elog_project CVE Vulnerabilities & Metrics

Focus on elog_project vulnerabilities and metrics.

Last updated: 16 Jan 2026, 23:25 UTC

About elog_project Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with elog_project. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total elog_project CVEs: 9
Earliest CVE date: 27 Jun 2017, 20:29 UTC
Latest CVE date: 31 Oct 2025, 19:15 UTC

Latest CVE reference: CVE-2025-64349

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 3

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical elog_project CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.61

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 3
4.0-6.9 5
7.0-8.9 1
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS elog_project CVEs

These are the five CVEs with the highest CVSS scores for elog_project, sorted by severity first and recency.

All CVEs for elog_project

CVE-2025-64349 elog_project vulnerability CVSS: 0 31 Oct 2025, 19:15 UTC

ELOG allows an authenticated user to modify another user's profile. An attacker can edit a target user's email address, then request a password reset, and take control of the target account. By default, ELOG is not configured to allow self-registration.

CVE-2025-64348 elog_project vulnerability CVSS: 0 31 Oct 2025, 19:15 UTC

ELOG allows an authenticated user to modify or overwrite the configuration file, resulting in denial of service. If the execute facility is specifically enabled with the "-x" command line flag, attackers could execute OS commands on the host machine. By default, ELOG is not configured to allow shell commands or self-registration.

CVE-2025-62618 elog_project vulnerability CVSS: 0 31 Oct 2025, 19:15 UTC

ELOG allows an authenticated user to upload arbitrary HTML files. The HTML content is executed in the context of other users when they open the file. Because ELOG includes usernames and password hashes in certain HTTP requests, an attacker can obtain the target's credentials and replay them or crack the password hash offline. In ELOG 3.1.5-20251014 release, HTML files are rendered as plain text.

CVE-2019-3996 elog_project vulnerability CVSS: 7.5 17 Dec 2019, 22:15 UTC

ELOG 3.1.4-57bea22 and below can be used as an HTTP GET request proxy when unauthenticated remote attackers send crafted HTTP POST requests.

CVE-2019-3995 elog_project vulnerability CVSS: 5.0 17 Dec 2019, 22:15 UTC

ELOG 3.1.4-57bea22 and below is affected by a denial of service vulnerability due to a NULL pointer dereference. A remote unauthenticated attacker can crash the ELOG server by sending a crafted HTTP GET request.

CVE-2019-3994 elog_project vulnerability CVSS: 5.0 17 Dec 2019, 22:15 UTC

ELOG 3.1.4-57bea22 and below is affected by a denial of service vulnerability due to a use after free. A remote unauthenticated attacker can crash the ELOG server by sending multiple HTTP POST requests which causes the ELOG function retrieve_url() to use a freed variable.

CVE-2019-3993 elog_project vulnerability CVSS: 5.0 17 Dec 2019, 22:15 UTC

ELOG 3.1.4-57bea22 and below is affected by an information disclosure vulnerability. A remote unauthenticated attacker can recover a user's password hash by sending a crafted HTTP POST request.

CVE-2019-3992 elog_project vulnerability CVSS: 5.0 17 Dec 2019, 22:15 UTC

ELOG 3.1.4-57bea22 and below is affected by an information disclosure vulnerability. A remote unauthenticated attacker can access the server's configuration file by sending an HTTP GET request. Amongst the configuration data, the attacker may gain access to valid admin usernames and, in older versions of ELOG, passwords.

CVE-2016-6342 elog_project vulnerability CVSS: 5.0 27 Jun 2017, 20:29 UTC

elog 3.1.1 allows remote attackers to post data as any username in the logbook.