Microsoft Excel allows user-assisted attackers to execute arbitrary javascript and redirect users to arbitrary sites via an Excel spreadsheet with an embedded Shockwave Flash Player ActiveX Object, which is automatically executed when the user opens the spreadsheet.
References
Configurations
History
21 Nov 2024, 00:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0414.html - Exploit | |
References | () http://hackingspirits.com/vuln-rnd/vuln-rnd.html - Exploit | |
References | () http://secunia.com/advisories/21865 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/22882 - Vendor Advisory | |
References | () http://securitytracker.com/id?1016344 - | |
References | () http://www.adobe.com/support/security/bulletins/apsb06-11.html - | |
References | () http://www.securiteam.com/windowsntfocus/5TP0M0KIUA.html - | |
References | () http://www.securityfocus.com/bid/18583 - Exploit | |
References | () http://www.securityfocus.com/bid/19980 - Patch | |
References | () http://www.us-cert.gov/cas/techalerts/TA06-318A.html - US Government Resource | |
References | () http://www.vupen.com/english/advisories/2006/3573 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/3577 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/4507 - Vendor Advisory | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27312 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A538 - |
Information
Published : 2006-06-22 00:06
Updated : 2024-11-21 00:12
NVD link : CVE-2006-3014
Mitre link : CVE-2006-3014
CVE.ORG link : CVE-2006-3014
JSON object : View
Products Affected
microsoft
- excel
CWE
CWE-20
Improper Input Validation