Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/syslog-ng@2.0.9-4.1 |
| Type | deb |
| Namespace | debian |
| Name | syslog-ng |
| Version | 2.0.9-4.1 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 3.38.1-5+deb12u1 |
| Latest_non_vulnerable_version | 3.38.1-5+deb12u1 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-1gf1-xw2a-dqgq |
| vulnerability_id |
VCID-1gf1-xw2a-dqgq |
| summary |
This GLSA contains notification of vulnerabilities found in several
Gentoo packages which have been fixed prior to January 1, 2012. The worst
of these vulnerabilities could lead to local privilege escalation and
remote code execution. Please see the package list and CVE identifiers
below for more information. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-1951 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81342 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81351 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81374 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81371 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.814 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81404 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81425 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81413 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81406 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81443 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81444 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81445 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-1951 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-1951
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1gf1-xw2a-dqgq |
|
| 1 |
| url |
VCID-1xzy-xag3-5ybt |
| vulnerability_id |
VCID-1xzy-xag3-5ybt |
| summary |
syslog-ng is an enhanced log daemo. Prior to version 4.8.2, `tls_wildcard_match()` matches on certificates such as `foo.*.bar` although that is not allowed. It is also possible to pass partial wildcards such as `foo.a*c.bar` which glib matches but should be avoided / invalidated. This issue could have an impact on TLS connections, such as in man-in-the-middle situations. Version 4.8.2 contains a fix for the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47619 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66307 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66265 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66235 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66283 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66296 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66316 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66303 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66272 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66306 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66322 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66238 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47619 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-47619
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1xzy-xag3-5ybt |
|
| 2 |
| url |
VCID-2rmg-7wqe-nqcq |
| vulnerability_id |
VCID-2rmg-7wqe-nqcq |
| summary |
Balabit syslog-ng 2.0, 3.0, 3.1, 3.2 OSE and PE, when running on FreeBSD or HP-UX, does not properly perform cast operations, which causes syslog-ng to use a default value of -1 to create log files with insecure permissions (07777), which allows local users to read and write to these log files. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0343 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13006 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13117 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13225 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13291 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13089 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13171 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13222 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13191 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13153 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13102 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13003 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0343 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-0343
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2rmg-7wqe-nqcq |
|
| 3 |
| url |
VCID-d3hk-n3x4-dfb6 |
| vulnerability_id |
VCID-d3hk-n3x4-dfb6 |
| summary |
A denial of service vulnerability was discovered in rsyslog related to syslog input over the network. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-38725 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.8959 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89576 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89622 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89627 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89626 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89618 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89619 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89612 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89607 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-38725 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-38725
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d3hk-n3x4-dfb6 |
|
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-bfpg-vpax-ryhy |
| vulnerability_id |
VCID-bfpg-vpax-ryhy |
| summary |
Syslog-ng does not properly initialize its chroot jail allowing for an
escape if a separate vulnerability in Syslog-ng is exploited. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5110 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77947 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77857 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77865 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77892 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77875 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77902 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77907 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77933 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77917 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77955 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01088 |
| scoring_system |
epss |
| scoring_elements |
0.77953 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2008-5110 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2008-5110
|
| risk_score |
4.2 |
| exploitability |
0.5 |
| weighted_severity |
8.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bfpg-vpax-ryhy |
|
| 1 |
| url |
VCID-c9ef-1f5v-y7b7 |
| vulnerability_id |
VCID-c9ef-1f5v-y7b7 |
| summary |
A Denial of Service vulnerability has been discovered in Syslog-ng. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2007-6437 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05794 |
| scoring_system |
epss |
| scoring_elements |
0.90463 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.05794 |
| scoring_system |
epss |
| scoring_elements |
0.90467 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.05794 |
| scoring_system |
epss |
| scoring_elements |
0.90479 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.05794 |
| scoring_system |
epss |
| scoring_elements |
0.90484 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.05794 |
| scoring_system |
epss |
| scoring_elements |
0.90497 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.05794 |
| scoring_system |
epss |
| scoring_elements |
0.90503 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.05794 |
| scoring_system |
epss |
| scoring_elements |
0.9051 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.05794 |
| scoring_system |
epss |
| scoring_elements |
0.90504 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.05794 |
| scoring_system |
epss |
| scoring_elements |
0.90522 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.05794 |
| scoring_system |
epss |
| scoring_elements |
0.9052 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2007-6437 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2007-6437
|
| risk_score |
0.1 |
| exploitability |
0.5 |
| weighted_severity |
0.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c9ef-1f5v-y7b7 |
|
|
| Risk_score | 3.4 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@2.0.9-4.1 |