Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
rsyslog rsyslog 3.12.1 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2008-5618
imudp in rsyslog 4.x prior to 4.1.2, 3.21 prior to 3.21.9 beta, and 3.20 prior to 3.20.2 generates a message even when it is sent by an unauthorized sender, which allows remote malicious users to cause a denial of service (disk consumption) via a large number of spurious messages...
Rsyslog Rsyslog 4.1.0
Rsyslog Rsyslog 3.12.1
Rsyslog Rsyslog 4.1.1
Rsyslog Rsyslog 3.20.0
8.5
CVSSv2
CVE-2008-5617
The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote malicious users to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.
Rsyslog Rsyslog 4.1.1
Rsyslog Rsyslog 3.19.9
Rsyslog Rsyslog 3.17.5
Rsyslog Rsyslog 3.19.3
Rsyslog Rsyslog 3.19.2
Rsyslog Rsyslog 3.12.5
Rsyslog Rsyslog 3.12.4
Rsyslog Rsyslog 4.1.0
Rsyslog Rsyslog 3.20.0
Rsyslog Rsyslog 3.17.4
Rsyslog Rsyslog 3.19.8
Rsyslog Rsyslog 3.19.1
Rsyslog Rsyslog 3.19.0
Rsyslog Rsyslog 3.12.3
Rsyslog Rsyslog 3.12.2
Rsyslog Rsyslog 3.12.1
Rsyslog Rsyslog 3.19.12
Rsyslog Rsyslog 3.19.7
Rsyslog Rsyslog 3.19.6
Rsyslog Rsyslog 3.17.1
Rsyslog Rsyslog 3.15.1
Rsyslog Rsyslog 3.17.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started