Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/syslog-ng@3.1.3-3 |
| Type | deb |
| Namespace | debian |
| Name | syslog-ng |
| Version | 3.1.3-3 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 3.38.1-5+deb12u1 |
| Latest_non_vulnerable_version | 3.38.1-5+deb12u1 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-1gf1-xw2a-dqgq |
| vulnerability_id |
VCID-1gf1-xw2a-dqgq |
| summary |
This GLSA contains notification of vulnerabilities found in several
Gentoo packages which have been fixed prior to January 1, 2012. The worst
of these vulnerabilities could lead to local privilege escalation and
remote code execution. Please see the package list and CVE identifiers
below for more information. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-1951 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81342 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81351 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81374 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81371 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.814 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81404 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81425 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81413 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81406 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81443 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81444 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81445 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-1951 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-1951
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1gf1-xw2a-dqgq |
|
| 1 |
| url |
VCID-1xzy-xag3-5ybt |
| vulnerability_id |
VCID-1xzy-xag3-5ybt |
| summary |
syslog-ng is an enhanced log daemo. Prior to version 4.8.2, `tls_wildcard_match()` matches on certificates such as `foo.*.bar` although that is not allowed. It is also possible to pass partial wildcards such as `foo.a*c.bar` which glib matches but should be avoided / invalidated. This issue could have an impact on TLS connections, such as in man-in-the-middle situations. Version 4.8.2 contains a fix for the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47619 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66307 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66265 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66235 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66283 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66296 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66316 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66303 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66272 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66306 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66322 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66238 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47619 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-47619
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1xzy-xag3-5ybt |
|
| 2 |
| url |
VCID-d3hk-n3x4-dfb6 |
| vulnerability_id |
VCID-d3hk-n3x4-dfb6 |
| summary |
A denial of service vulnerability was discovered in rsyslog related to syslog input over the network. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-38725 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.8959 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89576 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89622 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89627 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89626 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89618 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89619 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89612 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89607 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-38725 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-38725
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d3hk-n3x4-dfb6 |
|
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-2rmg-7wqe-nqcq |
| vulnerability_id |
VCID-2rmg-7wqe-nqcq |
| summary |
Balabit syslog-ng 2.0, 3.0, 3.1, 3.2 OSE and PE, when running on FreeBSD or HP-UX, does not properly perform cast operations, which causes syslog-ng to use a default value of -1 to create log files with insecure permissions (07777), which allows local users to read and write to these log files. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0343 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13006 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13117 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13225 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13291 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13089 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13171 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13222 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13191 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13153 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13102 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13003 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-0343 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-0343
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2rmg-7wqe-nqcq |
|
|
| Risk_score | 3.4 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.1.3-3 |