Browse all 6 CVE security advisories affecting LogStare Inc.. AI-powered Chinese analysis, POCs, and references for each vulnerability.
LogStare Inc. provides log management and analysis solutions for security monitoring and compliance. Historically, their products have been vulnerable to remote code execution, cross-site scripting, and privilege escalation flaws, with six CVEs documented. Security researchers have identified authentication bypass issues and insecure default configurations in their offerings. While no major public security incidents have been reported, the consistent pattern of vulnerabilities in web interfaces and API endpoints suggests potential risks for organizations relying on their platform without proper hardening. Their core functionality focuses on centralized log collection but has shown susceptibility to input validation weaknesses that could allow attackers to execute arbitrary commands or escalate privileges.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-64695 | LogStare Collector 代码问题漏洞 — Installer of LogStare Collector (for Windows)CWE-427 | 7.8 | - | 2025-11-21 |
| CVE-2025-64299 | LogStare Collector 安全漏洞 — LogStare Collector (for Windows)CWE-201 | 4.9 | - | 2025-11-21 |
| CVE-2025-62687 | LogStare Collector 跨站请求伪造漏洞 — LogStare Collector (for Windows)CWE-352 | 8.3 | - | 2025-11-21 |
| CVE-2025-62189 | LogStare Collector 安全漏洞 — LogStare Collector (for Windows)CWE-863 | 6.5 | - | 2025-11-21 |
| CVE-2025-61949 | LogStare Collector 跨站脚本漏洞 — LogStare Collector (for Windows)CWE-79 | 5.4 | - | 2025-11-21 |
| CVE-2025-58097 | LogStare Collector 安全漏洞 — LogStare Collector (for Windows)CWE-276 | 8.8 | - | 2025-11-21 |
This page lists every published CVE security advisory associated with LogStare Inc.. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.