{"url":"http://public2.vulnerablecode.io/api/packages/940412?format=json","purl":"pkg:deb/debian/syslog-ng@3.28.1-2%2Bdeb11u1?distro=trixie","type":"deb","namespace":"debian","name":"syslog-ng","version":"3.28.1-2+deb11u1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"3.28.1-2+deb11u2","latest_non_vulnerable_version":"4.8.1-7","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33431?format=json","vulnerability_id":"VCID-1gf1-xw2a-dqgq","summary":"This GLSA contains notification of vulnerabilities found in several\n    Gentoo packages which have been fixed prior to January 1, 2012. The worst\n    of these vulnerabilities could lead to local privilege escalation and\n    remote code execution. Please see the package list and CVE identifiers\n    below for more information.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1951","reference_id":"","reference_type":"","scores":[{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81342","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81351","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81374","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81371","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81404","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81425","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81413","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81406","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81443","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81444","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81445","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81466","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81479","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81496","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81516","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1951"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1951","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1951"},{"reference_url":"https://security.gentoo.org/glsa/201412-09","reference_id":"GLSA-201412-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-09"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/940418?format=json","purl":"pkg:deb/debian/syslog-ng@3.2.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.2.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940412?format=json","purl":"pkg:deb/debian/syslog-ng@3.28.1-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.28.1-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940410?format=json","purl":"pkg:deb/debian/syslog-ng@3.38.1-5%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.38.1-5%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940414?format=json","purl":"pkg:deb/debian/syslog-ng@4.8.1-5%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@4.8.1-5%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940413?format=json","purl":"pkg:deb/debian/syslog-ng@4.8.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@4.8.1-7%3Fdistro=trixie"}],"aliases":["CVE-2011-1951"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1gf1-xw2a-dqgq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96230?format=json","vulnerability_id":"VCID-1xzy-xag3-5ybt","summary":"syslog-ng is an enhanced log daemo. Prior to version 4.8.2, `tls_wildcard_match()` matches on certificates such as `foo.*.bar` although that is not allowed. It is also possible to pass partial wildcards such as `foo.a*c.bar` which glib matches but should be avoided / invalidated. This issue could have an impact on TLS connections, such as in man-in-the-middle situations. Version 4.8.2 contains a fix for the issue.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47619","reference_id":"","reference_type":"","scores":[{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66366","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66316","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66303","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66272","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66306","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66322","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66307","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66332","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66346","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66323","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66238","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66265","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66235","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66283","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00507","scoring_system":"epss","scoring_elements":"0.66296","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-47619"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47619","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47619"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104890","reference_id":"1104890","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104890"},{"reference_url":"https://github.com/syslog-ng/syslog-ng/commit/dadfdbecde5bfe710b0a6ee5699f96926b3f9006","reference_id":"dadfdbecde5bfe710b0a6ee5699f96926b3f9006","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-07T17:22:10Z/"}],"url":"https://github.com/syslog-ng/syslog-ng/commit/dadfdbecde5bfe710b0a6ee5699f96926b3f9006"},{"reference_url":"https://github.com/syslog-ng/syslog-ng/security/advisories/GHSA-xr54-gx74-fghg","reference_id":"GHSA-xr54-gx74-fghg","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-07T17:22:10Z/"}],"url":"https://github.com/syslog-ng/syslog-ng/security/advisories/GHSA-xr54-gx74-fghg"},{"reference_url":"https://github.com/syslog-ng/syslog-ng/releases/tag/syslog-ng-4.8.2","reference_id":"syslog-ng-4.8.2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-07T17:22:10Z/"}],"url":"https://github.com/syslog-ng/syslog-ng/releases/tag/syslog-ng-4.8.2"},{"reference_url":"https://github.com/syslog-ng/syslog-ng/blob/b0ccc8952d333fbc2d97e51fddc0b569a15e7a7d/lib/transport/tls-verifier.c#L78-L110","reference_id":"tls-verifier.c#L78-L110","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-07T17:22:10Z/"}],"url":"https://github.com/syslog-ng/syslog-ng/blob/b0ccc8952d333fbc2d97e51fddc0b569a15e7a7d/lib/transport/tls-verifier.c#L78-L110"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/940412?format=json","purl":"pkg:deb/debian/syslog-ng@3.28.1-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.28.1-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940420?format=json","purl":"pkg:deb/debian/syslog-ng@3.28.1-2%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.28.1-2%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940410?format=json","purl":"pkg:deb/debian/syslog-ng@3.38.1-5%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.38.1-5%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940421?format=json","purl":"pkg:deb/debian/syslog-ng@4.8.1-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@4.8.1-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940414?format=json","purl":"pkg:deb/debian/syslog-ng@4.8.1-5%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@4.8.1-5%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940413?format=json","purl":"pkg:deb/debian/syslog-ng@4.8.