CVE-2006-3875
https://notcve.org/view.php?id=CVE-2006-3875
Unspecified vulnerability in Microsoft Excel 2000, 2002, 2003, 2004 for Mac, v.X for Mac, and Excel Viewer 2003 allows user-assisted attackers to execute arbitrary code via a crafted COLINFO record in an XLS file, a different vulnerability than CVE-2006-2387 and CVE-2006-3867. Vulnerabilidad no especificada en Microsoft Excel 2000, 2002, 2003, 2004 para Mac, v.X para Mac, y Excel Viewer 2003 permite a atacantes con la complicidad del usuario ejecutar código de su elección mediante un registro COLINFO artesanal en un fichero XLS, una vulnerabilidad diferente que CVE-2006-2387 y CVE-2006-3867. • http://securitytracker.com/id?1017031 http://www.kb.cert.org/vuls/id/252500 http://www.securityfocus.com/archive/1/449179/100/0/threaded http://www.securityfocus.com/bid/20391 http://www.vupen.com/english/advisories/2006/3978 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-059 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A486 •
CVE-2006-3867
https://notcve.org/view.php?id=CVE-2006-3867
Unspecified vulnerability in Microsoft Excel 2000, 2002, 2003, 2004 for Mac, v.X for Mac, and Excel Viewer 2003 allows user-assisted attackers to execute arbitrary code via a crafted Lotus 1-2-3 file, a different vulnerability than CVE-2006-2387 and CVE-2006-3875. Vulnerabilidad no especificada en Microsoft Excel 2000, 2002, 2003, 2004 para Mac, v.X para Mac, y Excel Viewer 2003 permite a atacantes con la complicidad del usuario ejecutar código de su elección mediante un fichero Lotus 1-2-3 artesanal, una vulnerabilidad diferente que CVE-2006-2387 y CVE-2006-3875. • http://securitytracker.com/id?1017031 http://www.kb.cert.org/vuls/id/821772 http://www.securityfocus.com/archive/1/449179/100/0/threaded http://www.securityfocus.com/bid/20345 http://www.vupen.com/english/advisories/2006/3978 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-059 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A481 •
CVE-2006-1301
https://notcve.org/view.php?id=CVE-2006-1301
Microsoft Excel 2000 through 2004 allows user-assisted attackers to execute arbitrary code via a .xls file with a crafted SELECTION record that triggers memory corruption, a different vulnerability than CVE-2006-1302. Microsoft Excel 2000 a 2004 permite a atacantes con la implicación del usuario ejecutar código de su elección mediante un fichero .xls con un registro SELECTION artesanal que dispara una corrupción de memoria, una vulnerabilidad diferente de CVE-2006-1302. • http://securitytracker.com/id?1016472 http://www.securityfocus.com/bid/18853 http://www.vupen.com/english/advisories/2006/2755 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A557 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2006-1309
https://notcve.org/view.php?id=CVE-2006-1309
Microsoft Excel 2000 through 2004 allows user-assisted attackers to execute arbitrary code via a .xls file with a crafted LABEL record that triggers memory corruption. Microsoft Excel 2000 a 2004 permite a atacantes con la implicación del usuario ejecutar código arbitrario mediante un fichero .xls con una etiqueta LABEL artesanal que dispara una corrupción de memoria. • http://securitytracker.com/id?1016472 http://www.securityfocus.com/bid/18910 http://www.vupen.com/english/advisories/2006/2755 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A752 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2006-1302
https://notcve.org/view.php?id=CVE-2006-1302
Buffer overflow in Microsoft Excel 2000 through 2003 allows user-assisted attackers to execute arbitrary code via a .xls file with certain crafted fields in a SELECTION record, which triggers memory corruption, aka "Malformed SELECTION record Vulnerability." Desbordamiento de búfer en Microsoft Excel 2000 a 2003 permite a atacantes con la intervención del usuario ejecutar código de su elección mediante un fichero .xls con ciertos campos artesanales en un campo SELECTION, lo que dispara una corrupción de memoria, también conocida como "Vulnerabilidad de registro SELECTION malformado". • http://securityreason.com/securityalert/1238 http://securitytracker.com/id?1016472 http://www.nsfocus.com/english/homepage/research/0605.htm http://www.securityfocus.com/archive/1/439914/100/0/threaded http://www.securityfocus.com/bid/18885 http://www.vupen.com/english/advisories/2006/2755 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-037 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A379 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •