User enumeration in Checkmk <=2.2.0p4 allows an authenticated attacker to enumerate usernames.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Checkmk | Tribe29 | 2.2.0 (including) | 2.2.0 (including) |
Checkmk | Tribe29 | 2.2.0-b1 (including) | 2.2.0-b1 (including) |
Checkmk | Tribe29 | 2.2.0-b2 (including) | 2.2.0-b2 (including) |
Checkmk | Tribe29 | 2.2.0-b3 (including) | 2.2.0-b3 (including) |
Checkmk | Tribe29 | 2.2.0-b4 (including) | 2.2.0-b4 (including) |
Checkmk | Tribe29 | 2.2.0-b5 (including) | 2.2.0-b5 (including) |
Checkmk | Tribe29 | 2.2.0-b6 (including) | 2.2.0-b6 (including) |
Checkmk | Tribe29 | 2.2.0-b7 (including) | 2.2.0-b7 (including) |
Checkmk | Tribe29 | 2.2.0-b8 (including) | 2.2.0-b8 (including) |
Checkmk | Tribe29 | 2.2.0-i1 (including) | 2.2.0-i1 (including) |
Checkmk | Tribe29 | 2.2.0-p1 (including) | 2.2.0-p1 (including) |
Checkmk | Tribe29 | 2.2.0-p2 (including) | 2.2.0-p2 (including) |
Checkmk | Tribe29 | 2.2.0-p3 (including) | 2.2.0-p3 (including) |
Checkmk | Tribe29 | 2.2.0-p4 (including) | 2.2.0-p4 (including) |