cvelist/2006/2xxx/CVE-2006-2218.json
2018-10-18 11:15:13 -04:00

138 lines
4.5 KiB
JSON

{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2006-2218",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Unspecified vulnerability in Internet Explorer 6.0 on Microsoft Windows XP SP2 allows remote attackers to execute arbitrary code via \"exceptional conditions\" that trigger memory corruption, as demonstrated using an exception handler and nested object tags, a variant of CVE-2006-1992."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "20060614 Secunia Resaerch: Internet Explorer Exception Handling Memory Corruption Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/437099/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2006-41/advisory",
"refsource" : "MISC",
"url" : "http://secunia.com/secunia_research/2006-41/advisory"
},
{
"name" : "MS06-021",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-021"
},
{
"name" : "TA06-164A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA06-164A.html"
},
{
"name" : "VU#338828",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/338828"
},
{
"name" : "17820",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/17820"
},
{
"name" : "ADV-2006-2319",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2006/2319"
},
{
"name" : "27475",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/27475"
},
{
"name" : "oval:org.mitre.oval:def:1078",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1078"
},
{
"name" : "oval:org.mitre.oval:def:1728",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1728"
},
{
"name" : "oval:org.mitre.oval:def:1765",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1765"
},
{
"name" : "oval:org.mitre.oval:def:1768",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1768"
},
{
"name" : "oval:org.mitre.oval:def:1845",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1845"
},
{
"name" : "oval:org.mitre.oval:def:1961",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1961"
},
{
"name" : "1016291",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1016291"
},
{
"name" : "19762",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/19762"
}
]
}
}