The (1) elog.c and (2) elogd.c components in elog before 2.5.7 r1558-4 generate different responses depending on whether or not a username is valid, which allows remote attackers to determine valid usernames.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2006-02-13 11:06
Updated : 2025-04-03 01:03
NVD link : CVE-2006-0599
Mitre link : CVE-2006-0599
CVE.ORG link : CVE-2006-0599
JSON object : View
Products Affected
                stefan_ritt
- elog_web_logbook
CWE
                