Description
Multiple overflows and other unknown vulnerabilities were found in Microsoft Internet Explorer. By exploiting these vulnerabilities malicious users can gain privileges, execute arbitrary code or obtain sensitive information. These vulnerabilities can be exploited remotely via a specially designed web site or URL.
Original advisories
- CVE-2014-2803
- CVE-2014-2800
- CVE-2014-4133
- CVE-2014-2802
- CVE-2014-2807
- CVE-2014-2804
- CVE-2014-2801
- CVE-2014-4138
- CVE-2014-0283
- CVE-2014-0280
- CVE-2014-4132
- CVE-2014-0269
- CVE-2014-2808
- CVE-2014-4134
- CVE-2014-4130
- CVE-2014-4137
- CVE-2014-6329
- CVE-2014-2791
- CVE-2014-2798
- CVE-2014-6328
- CVE-2014-2789
- CVE-2014-2788
- CVE-2014-1755
- CVE-2014-2785
- CVE-2014-1752
- CVE-2014-1751
- CVE-2014-2786
- CVE-2014-2783
- CVE-2014-2784
- CVE-2014-2787
- CVE-2014-1763
- CVE-2014-1760
- CVE-2014-6376
- CVE-2014-1776
- CVE-2014-1815
- CVE-2014-4063
- CVE-2014-4067
- CVE-2014-0310
- CVE-2014-2811
- CVE-2014-1765
- CVE-2014-0325
- CVE-2014-0278
- CVE-2014-4052
- CVE-2014-2774
- CVE-2014-4050
- CVE-2014-4051
- CVE-2014-4057
- CVE-2014-4058
- CVE-2014-4055
- CVE-2014-4056
- CVE-2014-1753
- CVE-2014-0289
- CVE-2014-6375
- CVE-2014-6373
- CVE-2014-2827
- CVE-2014-2806
- CVE-2014-6363
- CVE-2014-0267
- CVE-2014-6365
- CVE-2014-4078
- CVE-2014-0287
- CVE-2014-6368
- CVE-2014-6369
- CVE-2014-4126
- CVE-2014-2817
- CVE-2014-4129
- CVE-2014-4128
- CVE-2014-2819
- CVE-2014-2818
- CVE-2014-2813
- CVE-2014-4127
- CVE-2014-4123
- CVE-2014-2810
- CVE-2014-0277
- CVE-2014-0270
- CVE-2014-0275
- CVE-2014-0276
- CVE-2014-0273
- CVE-2014-4124
- CVE-2014-0271
- CVE-2014-0272
- CVE-2014-0279
- CVE-2014-0274
- CVE-2014-0268
- CVE-2014-0235
- CVE-2014-6351
- CVE-2014-2809
- CVE-2014-6353
- CVE-2014-6350
- CVE-2014-2790
- CVE-2014-6327
- CVE-2014-2795
- CVE-2014-2794
- CVE-2014-2797
- CVE-2014-6323
- CVE-2014-0293
- CVE-2014-0290
- CVE-2014-2796
- CVE-2014-6366
- CVE-2014-6348
- CVE-2014-6341
- CVE-2014-6340
- CVE-2014-6343
- CVE-2014-4140
- CVE-2014-4143
- CVE-2014-2792
- CVE-2014-6349
- CVE-2014-6342
- CVE-2014-6345
- CVE-2014-6347
- CVE-2014-6344
- CVE-2014-2820
- CVE-2014-6346
- CVE-2014-2822
- CVE-2014-2821
- CVE-2014-2824
- CVE-2014-2823
- CVE-2014-2826
- CVE-2014-2825
- CVE-2014-6330
- CVE-2014-6337
- CVE-2014-0288
- CVE-2014-0285
- CVE-2014-0284
- CVE-2014-6339
- CVE-2014-0286
- CVE-2014-0281
- CVE-2014-4141
- CVE-2014-8966
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2014-6374 critical
- CVE-2014-2803 critical
- CVE-2014-2800 critical
- CVE-2014-4133 critical
- CVE-2014-2802 critical
- CVE-2014-2807 critical
- CVE-2014-2804 critical
- CVE-2014-2801 critical
- CVE-2014-4138 critical
- CVE-2014-0283 critical
- CVE-2014-0280 critical
- CVE-2014-4132 critical
- CVE-2014-0269 critical
- CVE-2014-2808 critical
- CVE-2014-4134 critical
- CVE-2014-4130 critical
- CVE-2014-4137 critical
- CVE-2014-6329 critical
- CVE-2014-2791 critical
- CVE-2014-2798 critical
- CVE-2014-6328 warning
- CVE-2014-2789 critical
