Vulnerability Database

300,214

Total vulnerabilities in the database

CVE-2025-64348

ELOG allows an authenticated user to modify or overwrite the configuration file, resulting in denial of service. If the execute facility is specifically enabled with the "-x" command line flag, attackers could execute OS commands on the host machine. By default, ELOG is not configured to allow shell commands or self-registration.

  • Published: Oct 31, 2025
  • Updated: Nov 4, 2025
  • CVE: CVE-2025-64348
  • Severity: High
  • Exploit:

CVSS v3:

  • Severity: High
  • Score: 7.1
  • AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H

CWEs: