Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-gg4f-gzty-y7e1
Summaryrsyslog: Memory leak when $RepeatedMsgReduction turned on
Aliases
0
alias CVE-2011-1488
Fixed_packages
0
url pkg:deb/debian/rsyslog@5.7.6-1?distro=trixie
purl pkg:deb/debian/rsyslog@5.7.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@5.7.6-1%3Fdistro=trixie
1
url pkg:deb/debian/rsyslog@5.8.11-3%2Bdeb7u2
purl pkg:deb/debian/rsyslog@5.8.11-3%2Bdeb7u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2vuy-ga2a-2ke4
1
vulnerability VCID-7eg3-vksv-9bga
2
vulnerability VCID-8mwn-2k1d-rkfz
3
vulnerability VCID-96hb-thus-r3f2
4
vulnerability VCID-g5b3-53m2-yug1
5
vulnerability VCID-qh6a-u11q-g3gp
6
vulnerability VCID-s9gb-bjme-gkaf
7
vulnerability VCID-ybfq-unp3-dbav
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@5.8.11-3%252Bdeb7u2
2
url pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2102.0-2%252Bdeb11u1%3Fdistro=trixie
3
url pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2302.0-1%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie
purl pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2504.0-1%3Fdistro=trixie
5
url pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie
purl pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie
6
url pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie
purl pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2602.0-1%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/rsyslog@3.18.6-4
purl pkg:deb/debian/rsyslog@3.18.6-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2vuy-ga2a-2ke4
1
vulnerability VCID-4vr2-rn4g-bbep
2
vulnerability VCID-7eg3-vksv-9bga
3
vulnerability VCID-8mwn-2k1d-rkfz
4
vulnerability VCID-96hb-thus-r3f2
5
vulnerability VCID-cbts-ng32-67e7
6
vulnerability VCID-cq52-ykyq-qug5
7
vulnerability VCID-g5b3-53m2-yug1
8
vulnerability VCID-gg4f-gzty-y7e1
9
vulnerability VCID-pgy6-vbk7-hkg8
10
vulnerability VCID-qh6a-u11q-g3gp
11
vulnerability VCID-s9gb-bjme-gkaf
12
vulnerability VCID-ybfq-unp3-dbav
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@3.18.6-4
1
url pkg:deb/debian/rsyslog@4.6.4-2
purl pkg:deb/debian/rsyslog@4.6.4-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2vuy-ga2a-2ke4
1
vulnerability VCID-4vr2-rn4g-bbep
2
vulnerability VCID-7eg3-vksv-9bga
3
vulnerability VCID-8mwn-2k1d-rkfz
4
vulnerability VCID-96hb-thus-r3f2
5
vulnerability VCID-cbts-ng32-67e7
6
vulnerability VCID-cq52-ykyq-qug5
7
vulnerability VCID-g5b3-53m2-yug1
8
vulnerability VCID-gg4f-gzty-y7e1
9
vulnerability VCID-pgy6-vbk7-hkg8
10
vulnerability VCID-qh6a-u11q-g3gp
11
vulnerability VCID-s9gb-bjme-gkaf
12
vulnerability VCID-ybfq-unp3-dbav
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@4.6.4-2
2
url pkg:deb/debian/rsyslog@4.6.4-2%2Bdeb6u2
purl pkg:deb/debian/rsyslog@4.6.4-2%2Bdeb6u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2vuy-ga2a-2ke4
1
vulnerability VCID-4vr2-rn4g-bbep
2
vulnerability VCID-7eg3-vksv-9bga
3
vulnerability VCID-8mwn-2k1d-rkfz
4
vulnerability VCID-96hb-thus-r3f2
5
vulnerability VCID-cbts-ng32-67e7
6
vulnerability VCID-cq52-ykyq-qug5
7
vulnerability VCID-g5b3-53m2-yug1
8
vulnerability VCID-gg4f-gzty-y7e1
9
vulnerability VCID-pgy6-vbk7-hkg8
10
vulnerability VCID-qh6a-u11q-g3gp
11
vulnerability VCID-s9gb-bjme-gkaf
12
vulnerability VCID-ybfq-unp3-dbav
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@4.6.4-2%252Bdeb6u2
References
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1488.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1488.json
2
reference_url https://access.redhat.com/security/cve/cve-2011-1488
reference_id
reference_type
scores
url https://access.redhat.com/security/cve/cve-2011-1488
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1488
reference_id
reference_type
scores
0
value 0.00153
scoring_system epss
scoring_elements 0.36029
published_at 2026-04-18T12:55:00Z
1
value 0.00153
scoring_system epss
scoring_elements 0.36043
published_at 2026-04-16T12:55:00Z
2
value 0.00153
scoring_system epss
scoring_elements 0.35933
published_at 2026-04-01T12:55:00Z
3
value 0.00153
scoring_system epss
scoring_elements 0.36124
published_at 2026-04-02T12:55:00Z
4
value 0.00153
scoring_system epss
scoring_elements 0.36154
published_at 2026-04-04T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.3599
published_at 2026-04-07T12:55:00Z
6
value 0.00153
scoring_system epss
scoring_elements 0.36039
published_at 2026-04-08T12:55:00Z
7
value 0.00153
scoring_system epss
scoring_elements 0.36062
published_at 2026-04-09T12:55:00Z
8
value 0.00153
scoring_system epss
scoring_elements 0.36069
published_at 2026-04-11T12:55:00Z
9
value 0.00153
scoring_system epss
scoring_elements 0.3603
published_at 2026-04-12T12:55:00Z
10
value 0.00153
scoring_system epss
scoring_elements 0.36004
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1488
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1488
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1488
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1488
6
reference_url https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a
reference_id
reference_type
scores
url https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a
7
reference_url https://security-tracker.debian.org/tracker/CVE-2011-1488
reference_id
reference_type
scores
url https://security-tracker.debian.org/tracker/CVE-2011-1488
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=694122
reference_id 694122
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=694122
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1488
reference_id CVE-2011-1488
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2011-1488
Weaknesses
0
cwe_id 401
name Missing Release of Memory after Effective Lifetime
description The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
1
cwe_id 772
name Missing Release of Resource after Effective Lifetime
description The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer needed.
Exploits
Severity_range_score1.9 - 5.5
Exploitability0.5
Weighted_severity5.0
Risk_score2.5
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-gg4f-gzty-y7e1