Versions Packages Information History CVEs Badges Report

Versions for elog

35 package(s) known

Repository Package name Version Category Maintainer(s)
AUR elog 3.1.4.2 Potentially vulnerable - donpicoro@aur
Debian 8
jessie/main
elog 2.9.2+2014.05.11git44800a7 Potentially vulnerable misc roger.kalt@gmail.com
Debian 9
stretch/updates/main
elog 3.1.2-1 Potentially vulnerable misc roger.kalt@gmail.com
Debian 9
stretch/main
elog 3.1.2-1 Potentially vulnerable misc roger.kalt@gmail.com
Deepin
main
elog 3.1.3-1 Potentially vulnerable - roger.kalt@gmail.com
Devuan 1.0
jessie/main
elog 2.9.2+2014.05.11git44800a7 Potentially vulnerable misc roger.kalt@gmail.com
Devuan 2.0
ascii/main
elog 3.1.2-1 Potentially vulnerable misc roger.kalt@gmail.com
EPEL 7 elog 3.1.4 Potentially vulnerable Unspecified -
Fedora 26
release
elog 3.1.3 Potentially vulnerable Unspecified -
Fedora 27
release
elog 3.1.3 Potentially vulnerable Unspecified -
Fedora 28
release
elog 3.1.3 Potentially vulnerable Unspecified -
Fedora 29
release
elog 3.1.3 Potentially vulnerable Unspecified -
Fedora 30
updates
elog 3.1.4 Potentially vulnerable Unspecified -
Fedora 30
release
elog 3.1.3 Potentially vulnerable Unspecified -
Fedora 31
updates
elog 3.1.4 Potentially vulnerable Unspecified -
Fedora 31
release
elog 3.1.3 Potentially vulnerable Unspecified -
Fedora 32
release
elog 3.1.4 Potentially vulnerable Unspecified -
Fedora 33
release
elog 3.1.4 Potentially vulnerable Unspecified -
Fedora 34
release
elog 3.1.4 Potentially vulnerable Unspecified -
Fedora 35
release
elog 3.1.4 Potentially vulnerable Unspecified -
Pardus 17
main
elog 3.1.2-1 Potentially vulnerable misc roger.kalt@gmail.com
Parrot
parrot-updates/main
elog 3.1.3-1 Potentially vulnerable misc roger.kalt@gmail.com
Parrot
parrot/main
elog 3.1.3-1 Potentially vulnerable misc roger.kalt@gmail.com
PureOS Amber elog 3.1.3-1 Potentially vulnerable misc roger.kalt@gmail.com
Raspbian Oldstable
main
elog 3.1.3-1 Potentially vulnerable misc roger.kalt@gmail.com
Raspbian Stable
main
elog 3.1.3-1 Potentially vulnerable misc roger.kalt@gmail.com
Raspbian Testing
main
elog 3.1.3-1 Potentially vulnerable misc roger.kalt@gmail.com
Trisquel 8.0
flidas/main
elog 3.1.1-1 Potentially vulnerable universe/misc roger.kalt@gmail.com
Trisquel 9.0
etiona/main
elog 3.1.3-1 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com
Trisquel 10.0
nabia/main
elog 3.1.3-1 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 16.04
xenial/universe
elog 3.1.1-1 Potentially vulnerable universe/misc roger.kalt@gmail.com
Ubuntu 18.04
bionic/universe
elog 3.1.3-1 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 20.04
focal/universe
elog 3.1.3-1 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com
Ubuntu 22.04
jammy/universe
elog 3.1.3-1 Potentially vulnerable universe/misc ubuntu-devel-discuss@lists.ubuntu.com
Void Linux x86_64
x86_64
elog 3.1.4.3 Potentially vulnerable - christian.poulwey@t-online.de