WebEOC before 6.0.2 allows remote attackers to obtain valid usernames via the HTML source of the WebEOC login webpage, which could be useful in other attacks such as locking out valid users via brute force methods.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/170394 | Third Party Advisory US Government Resource |
Configurations
Information
Published : 2005-12-05 03:03
Updated : 2008-09-05 13:55
NVD link : CVE-2005-4029
Mitre link : CVE-2005-4029
JSON object : View
CWE
Products Affected
esi_products
- webeoc