{ "id": "CVE-2006-1069", "sourceIdentifier": "cve@mitre.org", "published": "2006-03-07T23:02:00.000", "lastModified": "2011-03-08T02:31:54.547", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the session handling for Geeklog 1.4.x before 1.4.0sr2, 1.3.11 before 1.3.11sr5, 1.3.9 before 1.3.9sr5, and possibly earlier versions allows attackers to gain privileges as arbitrary users via unknown vectors." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 10.0 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:geeklog:geeklog:1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "E112CB5B-FBE1-4EF6-927E-96AEEB11C55F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:geeklog:geeklog:1.3.9_sr1:*:*:*:*:*:*:*", "matchCriteriaId": "C00D6C8B-2533-4BC4-93AD-87FFCBDF521A" }, { "vulnerable": true, "criteria": "cpe:2.3:a:geeklog:geeklog:1.3.9_sr2:*:*:*:*:*:*:*", "matchCriteriaId": "794C8A9D-36BC-4C33-8873-9476804F00B6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:geeklog:geeklog:1.3.9_sr3:*:*:*:*:*:*:*", "matchCriteriaId": "9FFB261F-59CE-4C0C-91C2-C094CFB97888" }, { "vulnerable": true, "criteria": "cpe:2.3:a:geeklog:geeklog:1.3.9_sr4:*:*:*:*:*:*:*", "matchCriteriaId": "E9CF673C-9C94-4024-8757-573462130EE7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:geeklog:geeklog:1.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "C869DAF3-7662-4EEF-98DA-11A622DEF8A7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:geeklog:geeklog:1.3.11_sr1:*:*:*:*:*:*:*", "matchCriteriaId": "40A9A0E7-7383-4B2C-AAD8-2FED5B86A2F0" }, { "vulnerable": true, "criteria": "cpe:2.3:a:geeklog:geeklog:1.3.11_sr2:*:*:*:*:*:*:*", "matchCriteriaId": "B3B6B8B4-88A2-45A3-BD2E-6C0D103CB25E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:geeklog:geeklog:1.3.11_sr3:*:*:*:*:*:*:*", "matchCriteriaId": "2FF72E47-143C-47F4-B54E-7A01951C3957" }, { "vulnerable": true, "criteria": "cpe:2.3:a:geeklog:geeklog:1.3.11_sr4:*:*:*:*:*:*:*", "matchCriteriaId": "BA5CC9A0-0EA9-494B-B726-0E514CADF6E2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:geeklog:geeklog:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B89E7A29-0EAE-4BB0-B0DD-0B5B55F80453" }, { "vulnerable": true, "criteria": "cpe:2.3:a:geeklog:geeklog:1.4.0_sr1:*:*:*:*:*:*:*", "matchCriteriaId": "FA0DFD93-BA8A-49BE-9063-E40AC757708A" } ] } ] } ], "references": [ { "url": "http://www.geeklog.net/article.php/geeklog-1.4.0sr2", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "http://www.securityfocus.com/bid/17010", "source": "cve@mitre.org" }, { "url": "http://www.vupen.com/english/advisories/2006/0851", "source": "cve@mitre.org" } ] }