CVE-2006-0636
Published Feb 10, 2006
Last updated 6 years ago
Overview
- Description
- desktop.php in eyeOS 0.8.9 and earlier tests for the existence of the _SESSION variable before calling the session_start function, which allows remote attackers to execute arbitrary PHP code and possibly conduct other attacks by modifying critical assumed-immutable variables, as demonstrated using PHP code in the _SESSION[apps][eyeOptions.eyeapp][wrapup] variable.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88C9B6C0-DF66-4592-BD8E-F0E7E06DC8F3" }, { "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6255DDE-ABAC-440E-BD17-E121B4E40EE5" }, { "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.1_r1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1BB7BD4C-EB42-43B0-B492-F5F03A339CB2" }, { "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4174D891-C2CB-47F7-95C3-03292BF11B35" }, { "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.2_r1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EFCEF02-41F5-4C4D-8266-1D6AA09D6DF7" }, { "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.2_r2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BFC1C715-5440-4673-AC2E-9A7CBDD16A63" }, { "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.2_r3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99490285-2E1F-4E6F-AFF7-2A3E84CEE134" }, { "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3260F95-A78A-4115-9C93-6731218A4687" }, { "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.3_r1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2FC74C0-9943-4723-8538-26C366FB2006" }, { "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.3_r2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99E79EAD-72FD-4843-8852-441FEF825D91" }, { "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "021FDB55-22B2-4A39-A5FD-E85EFB4024D1" }, { "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.4_r1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14B150B0-0AC8-4F67-AB97-5113E1B542E1" }, { "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0AACA458-4CE7-4DCA-AA04-D31530318B96" }, { "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.5_r1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16543AB3-42F8-4074-92AB-4376B254D105" }, { "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A861A748-968A-4ABC-B484-2229F5EACB23" }, { "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2F3C522-2CCA-443C-902F-53D7AC3A5B62" }, { "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66F2B54D-3B7E-426E-9028-104B1340FB7E" }, { "criteria": "cpe:2.3:o:eyeos_project:eyeos:0.8.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1BE703A-8086-4EE2-83F1-646B95DB52ED" } ], "operator": "OR" } ] } ]