Логотип exploitDog
bind:CVE-2008-5617
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2008-5617

Количество 4

Количество 4

ubuntu логотип

CVE-2008-5617

около 17 лет назад

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.

CVSS2: 8.5
EPSS: Низкий
nvd логотип

CVE-2008-5617

около 17 лет назад

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.

CVSS2: 8.5
EPSS: Низкий
debian логотип

CVE-2008-5617

около 17 лет назад

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does no ...

CVSS2: 8.5
EPSS: Низкий
github логотип

GHSA-8fh8-56w4-443q

больше 3 лет назад

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2008-5617

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.

CVSS2: 8.5
0%
Низкий
около 17 лет назад
nvd логотип
CVE-2008-5617

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.

CVSS2: 8.5
0%
Низкий
около 17 лет назад
debian логотип
CVE-2008-5617

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does no ...

CVSS2: 8.5
0%
Низкий
около 17 лет назад
github логотип
GHSA-8fh8-56w4-443q

The ACL handling in rsyslog 3.12.1 to 3.20.0, 4.1.0, and 4.1.1 does not follow $AllowedSender directive, which allows remote attackers to bypass intended access restrictions and spoof log messages or create a large number of spurious messages.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу