Get Demo
An attacker can write to syslog files from any location, causing a denial of service by filling up the logs, and hiding activities.