{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T07:39:35.864","vulnerabilities":[{"cve":{"id":"CVE-2006-2199","sourceIdentifier":"security@debian.org","published":"2006-06-30T18:05:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Java Applets in OpenOffice.org 1.1.x (aka StarOffice) up to 1.1.5 and 2.0.x before 2.0.3 allows user-assisted attackers to escape the Java sandbox and conduct unauthorized activities via certain applets in OpenOffice documents."},{"lang":"es","value":"Vulnerabilidad sin especificar en Java Applets en OpenOffice.org v1.1.x (tambien conocido como StarOffice) hasta la v1.1.5 y v2.0.x anteriores a v2.0.3 permite a atacantes asistidos por el usuario escapar el Java sandbox y realizar actividades no autorizadas a través de ciertos applets en documentos OpenOffice."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:C/I:C/A:C","baseScore":7.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":4.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openoffice:openoffice:1.1.0:*:*:*:*:*:*:*","matchCriteriaId":"73EA7C32-30D8-4367-B2F6-6394408E63B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:openoffice:openoffice:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"A063FBBE-4D34-45D0-9AC8-66CFC64D22EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:openoffice:openoffice:1.1.2:*:*:*:*:*:*:*","matchCriteriaId":"2F0436BF-D4B6-4437-A509-FEBB779E4B3A"},{"vulnerable":true,"criteria":"cpe:2.3:a:openoffice:openoffice:1.1.3:*:*:*:*:*:*:*","matchCriteriaId":"E24B3240-5110-4810-A37A-C9A0B4A1F856"},{"vulnerable":true,"criteria":"cpe:2.3:a:openoffice:openoffice:1.1.4:*:*:*:*:*:*:*","matchCriteriaId":"D14968CA-8FA9-4E71-9C0C-3ABFBE7920C1"},{"vulnerable":true,"criteria":"cpe:2.3:a:openoffice:openoffice:1.1.5:*:*:*:*:*:*:*","matchCriteriaId":"96B4ED38-FE08-40F3-B164-482146BF7BDA"},{"vulnerable":true,"criteria":"cpe:2.3:a:openoffice:openoffice:2.0.0:*:*:*:*:*:*:*","matchCriteriaId":"4999E6F1-2983-48B1-8FEF-830DD4845CD7"},{"vulnerable":true,"criteria":"cpe:2.3:a:openoffice:openoffice:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"1FA089E1-3B23-47FA-84BB-81225AD200EF"},{"vulnerable":true,"criteria":"cpe:2.3:a:openoffice:openoffice:2.0.2:*:*:*:*:*:*:*","matchCriteriaId":"021D5A76-3F8E-4BBC-8776-D8E13F70D26F"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:staroffice:6.0:*:*:*:*:*:*:*","matchCriteriaId":"CA77A764-8311-4108-8155-920EC12AC0F7"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:staroffice:7.0:*:*:*:*:*:*:*","matchCriteriaId":"ECB60F92-5543-4D1E-8CE1-525D65AECF5E"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:staroffice:8.0:*:*:*:*:*:*:*","matchCriteriaId":"E7D51979-56BC-46A4-A6FB-45BC56CB6D5B"}]}]}],"references":[{"url":"http://fedoranews.org/cms/node/2343","source":"security@debian.org"},{"url":"http://secunia.com/advisories/20867","source":"security@debian.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20893","source":"security@debian.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20910","source":"security@debian.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20911","source":"security@debian.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20913","source":"security@debian.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20975","source":"security@debian.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20995","source":"security@debian.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/21278","source":"security@debian.org","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/23620","source":"security@debian.org","tags":["Vendor Advisory"]},{"url":"http://security.gentoo.org/glsa/glsa-200607-12.xml","source":"security@debian.org"},{"url":"http://securitytracker.com/id?1016414","source":"security@debian.org"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102475-1","source":"security@debian.org"},{"url":"http://www.debian.org/security/2006/dsa-1104","source":"security@debian.org"},{"url":"http://www.kb.cert.org/vuls/id/243681","source":"security@debian.org","tags":["US Government Resource"]},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:118","source":"security@debian.org"},{"url":"http://www.novell.com/linux/security/advisories/2006_40_openoffice.html","source":"security@debian.org"},{"url":"http://www.openoffice.org/security/CVE-2006-2199.html","source":"security@debian.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2006-0573.html","source":"security@debian.org"},{"url":"http://www.securityfocus.com/archive/1/447035/100/0/threaded","source":"security@debian.org"},{"url":"http://www.securityfocus.com/bid/18737","source":"security@debian.org"},{"url":"http://www.ubuntu.com/usn/usn-313-1","source":"security@debian.org"},{"url":"http://www.ubuntu.com/usn/usn-313-2","source":"security@debian.org"},{"url":"http://www.vupen.com/english/advisories/2006/2607","source":"security@debian.org","tags":["Vendor Advisory"]},{"url":"http://www.vupen.com/english/advisories/2006/2621","source":"security@debian.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/27569","source":"security@debian.org"},{"url":"https://issues.rpath.com/browse/RPL-475","source":"security@debian.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11338","source":"security@debian.org"},{"url":"http://fedoranews.org/cms/node/2343","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/20867","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20893","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20910","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20911","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20913","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20975","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/20995","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/21278","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://secunia.com/advisories/23620","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://security.gentoo.org/glsa/glsa-200607-12.xml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://securitytracker.com/id?1016414","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102475-1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.debian.org/security/2006/dsa-1104","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.kb.cert.org/vuls/id/243681","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:118","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.novell.com/linux/security/advisories/2006_40_openoffice.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openoffice.org/security/CVE-2006-2199.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2006-0573.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/447035/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/18737","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ubuntu.com/usn/usn-313-1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ubuntu.com/usn/usn-313-2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vupen.com/english/advisories/2006/2607","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.vupen.com/english/advisories/2006/2621","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/27569","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://issues.rpath.com/browse/RPL-475","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11338","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}