296,223
Total vulnerabilities in the database
ELOG 3.1.4-57bea22 and below can be used as an HTTP GET request proxy when unauthenticated remote attackers send crafted HTTP POST requests.
Software | From | Fixed in |
---|---|---|
elog_project / elog | - | 3.1.4-57bea22.x |
fedoraproject / fedora | 30 | 30.x |
fedoraproject / fedora | 31 | 31.x |