Search criteria

3 vulnerabilities found for database_command_center by unicenter

FKIE_CVE-2006-6641

Vulnerability from fkie_nvd - Published: 2006-12-20 00:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:arcserve:brightstor:11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6825A6CF-F540-4516-8982-E32B22D477DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:broadcom:cleverpath_portal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D7CC0F-3AAF-40F0-B178-B964AF04BFC7",
              "versionEndIncluding": "4.71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cleverpath:aion_bpm:r10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1398293A-8C8D-405B-A13B-7202D8A2A12B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cleverpath:aion_bpm:r10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8DC0166-B40B-4FE9-A5FE-4674C184EE68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cleverpath:aion_bpm:r10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "01482330-54BA-40E1-908C-884CF2C0B139",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cleverpath:portal:r4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8D75B44-E386-4BE7-95F6-23804FBFBC87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cleverpath:portal:r4.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD878559-D8DF-4043-9F78-2780F95D103A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cleverpath:portal:r4.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "5046BE4F-2445-4CB1-93F1-5BFFA7AD5578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:etrust:security_command_center:r1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDBDB112-8526-4DD5-BE23-45D1E15FDBED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:etrust:security_command_center:r8:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE3CEFA-F003-408D-A066-39C91E958C75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:asset_and_portfolio_management:r11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DEA53F1-A4D0-4F12-A0FD-3D726072A063",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:database_command_center:r11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "056B5064-4FB7-4196-A975-E6661F0C589C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:database_management_portal:r11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B0FDF01-4D34-4F2E-9A8E-7A1EB95BC83D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:enterprise_job_manager:r1_sp3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E3CFF24-EA58-4B45-8BA7-B6CF02650CAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:management_portal:r2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "84ABEA0B-9388-4942-AC12-40AE37C87D99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:management_portal:r3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE826A5B-B5D1-46CF-9FA9-81041D9C9187",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:management_portal:r11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "05619FF7-BB58-434D-8177-16B8D4BC792B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:unicenter:workload_control_center:r1_sp4:*:*:*:*:*:*:*",
              "matchCriteriaId": "017280EE-8C88-43FC-BA76-A1EEF4607036",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en CA CleverPath Portal anterior a la versi\u00f3n de mantenimiento 4.71.001_179_060830, usado en m\u00faltiples productos incluyendo BrightStor Portal r11.1, CleverPath Aion BPM r10 hasta r10.2, eTrust Security Command Center r1 y r8, y Unicenter, no act\u00faa adecuadamente cuando m\u00faltiples servidores Portal son iniciados al mismo tiempo y comparten el mismo almac\u00e9n de informaci\u00f3n, lo cual puede provocar que un usuario de Portal herede la sesi\u00f3n y credenciales de un usuario que est\u00e1 en otro servidor Portal."
    }
  ],
  "id": "CVE-2006-6641",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-12-20T00:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/23426"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1017429"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/30854"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/455041/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/21681"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/5091"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23426"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1017429"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/30854"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/455041/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/21681"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/5091"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2006-6641 (GCVE-0-2006-6641)

