CVE-2006-1069
Published Mar 7, 2006
Last updated 14 years ago
Overview
- Description
- Unspecified vulnerability in the session handling for Geeklog 1.4.x before 1.4.0sr2, 1.3.11 before 1.3.11sr5, 1.3.9 before 1.3.9sr5, and possibly earlier versions allows attackers to gain privileges as arbitrary users via unknown vectors.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:geeklog:geeklog:1.3.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E112CB5B-FBE1-4EF6-927E-96AEEB11C55F" }, { "criteria": "cpe:2.3:a:geeklog:geeklog:1.3.9_sr1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C00D6C8B-2533-4BC4-93AD-87FFCBDF521A" }, { "criteria": "cpe:2.3:a:geeklog:geeklog:1.3.9_sr2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "794C8A9D-36BC-4C33-8873-9476804F00B6" }, { "criteria": "cpe:2.3:a:geeklog:geeklog:1.3.9_sr3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9FFB261F-59CE-4C0C-91C2-C094CFB97888" }, { "criteria": "cpe:2.3:a:geeklog:geeklog:1.3.9_sr4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9CF673C-9C94-4024-8757-573462130EE7" }, { "criteria": "cpe:2.3:a:geeklog:geeklog:1.3.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C869DAF3-7662-4EEF-98DA-11A622DEF8A7" }, { "criteria": "cpe:2.3:a:geeklog:geeklog:1.3.11_sr1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40A9A0E7-7383-4B2C-AAD8-2FED5B86A2F0" }, { "criteria": "cpe:2.3:a:geeklog:geeklog:1.3.11_sr2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3B6B8B4-88A2-45A3-BD2E-6C0D103CB25E" }, { "criteria": "cpe:2.3:a:geeklog:geeklog:1.3.11_sr3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2FF72E47-143C-47F4-B54E-7A01951C3957" }, { "criteria": "cpe:2.3:a:geeklog:geeklog:1.3.11_sr4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA5CC9A0-0EA9-494B-B726-0E514CADF6E2" }, { "criteria": "cpe:2.3:a:geeklog:geeklog:1.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B89E7A29-0EAE-4BB0-B0DD-0B5B55F80453" }, { "criteria": "cpe:2.3:a:geeklog:geeklog:1.4.0_sr1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA0DFD93-BA8A-49BE-9063-E40AC757708A" } ], "operator": "OR" } ] } ]