CVE-2014-27879.3Critical
CVE-2014-17609.3Critical
CVE-2014-63769.3Critical
CVE-2014-18159.3Critical
CVE-2014-40639.3Critical
CVE-2014-40679.3Critical
CVE-2014-03109.3Critical
CVE-2014-28119.3Critical
CVE-2014-17657.6High
CVE-2014-03259.3Critical
CVE-2014-02789.3Critical
CVE-2014-40529.3Critical
CVE-2014-27749.3Critical
CVE-2014-40509.3Critical
CVE-2014-40519.3Critical
CVE-2014-40579.3Critical
CVE-2014-40589.3Critical
CVE-2014-40559.3Critical
CVE-2014-40569.3Critical
CVE-2014-17539.3Critical
CVE-2014-02899.3Critical
CVE-2014-63759.3Critical
CVE-2014-63739.3Critical
CVE-2014-28279.3Critical
CVE-2014-28069.3Critical
CVE-2014-63639.3Critical
CVE-2014-02679.3Critical
CVE-2014-63654.3Warning
CVE-2014-40785.1High
CVE-2014-02879.3Critical
CVE-2014-63684.3Warning
CVE-2014-63699.3Critical
CVE-2014-41269.3Critical
CVE-2014-28176.8High
CVE-2014-41299.3Critical
CVE-2014-41289.3Critical
CVE-2014-28196.8High
CVE-2014-28189.3Critical
CVE-2014-28139.3Critical
CVE-2014-41279.3Critical
CVE-2014-41236.8High
CVE-2014-28109.3Critical
CVE-2014-02779.3Critical
CVE-2014-02709.3Critical
CVE-2014-02759.3Critical
CVE-2014-02769.3Critical
CVE-2014-02739.3Critical
CVE-2014-41246.8High
CVE-2014-02719.3Critical
CVE-2014-02729.3Critical
CVE-2014-02799.3Critical
CVE-2014-02749.3Critical
CVE-2014-02684.3Warning
CVE-2014-02355.0Warning
CVE-2014-63519.3Critical
CVE-2014-28099.3Critical
CVE-2014-63539.3Critical
CVE-2014-63504.3Warning
CVE-2014-27909.3Critical
CVE-2014-63279.3Critical
CVE-2014-27959.3Critical
CVE-2014-27949.3Critical
CVE-2014-27979.3Critical
CVE-2014-63234.3Warning
CVE-2014-02934.3Warning
CVE-2014-02909.3Critical
CVE-2014-27969.3Critical
CVE-2014-63669.3Critical
CVE-2014-63489.3Critical
CVE-2014-63419.3Critical
CVE-2014-63404.3Warning
CVE-2014-63439.3Critical
CVE-2014-41404.3Warning
CVE-2014-41439.3Critical
CVE-2014-27929.3Critical
CVE-2014-63494.3Warning
CVE-2014-63429.3Critical
CVE-2014-63454.3Warning
CVE-2014-63479.3Critical
CVE-2014-63449.3Critical
CVE-2014-28209.3Critical
CVE-2014-63464.3Warning
CVE-2014-28229.3Critical
CVE-2014-28219.3Critical
CVE-2014-28249.3Critical
CVE-2014-28239.3Critical
CVE-2014-28269.3Critical
CVE-2014-28259.3Critical
CVE-2014-63309.3Critical
CVE-2014-63379.3Critical
CVE-2014-02889.3Critical
CVE-2014-02859.3Critical
CVE-2014-02849.3Critical
CVE-2014-63395.0Warning
CVE-2014-02869.3Critical
CVE-2014-02819.3Critical
CVE-2014-41419.3Critical
CVE-2014-89669.3Critical
Microsoft official advisories
Microsoft Security Update Guide
KB list

3038314
2919355
2953522
2936068
3003057
2950467
2963952
2976627
2975687
3012168
3008923
2964444
2909921
2962872
2987107
2964358
2962482
3029449
2965111
2961851
2929437
3012176
3012172
2909213
2909212
2909210

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Find out the statistics of the vulnerabilities spreading in your region