{"metadata": {"count": 1, "page": 1, "per_page": 100}, "data": [{"uuid": "6d743489-a014-46ec-8038-8743a29b9b1c", "vulnerability": {"vulnId": "CVE-2014-4077", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "6d743489-a014-46ec-8038-8743a29b9b1c"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2022-05-25T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2022-05-25T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2022-05-25T00:00:00Z"}, "scope": {"notes": "KEV entry: Microsoft IME Japanese Privilege Escalation Vulnerability | Affected: Microsoft / Input Method Editor (IME) Japanese | Description: Microsoft Input Method Editor (IME) Japanese is a keyboard with Japanese characters that can be enabled on Windows systems as it is included by default (with the default set as disabled). IME Japanese contains an unspecified vulnerability when IMJPDCT.EXE (IME for Japanese) is installed which allows attackers to bypass a sandbox and perform privilege escalation. | Required action: Apply updates per vendor instructions. | Due date: 2022-06-15 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2014-4077"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-264"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Input Method Editor (IME) Japanese", "due_date": "2022-06-15", "date_added": "2022-05-25", "vendorProject": "Microsoft", "vulnerabilityName": "Microsoft IME Japanese Privilege Escalation Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2014-4077", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2014-4077"}]}]}
