CVE-2014-6332
Published at:
-
11-11-2014 11:55
Last modified:
-
12-01-2023 08:34
Total changes:
-
4
Description
Common Vulnerability Scoring System (CVSS)
Low
Attack complexity
Network
Attack vector
High
Availability
High
Confidentiality
High
Integrity
-
Privileges required
-
Scope
-
User interaction
9.3
Base score
8.6
10.0
Exploitability score
Impact score
Verification logic
Reference
- http://securityintelligence.com/ibm-x-force-researcher-finds-significant-vulnerability-in-microsoft-windows
- https://forsec.nl/wp-content/uploads/2014/11/ms14_064_ie_olerce.rb_.txt
- TA14-318B-Third Party Advisory, US Government Resource
- VU#158647-Third Party Advisory, US Government Resource
- 1031184-Third Party Advisory, VDB Entry
- http://packetstormsecurity.com/files/134061/The-World-Browser-3.0-Final-Remote-Code-Execution.html
- 38500-Exploit, Third Party Advisory, VDB Entry
- http://packetstormsecurity.com/files/134079/Winamp-Bento-Browser-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/134053/Avant-Browser-Lite-Ultimate-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/134064/Microsoft-Compiled-HTML-Help-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/134062/HTML-Compiler-Remote-Code-Execution.html
- 38512-Exploit, Third Party Advisory, VDB Entry
- 70952-Third Party Advisory, VDB Entry
- 37800-Exploit, Third Party Advisory, VDB Entry
- 37668-Exploit, Third Party Advisory, VDB Entry
- MS14-064-Patch, Vendor Advisory
Keywords