mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-30 18:04:30 +00:00
137 lines
4.7 KiB
JSON
137 lines
4.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2006-3014",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Microsoft Excel allows user-assisted attackers to execute arbitrary javascript and redirect users to arbitrary sites via an Excel spreadsheet with an embedded Shockwave Flash Player ActiveX Object, which is automatically executed when the user opens the spreadsheet."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "ADV-2006-3573",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2006/3573"
|
|
},
|
|
{
|
|
"name": "TA06-318A",
|
|
"refsource": "CERT",
|
|
"url": "http://www.us-cert.gov/cas/techalerts/TA06-318A.html"
|
|
},
|
|
{
|
|
"name": "ADV-2006-4507",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2006/4507"
|
|
},
|
|
{
|
|
"name": "19980",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/19980"
|
|
},
|
|
{
|
|
"name": "22882",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/22882"
|
|
},
|
|
{
|
|
"name": "21865",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/21865"
|
|
},
|
|
{
|
|
"name": "20060620 Microsoft Excel File Embedded Shockwave Flash Object Exploit",
|
|
"refsource": "FULLDISC",
|
|
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0414.html"
|
|
},
|
|
{
|
|
"name": "http://www.securiteam.com/windowsntfocus/5TP0M0KIUA.html",
|
|
"refsource": "MISC",
|
|
"url": "http://www.securiteam.com/windowsntfocus/5TP0M0KIUA.html"
|
|
},
|
|
{
|
|
"name": "http://hackingspirits.com/vuln-rnd/vuln-rnd.html",
|
|
"refsource": "MISC",
|
|
"url": "http://hackingspirits.com/vuln-rnd/vuln-rnd.html"
|
|
},
|
|
{
|
|
"name": "http://www.adobe.com/support/security/bulletins/apsb06-11.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.adobe.com/support/security/bulletins/apsb06-11.html"
|
|
},
|
|
{
|
|
"name": "oval:org.mitre.oval:def:538",
|
|
"refsource": "OVAL",
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A538"
|
|
},
|
|
{
|
|
"name": "ADV-2006-3577",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2006/3577"
|
|
},
|
|
{
|
|
"name": "18583",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/18583"
|
|
},
|
|
{
|
|
"name": "excel-shockwave-code-execution(27312)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27312"
|
|
},
|
|
{
|
|
"name": "MS06-069",
|
|
"refsource": "MS",
|
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069"
|
|
},
|
|
{
|
|
"name": "1016344",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1016344"
|
|
}
|
|
]
|
|
}
|
|
} |