Executive Summary

Informations
Name CVE-2014-6328 First vendor Publication 2014-12-10
Vendor Cve Last vendor Modification 2018-10-12

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Microsoft Internet Explorer 8 through 11 allows remote attackers to bypass the XSS filter via a crafted attribute of an element in an HTML document, aka "Internet Explorer XSS Filter Bypass Vulnerability," a different vulnerability than CVE-2014-6365.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6328

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:28172
 
Oval ID: oval:org.mitre.oval:def:28172
Title: Internet Explorer XSS filter bypass vulnerability - CVE-2014-6328 (MS14-080)
Description: Microsoft Internet Explorer 8 through 11 allows remote attackers to bypass the XSS filter via a crafted attribute of an element in an HTML document, aka "Internet Explorer XSS Filter Bypass Vulnerability," a different vulnerability than CVE-2014-6365.
Family: windows Class: vulnerability
Reference(s): CVE-2014-6328
Version: 3
Platform(s): Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows 7
Microsoft Windows Server 2008 R2
Microsoft Windows 8
Microsoft Windows Server 2012
Microsoft Windows 8.1
Microsoft Windows Server 2012 R2
Product(s): Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 4

Snort® IPS/IDS

Date Description
2017-03-02 Microsoft Internet Explorer 7 CTreeNode object remote code execution attempt
RuleID : 41475 - Revision : 2 - Type : BROWSER-IE
2017-03-02 Microsoft Internet Explorer 7 CTreeNode object remote code execution attempt
RuleID : 41474 - Revision : 2 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer CTreePos insertAdjacentText use after free attempt
RuleID : 32725 - Revision : 2 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer CTreePos insertAdjacentText use after free attempt
RuleID : 32724 - Revision : 2 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer CButton object use after free attempt
RuleID : 32723 - Revision : 2 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer CButton object use after free attempt
RuleID : 32722 - Revision : 2 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer element type confusion use after free attempt
RuleID : 32721 - Revision : 3 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer element type confusion use after free attempt
RuleID : 32720 - Revision : 3 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer 7 CTreeNode object remote code execution attempt
RuleID : 32717 - Revision : 3 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer 7 CTreeNode object remote code execution attempt
RuleID : 32716 - Revision : 3 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer 10 CTableSection remote code execution attempt
RuleID : 32715 - Revision : 2 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer 10 CTableSection remote code execution attempt
RuleID : 32714 - Revision : 2 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer cross site scripting filter bypass attempt
RuleID : 32713 - Revision : 2 - Type : BROWSER-OTHER
2015-01-08 Microsoft Internet Explorer XSS filter bypass attempt
RuleID : 32710 - Revision : 3 - Type : BROWSER-IE
2015-01-08 VBScript RegEx use-after-free attempt
RuleID : 32709 - Revision : 2 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer use of rtf file in clipboard attempt
RuleID : 32704 - Revision : 2 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer use of rtf file in clipboard attempt
RuleID : 32703 - Revision : 2 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer CSS out-of-bounds buffer access attempt
RuleID : 32694 - Revision : 3 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer CSS out-of-bounds buffer access attempt
RuleID : 32693 - Revision : 3 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer NodeFilter use after free attempt
RuleID : 32692 - Revision : 2 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer NodeFilter use after free attempt
RuleID : 32691 - Revision : 2 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer style object type confusion attempt
RuleID : 32690 - Revision : 2 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer style object type confusion attempt
RuleID : 32689 - Revision : 2 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer setTimeout use after free attempt
RuleID : 32686 - Revision : 3 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer setTimeout use after free attempt
RuleID : 32685 - Revision : 3 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer lineboxbuilder out of bound array access attempt
RuleID : 32680 - Revision : 2 - Type : BROWSER-IE
2015-01-08 Microsoft Internet Explorer lineboxbuilder out of bound array access attempt
RuleID : 32679 - Revision : 2 - Type : BROWSER-IE

Nessus® Vulnerability Scanner

Date Description
2014-12-09 Name : The remote host has a web browser installed that is affected by multiple vuln...
File : smb_nt_ms14-080.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14...

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2021-05-04 12:33:03
  • Multiple Updates
2021-04-22 01:40:22
  • Multiple Updates
2020-05-23 00:42:02
  • Multiple Updates
2018-10-13 05:18:48
  • Multiple Updates
2015-01-08 21:27:41
  • Multiple Updates
2014-12-11 21:23:54
  • Multiple Updates
2014-12-11 05:28:29
  • First insertion