The (1) elog.c and (2) elogd.c components in elog prior to 2.5.7 r1558-4 generate different responses depending on whether or not a username is valid, which allows remote malicious users to determine valid usernames.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
stefan ritt elog web logbook 2.1.0 |
||
stefan ritt elog web logbook 2.0.2 |
||
stefan ritt elog web logbook 2.2.1 |
||
stefan ritt elog web logbook 2.5 |
||
stefan ritt elog web logbook 2.2.0 |
||
stefan ritt elog web logbook 2.2.4 |
||
stefan ritt elog web logbook 2.5.6 |
||
stefan ritt elog web logbook 2.2.3 |
||
stefan ritt elog web logbook 2.4 |
||
stefan ritt elog web logbook 2.1.2 |
||
stefan ritt elog web logbook 2.0.1 |
||
stefan ritt elog web logbook 2.0.4 |
||
stefan ritt elog web logbook 2.0.3 |
||
stefan ritt elog web logbook 2.1.3 |
||
stefan ritt elog web logbook 2.0.0 |
||
stefan ritt elog web logbook 2.1.1 |
||
stefan ritt elog web logbook 2.2.2 |
||
stefan ritt elog web logbook 2.0.5 |