Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
rsyslog rsyslog 3.20.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2008-5618
imudp in rsyslog 4.x prior to 4.1.2, 3.21 prior to 3.21.9 beta, and 3.20 prior to 3.20.2 generates a message even when it is sent by an unauthorized sender, which allows remote malicious users to cause a denial of service (disk consumption) via a large number of spurious messages...
Rsyslog Rsyslog 4.1.0
Rsyslog Rsyslog 3.12.1
Rsyslog Rsyslog 4.1.1
Rsyslog Rsyslog 3.20.0
8.5
CVSSv2
CVE-2008-5617
The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote malicious users to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.
Rsyslog Rsyslog 4.1.1
Rsyslog Rsyslog 3.19.9
Rsyslog Rsyslog 3.17.5
Rsyslog Rsyslog 3.19.3
Rsyslog Rsyslog 3.19.2
Rsyslog Rsyslog 3.12.5
Rsyslog Rsyslog 3.12.4
Rsyslog Rsyslog 4.1.0
Rsyslog Rsyslog 3.20.0
Rsyslog Rsyslog 3.17.4
Rsyslog Rsyslog 3.19.8
Rsyslog Rsyslog 3.19.1
Rsyslog Rsyslog 3.19.0
Rsyslog Rsyslog 3.12.3
Rsyslog Rsyslog 3.12.2
Rsyslog Rsyslog 3.12.1
Rsyslog Rsyslog 3.19.12
Rsyslog Rsyslog 3.19.7
Rsyslog Rsyslog 3.19.6
Rsyslog Rsyslog 3.17.1
Rsyslog Rsyslog 3.15.1
Rsyslog Rsyslog 3.17.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-36920
buffer overflow
CVE-2024-36913
CVE-2024-5497
CVE-2024-23917
CVE-2024-4956
server-side request forgery
CVE-2024-35468
SSTI
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started