ELOG Project ELOG 2.3.3

CPE Details

ELOG Project ELOG 2.3.3
2.3.3
2019-12-20
14h47 +00:00
2019-12-20
14h47 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:elog_project:elog:2.3.3:*:*:*:*:*:*:*

Informations

Vendor

elog_project

Product

elog

Version

2.3.3

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2019-3996 2019-12-17 20h59 +00:00 ELOG 3.1.4-57bea22 and below can be used as an HTTP GET request proxy when unauthenticated remote attackers send crafted HTTP POST requests.
6.5
Medium
CVE-2019-3995 2019-12-17 20h59 +00:00 ELOG 3.1.4-57bea22 and below is affected by a denial of service vulnerability due to a NULL pointer dereference. A remote unauthenticated attacker can crash the ELOG server by sending a crafted HTTP GET request.
7.5
High
CVE-2019-3994 2019-12-17 20h59 +00:00 ELOG 3.1.4-57bea22 and below is affected by a denial of service vulnerability due to a use after free. A remote unauthenticated attacker can crash the ELOG server by sending multiple HTTP POST requests which causes the ELOG function retrieve_url() to use a freed variable.
7.5
High
CVE-2019-3993 2019-12-17 20h59 +00:00 ELOG 3.1.4-57bea22 and below is affected by an information disclosure vulnerability. A remote unauthenticated attacker can recover a user's password hash by sending a crafted HTTP POST request.
7.5
High
CVE-2019-3992 2019-12-17 20h55 +00:00 ELOG 3.1.4-57bea22 and below is affected by an information disclosure vulnerability. A remote unauthenticated attacker can access the server's configuration file by sending an HTTP GET request. Amongst the configuration data, the attacker may gain access to valid admin usernames and, in older versions of ELOG, passwords.
7.5
High