Vulnerabilities
Vulnerable Software
Elog Project:  Security Vulnerabilities
ELOG allows an authenticated user to modify or overwrite the configuration file, resulting in denial of service. If the execute facility is specifically enabled with the "-x" command line flag, attackers could execute OS commands on the host machine. By default, ELOG is not configured to allow shell commands or self-registration.
CVSS Score
7.1
EPSS Score
0.0
Published
2025-10-31
ELOG allows an authenticated user to modify another user's profile. An attacker can edit a target user's email address, then request a password reset, and take control of the target account. By default, ELOG is not configured to allow self-registration.
CVSS Score
8.8
EPSS Score
0.001
Published
2025-10-31
ELOG allows an authenticated user to upload arbitrary HTML files. The HTML content is executed in the context of other users when they open the file. Because ELOG includes usernames and password hashes in certain HTTP requests, an attacker can obtain the target's credentials and replay them or crack the password hash offline. In ELOG 3.1.5-20251014 release, HTML files are rendered as plain text.
CVSS Score
8.0
EPSS Score
0.0
Published
2025-10-31
ELOG 3.1.4-57bea22 and below is affected by an information disclosure vulnerability. A remote unauthenticated attacker can access the server's configuration file by sending an HTTP GET request. Amongst the configuration data, the attacker may gain access to valid admin usernames and, in older versions of ELOG, passwords.
CVSS Score
7.5
EPSS Score
0.04
Published
2019-12-17
ELOG 3.1.4-57bea22 and below is affected by an information disclosure vulnerability. A remote unauthenticated attacker can recover a user's password hash by sending a crafted HTTP POST request.
CVSS Score
7.5
EPSS Score
0.116
Published
2019-12-17
ELOG 3.1.4-57bea22 and below is affected by a denial of service vulnerability due to a use after free. A remote unauthenticated attacker can crash the ELOG server by sending multiple HTTP POST requests which causes the ELOG function retrieve_url() to use a freed variable.
CVSS Score
7.5
EPSS Score
0.028
Published
2019-12-17
ELOG 3.1.4-57bea22 and below is affected by a denial of service vulnerability due to a NULL pointer dereference. A remote unauthenticated attacker can crash the ELOG server by sending a crafted HTTP GET request.
CVSS Score
7.5
EPSS Score
0.08
Published
2019-12-17
ELOG 3.1.4-57bea22 and below can be used as an HTTP GET request proxy when unauthenticated remote attackers send crafted HTTP POST requests.
CVSS Score
6.5
EPSS Score
0.035
Published
2019-12-17
elog 3.1.1 allows remote attackers to post data as any username in the logbook.
CVSS Score
7.5
EPSS Score
0.002
Published
2017-06-27


Contact Us

Shodan ® - All rights reserved