Syslog-ng vulnerability with RFC3164 analyzer
Reporter | Title | Published | Views | Family All 41 |
---|---|---|---|---|
![]() | Integer overflow | 23 Jan 202316:15 | – | prion |
![]() | CVE-2022-38725 | 23 Jan 202316:15 | – | osv |
![]() | syslog-ng - security update | 1 Mar 202300:00 | – | osv |
![]() | syslog-ng - security update | 5 Mar 202300:00 | – | osv |
![]() | CVE-2022-38725 | 23 Jan 202316:15 | – | cve |
![]() | CVE-2022-38725 affecting package syslog-ng 3.23.1-3 | 2 Mar 202304:18 | – | cbl_mariner |
![]() | CVE-2022-38725 affecting package syslog-ng for versions less than 3.33.2-7 | 5 Dec 202304:40 | – | cbl_mariner |
![]() | CVE-2022-38725 affecting package syslog-ng for versions less than 4.3.1-2 | 5 Feb 202522:13 | – | cbl_mariner |
![]() | An integer overflow in the RFC3164 parser in One Identity syslog-ng 3.0 through 3.37 allows remote attackers to cause a Denial of Service | 13 Jun 202300:00 | – | broadcom |
![]() | Photon OS 3.0: Syslog PHSA-2023-3.0-0693 | 24 Jul 202400:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
redos | 7.3 | x86_64 | syslog-ng | 3.38.1-1 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo