CVE-2006-3014

Microsoft Excel allows user-assisted attackers to execute arbitrary javascript and redirect users to arbitrary sites via an Excel spreadsheet with an embedded Shockwave Flash Player ActiveX Object, which is automatically executed when the user opens the spreadsheet.
References
Link Resource
http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0414.html Exploit
http://hackingspirits.com/vuln-rnd/vuln-rnd.html Exploit
http://secunia.com/advisories/21865 Patch Vendor Advisory
http://secunia.com/advisories/22882 Vendor Advisory
http://securitytracker.com/id?1016344
http://www.adobe.com/support/security/bulletins/apsb06-11.html
http://www.securiteam.com/windowsntfocus/5TP0M0KIUA.html
http://www.securityfocus.com/bid/18583 Exploit
http://www.securityfocus.com/bid/19980 Patch
http://www.us-cert.gov/cas/techalerts/TA06-318A.html US Government Resource
http://www.vupen.com/english/advisories/2006/3573 Vendor Advisory
http://www.vupen.com/english/advisories/2006/3577 Vendor Advisory
http://www.vupen.com/english/advisories/2006/4507 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069
https://exchange.xforce.ibmcloud.com/vulnerabilities/27312
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A538
http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0414.html Exploit
http://hackingspirits.com/vuln-rnd/vuln-rnd.html Exploit
http://secunia.com/advisories/21865 Patch Vendor Advisory
http://secunia.com/advisories/22882 Vendor Advisory
http://securitytracker.com/id?1016344
http://www.adobe.com/support/security/bulletins/apsb06-11.html
http://www.securiteam.com/windowsntfocus/5TP0M0KIUA.html
http://www.securityfocus.com/bid/18583 Exploit
http://www.securityfocus.com/bid/19980 Patch
http://www.us-cert.gov/cas/techalerts/TA06-318A.html US Government Resource
http://www.vupen.com/english/advisories/2006/3573 Vendor Advisory
http://www.vupen.com/english/advisories/2006/3577 Vendor Advisory
http://www.vupen.com/english/advisories/2006/4507 Vendor Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069
https://exchange.xforce.ibmcloud.com/vulnerabilities/27312
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A538
Configurations

Configuration 1 (hide)

cpe:2.3:a:microsoft:excel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:12

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0414.html - Exploit () http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0414.html - Exploit
References () http://hackingspirits.com/vuln-rnd/vuln-rnd.html - Exploit () http://hackingspirits.com/vuln-rnd/vuln-rnd.html - Exploit
References () http://secunia.com/advisories/21865 - Patch, Vendor Advisory () http://secunia.com/advisories/21865 - Patch, Vendor Advisory
References () http://secunia.com/advisories/22882 - Vendor Advisory () http://secunia.com/advisories/22882 - Vendor Advisory
References () http://securitytracker.com/id?1016344 - () http://securitytracker.com/id?1016344 -
References () http://www.adobe.com/support/security/bulletins/apsb06-11.html - () http://www.adobe.com/support/security/bulletins/apsb06-11.html -
References () http://www.securiteam.com/windowsntfocus/5TP0M0KIUA.html - () http://www.securiteam.com/windowsntfocus/5TP0M0KIUA.html -
References () http://www.securityfocus.com/bid/18583 - Exploit () http://www.securityfocus.com/bid/18583 - Exploit
References () http://www.securityfocus.com/bid/19980 - Patch () http://www.securityfocus.com/bid/19980 - Patch
References () http://www.us-cert.gov/cas/techalerts/TA06-318A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA06-318A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2006/3573 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/3573 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/3577 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/3577 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/4507 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/4507 - Vendor Advisory
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27312 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27312 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A538 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A538 -

Information

Published : 2006-06-22 00:06

Updated : 2024-11-21 00:12


NVD link : CVE-2006-3014

Mitre link : CVE-2006-3014

CVE.ORG link : CVE-2006-3014


JSON object : View

Products Affected

microsoft

  • excel
CWE
CWE-20

Improper Input Validation