Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/rsyslog@3.18.6-1?distro=trixie
Typedeb
Namespacedebian
Namersyslog
Version3.18.6-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.7.4-1
Latest_non_vulnerable_version8.2604.0-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-mz5a-qa1x-cbez
vulnerability_id VCID-mz5a-qa1x-cbez
summary rsyslog: $AllowedSender restriction not honoured
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5617.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5617.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5617
reference_id
reference_type
scores
0
value 0.00389
scoring_system epss
scoring_elements 0.6004
published_at 2026-04-26T12:55:00Z
1
value 0.00389
scoring_system epss
scoring_elements 0.59896
published_at 2026-04-01T12:55:00Z
2
value 0.00389
scoring_system epss
scoring_elements 0.59974
published_at 2026-04-02T12:55:00Z
3
value 0.00389
scoring_system epss
scoring_elements 0.59999
published_at 2026-04-04T12:55:00Z
4
value 0.00389
scoring_system epss
scoring_elements 0.59969
published_at 2026-04-07T12:55:00Z
5
value 0.00389
scoring_system epss
scoring_elements 0.60019
published_at 2026-04-08T12:55:00Z
6
value 0.00389
scoring_system epss
scoring_elements 0.60032
published_at 2026-04-09T12:55:00Z
7
value 0.00389
scoring_system epss
scoring_elements 0.60053
published_at 2026-04-11T12:55:00Z
8
value 0.00389
scoring_system epss
scoring_elements 0.60038
published_at 2026-04-12T12:55:00Z
9
value 0.00389
scoring_system epss
scoring_elements 0.60021
published_at 2026-04-13T12:55:00Z
10
value 0.00389
scoring_system epss
scoring_elements 0.6006
published_at 2026-04-16T12:55:00Z
11
value 0.00389
scoring_system epss
scoring_elements 0.60067
published_at 2026-04-18T12:55:00Z
12
value 0.00389
scoring_system epss
scoring_elements 0.60052
published_at 2026-04-21T12:55:00Z
13
value 0.00389
scoring_system epss
scoring_elements 0.60024
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5617
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5617
3
reference_url http://secunia.com/advisories/32857
reference_id
reference_type
scores
url http://secunia.com/advisories/32857
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47080
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47080
5
reference_url http://www.rsyslog.com/Article322.phtml
reference_id
reference_type
scores
url http://www.rsyslog.com/Article322.phtml
6
reference_url http://www.rsyslog.com/Article327.phtml
reference_id
reference_type
scores
url http://www.rsyslog.com/Article327.phtml
7
reference_url http://www.rsyslog.com/Topic4.phtml
reference_id
reference_type
scores
url http://www.rsyslog.com/Topic4.phtml
8
reference_url http://www.securityfocus.com/bid/32630
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32630
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476647
reference_id 476647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476647
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508027
reference_id 508027
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508027
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.4:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.12.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.5:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.13.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.13.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.13.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.15.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.15.1:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.15.1:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.15.1:beta:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.17.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.4:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.17.4:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.4:beta:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.5:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.17.5:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.5:beta:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.11:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.12:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.7:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.8:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.9:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.20.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5617
reference_id CVE-2008-5617
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5617
fixed_packages
0
url pkg:deb/debian/rsyslog@3.18.6-1?distro=trixie
purl pkg:deb/debian/rsyslog@3.18.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@3.18.6-1%3Fdistro=trixie
1
url pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2102.0-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2302.0-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie
purl pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2504.0-1%3Fdistro=trixie
4
url pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie
purl pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie
5
url pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie
purl pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2602.0-1%3Fdistro=trixie
6
url pkg:deb/debian/rsyslog@8.2604.0-1?distro=trixie
purl pkg:deb/debian/rsyslog@8.2604.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2604.0-1%3Fdistro=trixie
aliases CVE-2008-5617
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mz5a-qa1x-cbez
1
url VCID-vzk8-xf4w-y3gm
vulnerability_id VCID-vzk8-xf4w-y3gm
summary rsyslog: DoS in the imupd plugin by emitting messages when a non-permitted sender tried to send a message to it
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5618.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5618.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5618
reference_id
reference_type
scores
0
value 0.00474
scoring_system epss
scoring_elements 0.64806
published_at 2026-04-26T12:55:00Z
1
value 0.00474
scoring_system epss
scoring_elements 0.64663
published_at 2026-04-01T12:55:00Z
2
value 0.00474
scoring_system epss
scoring_elements 0.64715
published_at 2026-04-02T12:55:00Z
3
value 0.00474
scoring_system epss
scoring_elements 0.64743
published_at 2026-04-04T12:55:00Z
4
value 0.00474
scoring_system epss
scoring_elements 0.64701
published_at 2026-04-07T12:55:00Z
5
value 0.00474
scoring_system epss
scoring_elements 0.64749
published_at 2026-04-08T12:55:00Z
6
value 0.00474
scoring_system epss
scoring_elements 0.64763
published_at 2026-04-09T12:55:00Z
7
value 0.00474
scoring_system epss
scoring_elements 0.64781
published_at 2026-04-11T12:55:00Z
8
value 0.00474
scoring_system epss
scoring_elements 0.64769
published_at 2026-04-12T12:55:00Z
9
value 0.00474
scoring_system epss
scoring_elements 0.64741
published_at 2026-04-13T12:55:00Z
10
value 0.00474
scoring_system epss
scoring_elements 0.64779
published_at 2026-04-16T12:55:00Z
11
value 0.00474
scoring_system epss
scoring_elements 0.64789
published_at 2026-04-18T12:55:00Z
12
value 0.00474
scoring_system epss
scoring_elements 0.64776
published_at 2026-04-21T12:55:00Z
13
value 0.00474
scoring_system epss
scoring_elements 0.64794
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5618
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5618
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5618
3
reference_url http://www.rsyslog.com/Topic4.phtml
reference_id
reference_type
scores
url http://www.rsyslog.com/Topic4.phtml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476564
reference_id 476564
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476564
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510906
reference_id 510906
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510906
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.1:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.20.0:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5618
reference_id CVE-2008-5618
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5618
fixed_packages
0
url pkg:deb/debian/rsyslog@3.18.6-1?distro=trixie
purl pkg:deb/debian/rsyslog@3.18.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@3.18.6-1%3Fdistro=trixie
1
url pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2102.0-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2302.0-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie
purl pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2504.0-1%3Fdistro=trixie
4
url pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie
purl pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie
5
url pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie
purl pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2602.0-1%3Fdistro=trixie
6
url pkg:deb/debian/rsyslog@8.2604.0-1?distro=trixie
purl pkg:deb/debian/rsyslog@8.2604.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2604.0-1%3Fdistro=trixie
aliases CVE-2008-5618
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vzk8-xf4w-y3gm
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@3.18.6-1%3Fdistro=trixie