mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
147 lines
5.4 KiB
JSON
147 lines
5.4 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secure@microsoft.com",
|
|
"ID": "CVE-2006-4704",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Cross-zone scripting vulnerability in the WMI Object Broker (WMIScriptUtils.WMIObjectBroker2) ActiveX control (WmiScriptUtils.dll) in Microsoft Visual Studio 2005 allows remote attackers to bypass Internet zone restrictions and execute arbitrary code by instantiating dangerous objects, aka \"WMI Object Broker Vulnerability.\""
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "20843",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/20843"
|
|
},
|
|
{
|
|
"name": "20061212 ZDI-06-047: Microsoft Visual Studio WmiScriptUtils.dll Cross-Zone Scripting Vulnerability",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/454201/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "http://research.eeye.com/html/alerts/zeroday/20061031.html",
|
|
"refsource": "MISC",
|
|
"url": "http://research.eeye.com/html/alerts/zeroday/20061031.html"
|
|
},
|
|
{
|
|
"name": "MS06-073",
|
|
"refsource": "MS",
|
|
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-073"
|
|
},
|
|
{
|
|
"name": "927709",
|
|
"refsource": "MSKB",
|
|
"url": "http://www.microsoft.com/technet/security/advisory/927709.mspx"
|
|
},
|
|
{
|
|
"name": "20797",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/20797"
|
|
},
|
|
{
|
|
"name": "TA06-346A",
|
|
"refsource": "CERT",
|
|
"url": "http://www.us-cert.gov/cas/techalerts/TA06-346A.html"
|
|
},
|
|
{
|
|
"name": "22603",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/22603"
|
|
},
|
|
{
|
|
"name": "ADV-2006-4282",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2006/4282"
|
|
},
|
|
{
|
|
"name": "oval:org.mitre.oval:def:288",
|
|
"refsource": "OVAL",
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A288"
|
|
},
|
|
{
|
|
"name": "SSRT061288",
|
|
"refsource": "HP",
|
|
"url": "http://www.securityfocus.com/archive/1/454969/100/200/threaded"
|
|
},
|
|
{
|
|
"name": "1017142",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1017142"
|
|
},
|
|
{
|
|
"name": "HPSBST02180",
|
|
"refsource": "HP",
|
|
"url": "http://www.securityfocus.com/archive/1/454969/100/200/threaded"
|
|
},
|
|
{
|
|
"name": "VU#854856",
|
|
"refsource": "CERT-VN",
|
|
"url": "http://www.kb.cert.org/vuls/id/854856"
|
|
},
|
|
{
|
|
"name": "http://www.securityfocus.com/data/vulnerabilities/exploits/0day_ie.pdf",
|
|
"refsource": "MISC",
|
|
"url": "http://www.securityfocus.com/data/vulnerabilities/exploits/0day_ie.pdf"
|
|
},
|
|
{
|
|
"name": "http://www.zerodayinitiative.com/advisories/ZDI-06-047.html",
|
|
"refsource": "MISC",
|
|
"url": "http://www.zerodayinitiative.com/advisories/ZDI-06-047.html"
|
|
},
|
|
{
|
|
"name": "ie-wscriptshell-command-execution(29915)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29915"
|
|
},
|
|
{
|
|
"name": "http://blogs.technet.com/msrc/archive/2006/11/01/microsoft-security-advisory-927709-posted.aspx",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://blogs.technet.com/msrc/archive/2006/11/01/microsoft-security-advisory-927709-posted.aspx"
|
|
}
|
|
]
|
|
}
|
|
} |