5
CVSSv2

CVE-2006-0599

Published: 13/02/2006 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The (1) elog.c and (2) elogd.c components in elog prior to 2.5.7 r1558-4 generate different responses depending on whether or not a username is valid, which allows remote malicious users to determine valid usernames.

Vulnerable Product Search on Vulmon Subscribe to Product

stefan ritt elog web logbook 2.1.0

stefan ritt elog web logbook 2.0.2

stefan ritt elog web logbook 2.2.1

stefan ritt elog web logbook 2.5

stefan ritt elog web logbook 2.2.0

stefan ritt elog web logbook 2.2.4

stefan ritt elog web logbook 2.5.6

stefan ritt elog web logbook 2.2.3

stefan ritt elog web logbook 2.4

stefan ritt elog web logbook 2.1.2

stefan ritt elog web logbook 2.0.1

stefan ritt elog web logbook 2.0.4

stefan ritt elog web logbook 2.0.3

stefan ritt elog web logbook 2.1.3

stefan ritt elog web logbook 2.0.0

stefan ritt elog web logbook 2.1.1

stefan ritt elog web logbook 2.2.2

stefan ritt elog web logbook 2.0.5

Vendor Advisories

Several security problems have been found in elog, an electronic logbook to manage notes The Common Vulnerabilities and Exposures Project identifies the following problems: CVE-2005-4439 "GroundZero Security" discovered that elog insufficiently checks the size of a buffer used for processing URL parameters, which might lead to the exe ...