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@4.8.1-7%3Fdistro=trixie"}],"aliases":["CVE-2024-47619"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1xzy-xag3-5ybt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92121?format=json","vulnerability_id":"VCID-2rmg-7wqe-nqcq","summary":"Balabit syslog-ng 2.0, 3.0, 3.1, 3.2 OSE and PE, when running on FreeBSD or HP-UX, does not properly perform cast operations, which causes syslog-ng to use a default value of -1 to create log files with insecure permissions (07777), which allows local users to read and write to these log files.","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608491","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608491"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0343","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13034","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13117","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13225","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13291","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13089","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13171","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13222","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13191","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13153","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13102","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13003","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13006","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13108","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13077","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12974","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12879","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0343"},{"reference_url":"https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html"},{"reference_url":"https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html"},{"reference_url":"http://www.securityfocus.com/archive/1/515955/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/515955/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/45988","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45988"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608491","reference_id":"608491","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608491"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oneidentity:syslog-ng:2.0:*:*:*:open_source:*:*:*","reference_id":"cpe:2.3:a:oneidentity:syslog-ng:2.0:*:*:*:open_source:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oneidentity:syslog-ng:2.0:*:*:*:open_source:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oneidentity:syslog-ng:2.0:*:*:*:premium:*:*:*","reference_id":"cpe:2.3:a:oneidentity:syslog-ng:2.0:*:*:*:premium:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oneidentity:syslog-ng:2.0:*:*:*:premium:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oneidentity:syslog-ng:3.0:*:*:*:open_source:*:*:*","reference_id":"cpe:2.3:a:oneidentity:syslog-ng:3.0:*:*:*:open_source:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oneidentity:syslog-ng:3.0:*:*:*:open_source:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oneidentity:syslog-ng:3.0:*:*:*:premium:*:*:*","reference_id":"cpe:2.3:a:oneidentity:syslog-ng:3.0:*:*:*:premium:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oneidentity:syslog-ng:3.0:*:*:*:premium:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oneidentity:syslog-ng:3.1:*:*:*:open_source:*:*:*","reference_id":"cpe:2.3:a:oneidentity:syslog-ng:3.1:*:*:*:open_source:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oneidentity:syslog-ng:3.1:*:*:*:open_source:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oneidentity:syslog-ng:3.1:*:*:*:premium:*:*:*","reference_id":"cpe:2.3:a:oneidentity:syslog-ng:3.1:*:*:*:premium:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oneidentity:syslog-ng:3.1:*:*:*:premium:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oneidentity:syslog-ng:3.2:*:*:*:open_source:*:*:*","reference_id":"cpe:2.3:a:oneidentity:syslog-ng:3.2:*:*:*:open_source:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oneidentity:syslog-ng:3.2:*:*:*:open_source:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oneidentity:syslog-ng:3.2:*:*:*:premium:*:*:*","reference_id":"cpe:2.3:a:oneidentity:syslog-ng:3.2:*:*:*:premium:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oneidentity:syslog-ng:3.2:*:*:*:premium:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0343","reference_id":"CVE-2011-0343","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0343"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/940417?format=json","purl":"pkg:deb/debian/syslog-ng@3.1.3-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.1.3-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940412?format=json","purl":"pkg:deb/debian/syslog-ng@3.28.1-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.28.1-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940410?format=json","purl":"pkg:deb/debian/syslog-ng@3.38.1-5%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.38.1-5%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940414?format=json","purl":"pkg:deb/debian/syslog-ng@4.8.1-5%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@4.8.1-5%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940413?format=json","purl":"pkg:deb/debian/syslog-ng@4.8.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@4.8.1-7%3Fdistro=trixie"}],"aliases":["CVE-2011-0343"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2rmg-7wqe-nqcq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91033?format=json","vulnerability_id":"VCID-8csr-snmd-dqby","summary":"Balabit Syslog-NG 1.4.x before 1.4.15, and 1.5.x before 1.5.20, when using template filenames or output, does not properly track the size of a buffer when constant characters are encountered during macro expansion, which allows remote attackers to cause a denial of service and possibly execute arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1200","reference_id":"","reference_type":"","scores":[{"value":"0.0653","scoring_system":"epss","scoring_elements":"0.91071","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0653","scoring_system":"epss","scoring_elements":"0.91076","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0653","scoring_system":"epss","scoring_elements":"0.91085","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0653","scoring_system":"epss","scoring_elements":"0.91094","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0653","scoring_system":"epss","scoring_elements":"0.91106","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0653","scoring_system":"epss","scoring_elements":"0.91112","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0653","scoring_system":"epss","scoring_elements":"0.9112","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0653","scoring_system":"epss","scoring_elements":"0.91121","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0653","scoring_system":"epss","scoring_elements":"0.91144","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0653","scoring_system":"epss","scoring_elements":"0.91147","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0653","scoring_system":"epss","scoring_elements":"0.91161","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0653","scoring_system":"epss","scoring_elements":"0.91158","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0653","scoring_system":"epss","scoring_elements":"0.91154","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0653","scoring_system":"epss","scoring_elements":"0.91168","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0653","scoring_system":"epss","scoring_elements":"0.91184","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1200"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1200"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/940411?format=json","purl":"pkg:deb/debian/syslog-ng@1.5.