CVE-2015-3243
25.07.2017, 18:29
rsyslog uses weak permissions for generating log files, which allows local users to obtain sensitive information by reading files in /var/log/cron.Enginsight
| Vendor | Product | Version |
|---|---|---|
| rsyslog | rsyslog | - |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References