Vendor
Elog Project
Products
1
CVEs
2
Across products
2
Status
Private
Products
1- 2 CVEs
Recent CVEs
2| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2016-6342 | Hig | 0.49 | 7.5 | 0.00 | Jun 27, 2017 | elog 3.1.1 allows remote attackers to post data as any username in the logbook. | |
| CVE-2025-64348 | Hig | 0.46 | 7.1 | 0.00 | Oct 31, 2025 | ELOG allows an authenticated user to modify or overwrite the configuration file, resulting in denial of service. If the execute facility is specifically enabled with the "-x" command line flag, attackers could execute OS commands on the host machine. By default, ELOG is not configured to allow shell commands or self-registration. |
- risk 0.49cvss 7.5epss 0.00
elog 3.1.1 allows remote attackers to post data as any username in the logbook.
- risk 0.46cvss 7.1epss 0.00
ELOG allows an authenticated user to modify or overwrite the configuration file, resulting in denial of service. If the execute facility is specifically enabled with the "-x" command line flag, attackers could execute OS commands on the host machine. By default, ELOG is not configured to allow shell commands or self-registration.