mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
138 lines
4.3 KiB
JSON
138 lines
4.3 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2006-3014",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Microsoft Excel allows user-assisted attackers to execute arbitrary javascript and redirect users to arbitrary sites via an Excel spreadsheet with an embedded Shockwave Flash Player ActiveX Object, which is automatically executed when the user opens the spreadsheet."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20060620 Microsoft Excel File Embedded Shockwave Flash Object Exploit",
|
|
"refsource" : "FULLDISC",
|
|
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0414.html"
|
|
},
|
|
{
|
|
"name" : "http://www.adobe.com/support/security/bulletins/apsb06-11.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.adobe.com/support/security/bulletins/apsb06-11.html"
|
|
},
|
|
{
|
|
"name" : "http://hackingspirits.com/vuln-rnd/vuln-rnd.html",
|
|
"refsource" : "MISC",
|
|
"url" : "http://hackingspirits.com/vuln-rnd/vuln-rnd.html"
|
|
},
|
|
{
|
|
"name" : "http://www.securiteam.com/windowsntfocus/5TP0M0KIUA.html",
|
|
"refsource" : "MISC",
|
|
"url" : "http://www.securiteam.com/windowsntfocus/5TP0M0KIUA.html"
|
|
},
|
|
{
|
|
"name" : "MS06-069",
|
|
"refsource" : "MS",
|
|
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069"
|
|
},
|
|
{
|
|
"name" : "TA06-318A",
|
|
"refsource" : "CERT",
|
|
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-318A.html"
|
|
},
|
|
{
|
|
"name" : "18583",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/18583"
|
|
},
|
|
{
|
|
"name" : "19980",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/19980"
|
|
},
|
|
{
|
|
"name" : "ADV-2006-3577",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2006/3577"
|
|
},
|
|
{
|
|
"name" : "ADV-2006-3573",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2006/3573"
|
|
},
|
|
{
|
|
"name" : "ADV-2006-4507",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2006/4507"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:538",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A538"
|
|
},
|
|
{
|
|
"name" : "1016344",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1016344"
|
|
},
|
|
{
|
|
"name" : "21865",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/21865"
|
|
},
|
|
{
|
|
"name" : "22882",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/22882"
|
|
},
|
|
{
|
|
"name" : "excel-shockwave-code-execution(27312)",
|
|
"refsource" : "XF",
|
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/27312"
|
|
}
|
|
]
|
|
}
|
|
}
|