{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T16:24:03.816","vulnerabilities":[{"cve":{"id":"CVE-2006-0347","sourceIdentifier":"cve@mitre.org","published":"2006-01-21T01:03:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in ELOG before 2.6.1 allows remote attackers to access arbitrary files outside of the elog directory via \"../\" (dot dot) sequences in the URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.0:*:*:*:*:*:*:*","matchCriteriaId":"CF27C7ED-98A3-48A3-9DE0-376CB0FAFAE4"},{"vulnerable":true,"criteria":"cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"699E4BEE-A5B1-474C-892A-08680690E784"},{"vulnerable":true,"criteria":"cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.2:*:*:*:*:*:*:*","matchCriteriaId":"9266F578-79ED-48F9-A686-BBBBDF1CCB61"},{"vulnerable":true,"criteria":"cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.3:*:*:*:*:*:*:*","matchCriteriaId":"7AF1F9C8-AC49-42E6-BAE3-9FC4BF1512C1"},{"vulnerable":true,"criteria":"cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"B1671B86-B1DC-49DC-9AE1-883EF3DF7E3C"},{"vulnerable":true,"criteria":"cpe:2.3:a:stefan_ritt:elog_web_logbook:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"74589737-6A1F-4F63-8330-CE1374A7F3BA"},{"vulnerable":true,"criteria":"cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"52BE6CD0-2901-44EC-A065-EDA5FF4831E7"},{"vulnerable":true,"criteria":"cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.1:*:*:*:*:*:*:*","matchCriteriaId":"30AC1C1A-DEC0-45DA-B09A-B029426732A5"},{"vulnerable":true,"criteria":"cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.2:*:*:*:*:*:*:*","matchCriteriaId":"8EF8B8DF-A162-4603-B6BA-A1CC5D34AF56"},{"vulnerable":true,"criteria":"cpe:2.3:a:stefan_ritt:elog_web_logbook:2.1.3:*:*:*:*:*:*:*","matchCriteriaId":"3E19C713-B881-4CC9-AB40-A5B12B7D14BC"},{"vulnerable":true,"criteria":"cpe:2.3:a:stefan_ritt:elog_web_logbook:2.2.0:*:*:*:*:*:*:*","matchCriteriaId":"8E77FC6F-10A7-489B-8644-FBFA8C9E5326"},{"vulnerable":true,"criteria":"cpe:2.3:a:stefan_ritt:elog_web_logbook:2.2.1:*:*:*:*:*:*:*","matchCriteriaId":"0BC97CEC-AF5B-4A69-928A-E1FFB9180CA2"},{"vulnerable":true,"criteria":"cpe:2.3:a:stefan_ritt:elog_web_logbook:2.2.2:*:*:*:*:*:*:*","matchCriteriaId":"44B9943E-81C9-43A4-A5E2-9BDD62456EC4"},{"vulnerable":true,"criteria":"cpe:2.3:a:stefan_ritt:elog_web_logbook:2.2.3:*:*:*:*:*:*:*","matchCriteriaId":"BB784D24-C980-4030-9E0E-9F7AE3FFD429"},{"vulnerable":true,"criteria":"cpe:2.3:a:stefan_ritt:elog_web_logbook:2.2.4:*:*:*:*:*:*:*","matchCriteriaId":"FA8B3C4C-BB31-43E1-A8F3-49A204AE6709"},{"vulnerable":true,"criteria":"cpe:2.3:a:stefan_ritt:elog_web_logbook:2.4:*:*:*:*:*:*:*","matchCriteriaId":"158E603A-4C79-4C29-85CE-0BEBB485F287"},{"vulnerable":true,"criteria":"cpe:2.3:a:stefan_ritt:elog_web_logbook:2.5:*:*:*:*:*:*:*","matchCriteriaId":"33629F82-9C9A-44C4-85A9-6B61F8760767"},{"vulnerable":true,"criteria":"cpe:2.3:a:stefan_ritt:elog_web_logbook:2.5.6:*:*:*:*:*:*:*","matchCriteriaId":"BE4E89CC-9CF3-4DC2-9829-3C215DC0C1D0"},{"vulnerable":true,"criteria":"cpe:2.3:a:stefan_ritt:elog_web_logbook:2.5.7:*:*:*:*:*:*:*","matchCriteriaId":"D34F0566-DCF7-4CAA-980A-78B989CC5C41"},{"vulnerable":true,"criteria":"cpe:2.3:a:stefan_ritt:elog_web_logbook:2.6.0:*:*:*:*:*:*:*","matchCriteriaId":"9F69F7E5-0EAA-48F5-A358-F42576776745"}]}]}],"references":[{"url":"http://midas.psi.ch/elog/download/ChangeLog","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/18533","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://secunia.com/advisories/18783","source":"cve@mitre.org"},{"url":"http://www.debian.org/security/2006/dsa-967","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/22647","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/16315","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.vupen.com/english/advisories/2006/0262","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24224","source":"cve@mitre.org"},{"url":"http://midas.psi.ch/elog/download/ChangeLog","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/18533","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://secunia.com/advisories/18783","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.debian.org/security/2006/dsa-967","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/22647","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/16315","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.vupen.com/english/advisories/2006/0262","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/24224","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}