Lookup for vulnerable packages by Package URL.
| Purl | pkg:deb/debian/syslog-ng@3.3.5-4 |
| Type | deb |
| Namespace | debian |
| Name | syslog-ng |
| Version | 3.3.5-4 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 3.38.1-5+deb12u1 |
| Latest_non_vulnerable_version | 3.38.1-5+deb12u1 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-1xzy-xag3-5ybt |
| vulnerability_id |
VCID-1xzy-xag3-5ybt |
| summary |
syslog-ng is an enhanced log daemo. Prior to version 4.8.2, `tls_wildcard_match()` matches on certificates such as `foo.*.bar` although that is not allowed. It is also possible to pass partial wildcards such as `foo.a*c.bar` which glib matches but should be avoided / invalidated. This issue could have an impact on TLS connections, such as in man-in-the-middle situations. Version 4.8.2 contains a fix for the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47619 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66307 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66265 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66235 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66283 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66296 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66316 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66303 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66272 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66306 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66322 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00507 |
| scoring_system |
epss |
| scoring_elements |
0.66238 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47619 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-47619
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1xzy-xag3-5ybt |
|
| 1 |
| url |
VCID-d3hk-n3x4-dfb6 |
| vulnerability_id |
VCID-d3hk-n3x4-dfb6 |
| summary |
A denial of service vulnerability was discovered in rsyslog related to syslog input over the network. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-38725 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.8959 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89576 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89622 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89627 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89626 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89618 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89619 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89612 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.04916 |
| scoring_system |
epss |
| scoring_elements |
0.89607 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-38725 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-38725
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d3hk-n3x4-dfb6 |
|
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-1gf1-xw2a-dqgq |
| vulnerability_id |
VCID-1gf1-xw2a-dqgq |
| summary |
This GLSA contains notification of vulnerabilities found in several
Gentoo packages which have been fixed prior to January 1, 2012. The worst
of these vulnerabilities could lead to local privilege escalation and
remote code execution. Please see the package list and CVE identifiers
below for more information. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-1951 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81342 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81351 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81374 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81371 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.814 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81404 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81425 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81413 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81406 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81443 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81444 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01548 |
| scoring_system |
epss |
| scoring_elements |
0.81445 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-1951 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2011-1951
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1gf1-xw2a-dqgq |
|
|
| Risk_score | 3.4 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.3.5-4 |