Search for vulnerabilities
Vulnerability details: VCID-5j1h-vgcz-aaac
Vulnerability ID VCID-5j1h-vgcz-aaac
Aliases CVE-2014-1510
Summary CVE-2014-1510 CVE-2014-1511 Mozilla: Privilege escalation using WebIDL-implemented APIs (MFSA 2014-29)
Status Published
Exploitability 2.0
Weighted Severity 9.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
rhas Critical https://access.redhat.com/errata/RHSA-2014:0310
rhas Important https://access.redhat.com/errata/RHSA-2014:0316
epss 0.47634 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.47634 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.47634 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.71822 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.71822 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.71822 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.71822 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.71822 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75716 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.75921 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.95098 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.95098 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.95098 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.95098 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.95098 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.95098 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.95098 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.95098 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
epss 0.95098 https://api.first.org/data/v1/epss?cve=CVE-2014-1510
rhbs urgent https://bugzilla.redhat.com/show_bug.cgi?id=1077490
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2014-1510
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2014-1510
cvssv3.1 9.8 https://nvd.nist.gov/vuln/detail/CVE-2014-1510
generic_textual critical https://www.mozilla.org/en-US/security/advisories/mfsa2014-29
cvssv3.1 8.8 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Reference id Reference type URL
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html
http://rhn.redhat.com/errata/RHSA-2014-0310.html
http://rhn.redhat.com/errata/RHSA-2014-0316.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1510.json
https://api.first.org/data/v1/epss?cve=CVE-2014-1510
https://bugzilla.mozilla.org/show_bug.cgi?id=982906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514
https://security.gentoo.org/glsa/201504-01
http://www.debian.org/security/2014/dsa-2881
http://www.debian.org/security/2014/dsa-2911
http://www.mozilla.org/security/announce/2014/mfsa2014-29.html
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securityfocus.com/bid/66206
http://www.ubuntu.com/usn/USN-2151-1
1077490 https://bugzilla.redhat.com/show_bug.cgi?id=1077490
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
CVE-2014-1510 https://nvd.nist.gov/vuln/detail/CVE-2014-1510
CVE-2014-1511;OSVDB-104594;CVE-2014-1510;OSVDB-104593 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/34448.rb
mfsa2014-29 https://www.mozilla.org/en-US/security/advisories/mfsa2014-29
RHSA-2014:0310 https://access.redhat.com/errata/RHSA-2014:0310
RHSA-2014:0316 https://access.redhat.com/errata/RHSA-2014:0316
USN-2150-1 https://usn.ubuntu.com/2150-1/
USN-2151-1 https://usn.ubuntu.com/2151-1/
Data source Metasploit
Description This exploit gains remote code execution on Firefox 22-27 by abusing two separate privilege escalation vulnerabilities in Firefox's Javascript APIs.
Note
{}
Ransomware campaign use Unknown
Source publication date March 17, 2014
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/browser/firefox_webidl_injection.rb
Data source Exploit-DB
Date added Aug. 28, 2014
Description Mozilla Firefox - WebIDL Privileged JavaScript Injection (Metasploit)
Ransomware campaign use Known
Source publication date Aug. 28, 2014
Exploit type remote
Platform multiple
Source update date Aug. 28, 2014
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2014-1510
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2014-1510
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2014-1510
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.97544
EPSS Score 0.47634
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.