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@1.5.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940412?format=json","purl":"pkg:deb/debian/syslog-ng@3.28.1-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.28.1-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940410?format=json","purl":"pkg:deb/debian/syslog-ng@3.38.1-5%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.38.1-5%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940414?format=json","purl":"pkg:deb/debian/syslog-ng@4.8.1-5%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@4.8.1-5%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940413?format=json","purl":"pkg:deb/debian/syslog-ng@4.8.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@4.8.1-7%3Fdistro=trixie"}],"aliases":["CVE-2002-1200"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8csr-snmd-dqby"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51497?format=json","vulnerability_id":"VCID-bfpg-vpax-ryhy","summary":"Syslog-ng does not properly initialize its chroot jail allowing for an\n    escape if a separate vulnerability in Syslog-ng is exploited.","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505791","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505791"},{"reference_url":"http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083","reference_id":"","reference_type":"","scores":[],"url":"http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5110.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5110.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5110","reference_id":"","reference_type":"","scores":[{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.78038","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77857","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77865","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77892","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77875","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77902","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77907","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77933","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77917","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77955","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77953","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77947","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.7798","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.77988","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.78","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01088","scoring_system":"epss","scoring_elements":"0.7801","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5110"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5110","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5110"},{"reference_url":"http://secunia.com/advisories/35748","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35748"},{"reference_url":"http://secunia.com/advisories/40551","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40551"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200907-10.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200907-10.xml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2008/11/17/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2008/11/17/3"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1796","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1796"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=471984","reference_id":"471984","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=471984"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505791","reference_id":"505791","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505791"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oneidentity:syslog-ng:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oneidentity:syslog-ng:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oneidentity:syslog-ng:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5110","reference_id":"CVE-2008-5110","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5110"},{"reference_url":"https://security.gentoo.org/glsa/200907-10","reference_id":"GLSA-200907-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200907-10"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/940416?format=json","purl":"pkg:deb/debian/syslog-ng@2.0.9-4.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@2.0.9-4.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940412?format=json","purl":"pkg:deb/debian/syslog-ng@3.28.1-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.28.1-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940410?format=json","purl":"pkg:deb/debian/syslog-ng@3.38.1-5%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.38.1-5%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940414?format=json","purl":"pkg:deb/debian/syslog-ng@4.8.1-5%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@4.8.1-5%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940413?format=json","purl":"pkg:deb/debian/syslog-ng@4.8.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@4.8.1-7%3Fdistro=trixie"}],"aliases":["CVE-2008-5110"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bfpg-vpax-ryhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49258?format=json","vulnerability_id":"VCID-c9ef-1f5v-y7b7","summary":"A Denial of Service vulnerability has been discovered in Syslog-ng.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6437.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6437.