An attacker can write to syslog files from any location, causing a denial of service by filling up the logs, and hiding activities.
1997-08-01T04:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 5.0 (MEDIUM)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9