CVE-2014-0322

8.8 HIGH CISA KEV - Actively Exploited
Published: February 14, 2014 Modified: October 22, 2025

Description

Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via vectors involving crafted JavaScript code, CMarkup, and the onpropertychange attribute of a script element, as exploited in the wild in January and February 2014.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://technet.microsoft.com/security/advisory/2934088
Source: secure@microsoft.com
Patch Vendor Advisory
http://twitter.com/nanoc0re/statuses/434251658344673281
Source: secure@microsoft.com
Press/Media Coverage
http://www.exploit-db.com/exploits/32851
Source: secure@microsoft.com
Exploit Third Party Advisory VDB Entry
http://www.exploit-db.com/exploits/32904
Source: secure@microsoft.com
Exploit Third Party Advisory VDB Entry
http://www.kb.cert.org/vuls/id/732479
Source: secure@microsoft.com
Third Party Advisory US Government Resource
http://www.osvdb.org/103354
Source: secure@microsoft.com
Broken Link
https://www.dropbox.com/s/pyxjgycmudirbqe/CVE-2014-0322.zip
Source: secure@microsoft.com
Broken Link Exploit
http://technet.microsoft.com/security/advisory/2934088
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://twitter.com/nanoc0re/statuses/434251658344673281
Source: af854a3a-2127-422b-91ae-364da2661108
Press/Media Coverage
http://www.exploit-db.com/exploits/32851
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry
http://www.exploit-db.com/exploits/32904
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry
http://www.kb.cert.org/vuls/id/732479
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.osvdb.org/103354
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-012
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
https://www.dropbox.com/s/pyxjgycmudirbqe/CVE-2014-0322.zip
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Exploit

23 reference(s) from NVD

Quick Stats

CVSS v3 Score
8.8 / 10.0
EPSS (Exploit Probability)
93.2%
100th percentile
Exploitation Status
Actively Exploited
Remediation due: 2022-05-25

Weaknesses (CWE)

Affected Vendors

microsoft