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6437","reference_id":"","reference_type":"","scores":[{"value":"0.05794","scoring_system":"epss","scoring_elements":"0.90463","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05794","scoring_system":"epss","scoring_elements":"0.90467","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05794","scoring_system":"epss","scoring_elements":"0.90479","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05794","scoring_system":"epss","scoring_elements":"0.90484","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05794","scoring_system":"epss","scoring_elements":"0.90497","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05794","scoring_system":"epss","scoring_elements":"0.90503","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05794","scoring_system":"epss","scoring_elements":"0.9051","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05794","scoring_system":"epss","scoring_elements":"0.90504","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05794","scoring_system":"epss","scoring_elements":"0.90522","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05794","scoring_system":"epss","scoring_elements":"0.9052","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05794","scoring_system":"epss","scoring_elements":"0.90532","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05794","scoring_system":"epss","scoring_elements":"0.90531","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05794","scoring_system":"epss","scoring_elements":"0.90528","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05794","scoring_system":"epss","scoring_elements":"0.90538","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05794","scoring_system":"epss","scoring_elements":"0.90556","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6437"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6437","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6437"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=426173","reference_id":"426173","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=426173"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=457334","reference_id":"457334","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=457334"},{"reference_url":"https://security.gentoo.org/glsa/200712-19","reference_id":"GLSA-200712-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200712-19"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/940415?format=json","purl":"pkg:deb/debian/syslog-ng@2.0.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@2.0.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940412?format=json","purl":"pkg:deb/debian/syslog-ng@3.28.1-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.28.1-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940410?format=json","purl":"pkg:deb/debian/syslog-ng@3.38.1-5%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.38.1-5%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940414?format=json","purl":"pkg:deb/debian/syslog-ng@4.8.1-5%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@4.8.1-5%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940413?format=json","purl":"pkg:deb/debian/syslog-ng@4.8.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@4.8.1-7%3Fdistro=trixie"}],"aliases":["CVE-2007-6437"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c9ef-1f5v-y7b7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62546?format=json","vulnerability_id":"VCID-d3hk-n3x4-dfb6","summary":"A denial of service vulnerability was discovered in rsyslog related to syslog input over the network.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38725","reference_id":"","reference_type":"","scores":[{"value":"0.04916","scoring_system":"epss","scoring_elements":"0.8959","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04916","scoring_system":"epss","scoring_elements":"0.89576","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04916","scoring_system":"epss","scoring_elements":"0.89668","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04916","scoring_system":"epss","scoring_elements":"0.8965","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04916","scoring_system":"epss","scoring_elements":"0.89641","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04916","scoring_system":"epss","scoring_elements":"0.89637","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04916","scoring_system":"epss","scoring_elements":"0.89622","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04916","scoring_system":"epss","scoring_elements":"0.89627","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04916","scoring_system":"epss","scoring_elements":"0.89626","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04916","scoring_system":"epss","scoring_elements":"0.89618","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04916","scoring_system":"epss","scoring_elements":"0.89619","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04916","scoring_system":"epss","scoring_elements":"0.89612","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04916","scoring_system":"epss","scoring_elements":"0.89607","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38725"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.debian.org/security/2023/dsa-5369","reference_id":"dsa-5369","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:35:13Z/"}],"url":"https://www.debian.org/security/2023/dsa-5369"},{"reference_url":"https://github.com/syslog-ng/syslog-ng/security/advisories/GHSA-7932-4fc6-pvmc","reference_id":"GHSA-7932-4fc6-pvmc","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:35:13Z/"}],"url":"https://github.com/syslog-ng/syslog-ng/security/advisories/GHSA-7932-4fc6-pvmc"},{"reference_url":"https://security.gentoo.org/glsa/202305-09","reference_id":"GLSA-202305-09","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:35:13Z/"}],"url":"https://security.gentoo.org/glsa/202305-09"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3TZ7U2GQTAHVHJXSSEHQS5D2Q5T6SZB/","reference_id":"J3TZ7U2GQTAHVHJXSSEHQS5D2Q5T6SZB","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:35:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3TZ7U2GQTAHVHJXSSEHQS5D2Q5T6SZB/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00043.html","reference_id":"msg00043.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:35:13Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/02/msg00043.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QU36HCM3VZYANUYFC6XFYEYJEKQPA2Q7/","reference_id":"QU36HCM3VZYANUYFC6XFYEYJEKQPA2Q7","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:35:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QU36HCM3VZYANUYFC6XFYEYJEKQPA2Q7/"},{"reference_url":"https://lists.balabit.hu/pipermail/syslog-ng/","reference_id":"syslog-ng","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-03T14:35:13Z/"}],"url":"https://lists.balabit.hu/pipermail/syslog-ng/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/940412?format=json","purl":"pkg:deb/debian/syslog-ng@3.28.1-2%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.28.1-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940419?format=json","purl":"pkg:deb/debian/syslog-ng@3.38.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.38.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940410?format=json","purl":"pkg:deb/debian/syslog-ng@3.38.1-5%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.38.1-5%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940414?format=json","purl":"pkg:deb/debian/syslog-ng@4.8.1-5%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@4.8.1-5%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/940413?format=json","purl":"pkg:deb/debian/syslog-ng@4.8.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@4.8.1-7%3Fdistro=trixie"}],"aliases":["CVE-2022-38725"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d3hk-n3x4-dfb6"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/syslog-ng@3.28.1-2%252Bdeb11u1%3Fdistro=trixie"}