Vulnerability from cvelistv5 – Published: 2006-12-20 00:00 – Updated: 2024-08-07 20:33
VLAI?
Summary
Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/21681 vdb-entryx_refsource_BID
http://www.vupen.com/english/advisories/2006/5091 vdb-entryx_refsource_VUPEN
http://supportconnectw.ca.com/public/ca_common_do… x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/455041/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/30854 vdb-entryx_refsource_OSVDB
http://securitytracker.com/id?1017429 vdb-entryx_refsource_SECTRACK
http://www3.ca.com/securityadvisor/vulninfo/vuln.… x_refsource_CONFIRM
http://secunia.com/advisories/23426 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:33:59.669Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "21681",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21681"
          },
          {
            "name": "ADV-2006-5091",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/5091"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp"
          },
          {
            "name": "20061221 [CAID 34876]: CA CleverPath Portal Session Inheritance Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/455041/100/0/threaded"
          },
          {
            "name": "30854",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/30854"
          },
          {
            "name": "1017429",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017429"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876"
          },
          {
            "name": "23426",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23426"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-12-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "21681",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21681"
        },
        {
          "name": "ADV-2006-5091",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/5091"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp"
        },
        {
          "name": "20061221 [CAID 34876]: CA CleverPath Portal Session Inheritance Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/455041/100/0/threaded"
        },
        {
          "name": "30854",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/30854"
        },
        {
          "name": "1017429",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017429"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876"
        },
        {
          "name": "23426",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23426"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6641",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "21681",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21681"
            },
            {
              "name": "ADV-2006-5091",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/5091"
            },
            {
              "name": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp",
              "refsource": "CONFIRM",
              "url": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp"
            },
            {
              "name": "20061221 [CAID 34876]: CA CleverPath Portal Session Inheritance Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/455041/100/0/threaded"
            },
            {
              "name": "30854",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/30854"
            },
            {
              "name": "1017429",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017429"
            },
            {
              "name": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876",
              "refsource": "CONFIRM",
              "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876"
            },
            {
              "name": "23426",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23426"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6641",
    "datePublished": "2006-12-20T00:00:00",
    "dateReserved": "2006-12-19T00:00:00",
    "dateUpdated": "2024-08-07T20:33:59.669Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-6641 (GCVE-0-2006-6641)

Vulnerability from nvd – Published: 2006-12-20 00:00 – Updated: 2024-08-07 20:33
VLAI?
Summary
Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/21681 vdb-entryx_refsource_BID
http://www.vupen.com/english/advisories/2006/5091 vdb-entryx_refsource_VUPEN
http://supportconnectw.ca.com/public/ca_common_do… x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/455041/100… mailing-listx_refsource_BUGTRAQ
http://www.osvdb.org/30854 vdb-entryx_refsource_OSVDB
http://securitytracker.com/id?1017429 vdb-entryx_refsource_SECTRACK
http://www3.ca.com/securityadvisor/vulninfo/vuln.… x_refsource_CONFIRM
http://secunia.com/advisories/23426 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:33:59.669Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "21681",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21681"
          },
          {
            "name": "ADV-2006-5091",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/5091"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp"
          },
          {
            "name": "20061221 [CAID 34876]: CA CleverPath Portal Session Inheritance Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/455041/100/0/threaded"
          },
          {
            "name": "30854",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/30854"
          },
          {
            "name": "1017429",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017429"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876"
          },
          {
            "name": "23426",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23426"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-12-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "21681",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21681"
        },
        {
          "name": "ADV-2006-5091",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/5091"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp"
        },
        {
          "name": "20061221 [CAID 34876]: CA CleverPath Portal Session Inheritance Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/455041/100/0/threaded"
        },
        {
          "name": "30854",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/30854"
        },
        {
          "name": "1017429",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017429"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876"
        },
        {
          "name": "23426",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23426"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6641",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in CA CleverPath Portal before maintenance version 4.71.001_179_060830, as used in multiple products including BrightStor Portal r11.1, CleverPath Aion BPM r10 through r10.2, eTrust Security Command Center r1 and r8, and Unicenter, does not properly handle when multiple Portal servers are started at the same time and share the same data store, which might cause a Portal user to inherit the session and credentials of a user who is on another Portal server."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "21681",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21681"
            },
            {
              "name": "ADV-2006-5091",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/5091"
            },
            {
              "name": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp",
              "refsource": "CONFIRM",
              "url": "http://supportconnectw.ca.com/public/ca_common_docs/cpportal_secnot.asp"
            },
            {
              "name": "20061221 [CAID 34876]: CA CleverPath Portal Session Inheritance Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/455041/100/0/threaded"
            },
            {
              "name": "30854",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/30854"
            },
            {
              "name": "1017429",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017429"
            },
            {
              "name": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876",
              "refsource": "CONFIRM",
              "url": "http://www3.ca.com/securityadvisor/vulninfo/vuln.aspx?id=34876"
            },
            {
              "name": "23426",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23426"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6641",
    "datePublished": "2006-12-20T00:00:00",
    "dateReserved": "2006-12-19T00:00:00",
    "dateUpdated": "2024-08-07T20:33:59.669Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}