5
CVSSv2

CVE-2006-0347

Published: 21/01/2006 Updated: 20/07/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Directory traversal vulnerability in ELOG prior to 2.6.1 allows remote malicious users to access arbitrary files outside of the elog directory via "../" (dot dot) sequences in the URL.

Vulnerable Product Search on Vulmon Subscribe to Product

stefan ritt elog web logbook 2.0.0

stefan ritt elog web logbook 2.1.2

stefan ritt elog web logbook 2.1.3

stefan ritt elog web logbook 2.5

stefan ritt elog web logbook 2.5.6

stefan ritt elog web logbook 2.1.0

stefan ritt elog web logbook 2.1.1

stefan ritt elog web logbook 2.2.4

stefan ritt elog web logbook 2.4

stefan ritt elog web logbook 2.0.4

stefan ritt elog web logbook 2.0.5

stefan ritt elog web logbook 2.2.2

stefan ritt elog web logbook 2.2.3

stefan ritt elog web logbook 2.0.1

stefan ritt elog web logbook 2.0.2

stefan ritt elog web logbook 2.0.3

stefan ritt elog web logbook 2.2.0

stefan ritt elog web logbook 2.2.1

stefan ritt elog web logbook 2.5.7

stefan ritt elog web logbook 2.6.0

Vendor Advisories

Debian Bug report logs - #349528 various unfixed security bugs Package: elog; Maintainer for elog is Roger Kalt <rogerkalt@gmailcom>; Source for elog is src:elog (PTS, buildd, popcon) Reported by: Florian Weimer <fw@denebenyode> Date: Mon, 23 Jan 2006 15:48:16 UTC Severity: grave Tags: fixed, fixed-upstream, sec ...
Several security problems have been found in elog, an electronic logbook to manage notes The Common Vulnerabilities and Exposures Project identifies the following problems: CVE-2005-4439 "GroundZero Security" discovered that elog insufficiently checks the size of a buffer used for processing URL parameters, which might lead to the exe ...