Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-mz5a-qa1x-cbez
Summaryrsyslog: $AllowedSender restriction not honoured
Aliases
0
alias CVE-2008-5617
Fixed_packages
0
url pkg:deb/debian/rsyslog@3.18.6-1?distro=trixie
purl pkg:deb/debian/rsyslog@3.18.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@3.18.6-1%3Fdistro=trixie
1
url pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2102.0-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2302.0-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie
purl pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2504.0-1%3Fdistro=trixie
4
url pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie
purl pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie
5
url pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie
purl pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2602.0-1%3Fdistro=trixie
Affected_packages
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5617.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5617.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5617
reference_id
reference_type
scores
0
value 0.00389
scoring_system epss
scoring_elements 0.60067
published_at 2026-04-18T12:55:00Z
1
value 0.00389
scoring_system epss
scoring_elements 0.59896
published_at 2026-04-01T12:55:00Z
2
value 0.00389
scoring_system epss
scoring_elements 0.59974
published_at 2026-04-02T12:55:00Z
3
value 0.00389
scoring_system epss
scoring_elements 0.59999
published_at 2026-04-04T12:55:00Z
4
value 0.00389
scoring_system epss
scoring_elements 0.59969
published_at 2026-04-07T12:55:00Z
5
value 0.00389
scoring_system epss
scoring_elements 0.60019
published_at 2026-04-08T12:55:00Z
6
value 0.00389
scoring_system epss
scoring_elements 0.60032
published_at 2026-04-09T12:55:00Z
7
value 0.00389
scoring_system epss
scoring_elements 0.60053
published_at 2026-04-11T12:55:00Z
8
value 0.00389
scoring_system epss
scoring_elements 0.60038
published_at 2026-04-12T12:55:00Z
9
value 0.00389
scoring_system epss
scoring_elements 0.60021
published_at 2026-04-13T12:55:00Z
10
value 0.00389
scoring_system epss
scoring_elements 0.6006
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5617
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5617
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5617
3
reference_url http://secunia.com/advisories/32857
reference_id
reference_type
scores
url http://secunia.com/advisories/32857
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47080
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47080
5
reference_url http://www.rsyslog.com/Article322.phtml
reference_id
reference_type
scores
url http://www.rsyslog.com/Article322.phtml
6
reference_url http://www.rsyslog.com/Article327.phtml
reference_id
reference_type
scores
url http://www.rsyslog.com/Article327.phtml
7
reference_url http://www.rsyslog.com/Topic4.phtml
reference_id
reference_type
scores
url http://www.rsyslog.com/Topic4.phtml
8
reference_url http://www.securityfocus.com/bid/32630
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32630
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476647
reference_id 476647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476647
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508027
reference_id 508027
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508027
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.4:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.12.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.5:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.13.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.13.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.13.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.15.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.15.1:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.15.1:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.15.1:beta:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.17.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.17.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.4:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.17.4:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.4:beta:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.5:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.17.5:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.5:beta:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.11:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.12:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.7:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.8:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.19.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.9:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.20.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:3.20.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.20.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5617
reference_id CVE-2008-5617
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5617
Weaknesses
0
cwe_id 264
name Permissions, Privileges, and Access Controls
description Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Exploits
Severity_range_score8.5 - 8.5
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-mz5a-qa1x-cbez