Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-06/0414.html", "name": "20060620 Microsoft Excel File Embedded Shockwave Flash Object Exploit", "tags": ["Exploit"], "refsource": "FULLDISC"}, {"url": "http://hackingspirits.com/vuln-rnd/vuln-rnd.html", "name": "http://hackingspirits.com/vuln-rnd/vuln-rnd.html", "tags": ["Exploit"], "refsource": "MISC"}, {"url": "http://www.securiteam.com/windowsntfocus/5TP0M0KIUA.html", "name": "http://www.securiteam.com/windowsntfocus/5TP0M0KIUA.html", "tags": [], "refsource": "MISC"}, {"url": "http://www.securityfocus.com/bid/18583", "name": "18583", "tags": ["Exploit"], "refsource": "BID"}, {"url": "http://securitytracker.com/id?1016344", "name": "1016344", "tags": [], "refsource": "SECTRACK"}, {"url": "http://www.adobe.com/support/security/bulletins/apsb06-11.html", "name": "http://www.adobe.com/support/security/bulletins/apsb06-11.html", "tags": [], "refsource": "CONFIRM"}, {"url": "http://secunia.com/advisories/21865", "name": "21865", "tags": ["Patch", "Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.securityfocus.com/bid/19980", "name": "19980", "tags": ["Patch"], "refsource": "BID"}, {"url": "http://secunia.com/advisories/22882", "name": "22882", "tags": ["Vendor Advisory"], "refsource": "SECUNIA"}, {"url": "http://www.us-cert.gov/cas/techalerts/TA06-318A.html", "name": "TA06-318A", "tags": ["US Government Resource"], "refsource": "CERT"}, {"url": "http://www.vupen.com/english/advisories/2006/4507", "name": "ADV-2006-4507", "tags": ["Vendor Advisory"], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2006/3577", "name": "ADV-2006-3577", "tags": ["Vendor Advisory"], "refsource": "VUPEN"}, {"url": "http://www.vupen.com/english/advisories/2006/3573", "name": "ADV-2006-3573", "tags": ["Vendor Advisory"], "refsource": "VUPEN"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27312", "name": "excel-shockwave-code-execution(27312)", "tags": [], "refsource": "XF"}, {"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A538", "name": "oval:org.mitre.oval:def:538", "tags": [], "refsource": "OVAL"}, {"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-069", "name": "MS06-069", "tags": [], "refsource": "MS"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Microsoft Excel allows user-assisted attackers to execute arbitrary javascript and redirect users to arbitrary sites via an Excel spreadsheet with an embedded Shockwave Flash Player ActiveX Object, which is automatically executed when the user opens the spreadsheet."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-20"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2006-3014", "ASSIGNER": "cve@mitre.org"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 5.1, "accessVector": "NETWORK", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "HIGH", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "severity": "MEDIUM", "impactScore": 6.4, "obtainAllPrivilege": false, "exploitabilityScore": 4.9, "obtainUserPrivilege": true, "obtainOtherPrivilege": false, "userInteractionRequired": true}}, "publishedDate": "2006-06-22T00:06Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:microsoft:excel:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2018-10-12T21:40Z"}