- CVE-2014-2788 critical
- CVE-2014-1755 critical
- CVE-2014-2785 critical
- CVE-2014-1752 critical
- CVE-2014-1751 critical
- CVE-2014-2786 critical
- CVE-2014-2783 high
- CVE-2014-2784 critical
- CVE-2014-2787 critical
- CVE-2014-1763 critical
- CVE-2014-1760 critical
- CVE-2014-6376 critical
- CVE-2014-1776 critical
- CVE-2014-1815 critical
- CVE-2014-4063 critical
- CVE-2014-4067 critical
- CVE-2014-0310 critical
- CVE-2014-2811 critical
- CVE-2014-1765 high
- CVE-2014-0325 critical
- CVE-2014-0278 critical
- CVE-2014-4052 critical
- CVE-2014-2774 critical
- CVE-2014-4050 critical
- CVE-2014-4051 critical
- CVE-2014-4057 critical
- CVE-2014-4058 critical
- CVE-2014-4055 critical
- CVE-2014-4056 critical
- CVE-2014-1753 critical
- CVE-2014-0289 critical
- CVE-2014-6375 critical
- CVE-2014-6373 critical
- CVE-2014-2827 critical
- CVE-2014-2806 critical
- CVE-2014-6363 critical
- CVE-2014-0267 critical
- CVE-2014-6365 warning
- CVE-2014-4078 high
- CVE-2014-0287 critical
- CVE-2014-6368 warning
- CVE-2014-6369 critical
- CVE-2014-4126 critical
- CVE-2014-2817 critical
- CVE-2014-4129 critical
- CVE-2014-4128 critical
- CVE-2014-2819 high
- CVE-2014-2818 critical
- CVE-2014-2813 critical
- CVE-2014-4127 critical
- CVE-2014-4123 critical
- CVE-2014-2810 critical
- CVE-2014-0277 critical
- CVE-2014-0270 critical
- CVE-2014-0275 critical
- CVE-2014-0276 critical
- CVE-2014-0273 critical
- CVE-2014-4124 high
- CVE-2014-0271 critical
- CVE-2014-0272 critical
- CVE-2014-0279 critical
- CVE-2014-0274 critical
- CVE-2014-0268 warning
- CVE-2014-0235 warning
- CVE-2014-6351 critical
- CVE-2014-2809 critical
- CVE-2014-6353 critical
- CVE-2014-6350 warning
- CVE-2014-2790 critical
- CVE-2014-6327 critical
- CVE-2014-2795 critical
- CVE-2014-2794 critical
- CVE-2014-2797 critical
- CVE-2014-6323 warning
- CVE-2014-0293 warning
- CVE-2014-0290 critical
- CVE-2014-2796 critical
- CVE-2014-6366 critical
- CVE-2014-6348 critical
- CVE-2014-6341 critical
- CVE-2014-6340 warning
- CVE-2014-6343 critical
- CVE-2014-4140 warning
- CVE-2014-4143 critical
- CVE-2014-2792 critical
- CVE-2014-6349 warning
- CVE-2014-6342 critical
- CVE-2014-6345 warning
- CVE-2014-6347 critical
- CVE-2014-6344 critical
- CVE-2014-2820 critical
- CVE-2014-6346 warning
- CVE-2014-2822 critical
- CVE-2014-2821 critical
- CVE-2014-2824 critical
- CVE-2014-2823 critical
- CVE-2014-2826 critical
- CVE-2014-2825 critical
- CVE-2014-6330 critical
- CVE-2014-6337 critical
- CVE-2014-0288 critical
- CVE-2014-0285 critical
- CVE-2014-0284 critical
- CVE-2014-6339 warning
- CVE-2014-0286 critical
- CVE-2014-0281 critical
- CVE-2014-4141 critical
- CVE-2014-8966 critical
KB list
- 3038314
- 2919355
- 2953522
- 2936068
- 3003057
- 2950467
- 2963952
- 2976627
- 2975687
- 3012168
- 3008923
- 2964444
- 2909921
- 2962872
- 2987107
- 2964358
- 2962482
- 3029449
- 2965111
- 2961851
- 2929437
- 3012176
- 3012172
- 2909213
- 2909212
- 2909210
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!