Register
Login
Toggle navigation
SaaS Solutions
Vulnerability Intelligence
Vulnerability Management
Pricing
Vulnerabilities
Reports
Blog
Contact Us
Main
Vulnerability Database
rsyslog.com
rsyslog
Known Vulnerabilities in rsyslog
Show more ↓
141
8.2502.0
8.2412.0
8.2410.0
8.2408.0
8.2406.0
8.2404.0
8.2402.0
8.2312.0
8.2310.0
8.2308.0
8.2306.0
8.2304.0
8.2302.0
8.2212.0
8.2210.0
8.2208.0
8.2206.0
8.2204.1
8.2204.0
8.2202.0
8.2112.0
8.2110.0
8.2108.0
8.2106.0
8.2104.0
8.2102.0
8.2022.0
8.2012.0
8.2010.0
8.2008.0
8.2006.0
8.2004.0
8.2002.0
8.2001.0
8.1911.0
8.1910.0
8.1908.0
8.1907.0
8.1905.0
8.1904.0
8.1903.0
8.1901.0
8.40.0
8.39.0
8.38.0
8.37.0
8.36.0
8.35.0
8.34.0
8.33.1
8.33.0
8.32.0
8.31.0
8.30.0
8.29.0
8.28.0
8.27.0
8.27
8.26.0
8.26
8.25.0
8.25
8.24.0
8.24
8.23.0
8.23
8.22.0
8.22
8.21.0
8.21
8.20.0
8.20
8.19.0
8.19
8.18.0
8.18
8.17.0
8.17
8.16.0
8.16
8.15.0
8.15
8.14.0
8.14
8.13.0
8.13
8.12.0
8.12
8.11.0
8.11
8.10.0
8.10
8.9.0
8.9.0.
8.8.0
8.8.0.
8.7.0
8.6.0
8.5.0
8.4.2
8.4.2.
8.4.1
8.4.0
8.3.5
8.3.4
8.3.3
8.3.2
8.3.1
8.3.0
8.2.3
8.2.2
8.2.1
8.2.0
8.1.6
8.1.5
8.1.4
8.1.3
8.1.2
8.1.1
8.1.0
8
7.6.7
7.6.6
7.6.5
7.6.4
7.6.3
7.6.2
7.6.1
7.6.0
7.5.8
7.5.7
7.5.6
7.5.5
7.5.4
7.5.3
7.5.2
7.5.1
7.5.0
7.4.10
7.4.9
7.4.8
7.4.7
7.4.6
7.4.5
7.4.4
7.4.3
7.4.2
7.4.1
7.4.0
7.3.15
7.3.14
7.3.13
7.3.12
7.3.11
7.3.10
7.3.9
7.3.8
7.3.7
7.3.6
7.3.5
7.3.4
7.3.3
7.3.2
7.3.1
7.3.0
7.2.7
7.2.6
7.2.5
7.2.4
7.2.3
7.2.2
7.2.1
7.2.0
7.1.12
7.1.11
7.1.10
7.1.9
7.1.8
7.1.7
7.1.6
7.1.5
7.1.4
7.1.3
7.1.2
7.1.1
7.1.0
6.6.0
6.5.1
6.5.0
6.4.2
6.4.1
6.4.0
6.3.12
6.3.11
6.3.10
6.3.9
6.3.8
6.3.7
6.3.6
6.3.5
6.3.4
6.3.3
6.3.2
6.3.1
6.3.0
6.2.2
6.2.1
6.2.0
6.1.12
6.1.11
6.1.10
6.1.9
6.1.8
6.1.7
6.1.6
6.1.5
6.1.4
6.1.3
6.1.2
6.1.1
6.1.0
5.10.1
5.10.0
5.9.7
5.9.6
5.9.5
5.9.4
5.9.3
5.9.2
5.9.1
5.9.0
5.8.13
5.8.12
5.8.11
5.8.10
5.8.9
5.8.8
5.8.7
5.8.6
5.8.5
5.8.4
5.8.3
5.8.2
5.8.1
5.8.0
5.7.10
5.7.9
5.7.8
5.7.7
5.7.6
5.7.5
5.7.4
5.7.3
5.7.2
5.7.1
5.7.0
5.6.5
5.6.4
5.6.3
5.6.2
5.6.1
5.6.0
5.5.7
5.5.6
5.5.5
5.5.4
5.5.3
5.5.2
5.5.1
5.5.0
5.4.2
5.4.1
5.4.0
5.3.7
5.3.6
5.3.5
5.3.4
5.3.3
5.3.2
5.3.1
5.3.0
5.2.2
5.2.1
5.2.0
5.1.6
5.1.5
5.1.4
5.1.3
5.1.2
5.1.1
5.1.0
4.8.0
4.7.5
4.7.4
4.7.3
4.7.2
4.7.1
4.7.0
4.6.8
4.6.7
4.6.6
4.6.5
4.6.4
4.6.3
4.6.2
4.6.1.10
4.6.1
4.6.0
4.5.8
4.5.7
4.5.6
4.5.5
4.5.4
4.5.3
4.5.2
4.5.1
4.5.0
4.4.2
4.4.1
4.4.0
4.3.2
4.3.1
4.3.0
4.2.0
4.1.7
4.1.6
4.1.5
4.1.4
4.1.3
4.1.2
4.1.1
4.1.0
3.22.3
3.22.2
3.22.1
3.22.0
3.21.11
3.21.10
3.21.9
3.21.8
3.21.7
3.21.6
3.21.5
3.21.4
3.21.3
3.21.2
3.21.1
3.21.0
3.20.6
3.20.5
3.20.4
3.20.3
3.20.2
3.20.1
3.20.0
3.19.12
3.19.11
3.19.10
3.19.9
3.19.8
3.19.7
3.19.6
3.19.5
3.19.4
3.19.3
3.19.2
3.19.1
3.19.0
3.18.6
3.18.5
3.18.4
3.18.3
3.18.2
3.18.1
3.18.0
3.17.5
3.17.4
3.17.3
3.17.2
3.17.1
3.17.0
3.16.2
3.16.1
3.16.0
3.15.1
3.15.0
3.14.2
3.13.0
3.12.5
3.12.4
3.12.3
3.12.2
3.12.1
3
2.0.7
2.0.6
2.0.5
2
1.2.13
1.2.12
1.2.11
1.2.10
1.2.9
1.2.8
1.2.7
1.2.5
1.2.4
1.2.3
1.2.2
1.2.1
1.2.0
1.1.5
1.1.4
1.1.3
1.1.2
1.1.1
1.1.0
1.0.7
1.0.6
1.0.5
1.0.3
1.0.2
1.0.1
1.0.0
1
0.1.3
0.1.1
0.1.0
Heap-based buffer overflow in rsyslog
05 May, 2022
High
Patched
Multiple vulnerabilities in rsyslog.com rsyslog
14 Nov, 2019
Medium
Patched
Multiple vulnerabilities in Rsyslog
07 Oct, 2019
High
Patched
Denial of service in rsyslog
17 May, 2017
Low
Patched
Buffer overflow in rsyslog.com rsyslog
02 Nov, 2014
Medium
Patched
Input validation error in rsyslog.com rsyslog
02 Nov, 2014
Medium
Patched
Resource management error in rsyslog.com rsyslog
04 Oct, 2013
Medium
Patched
Heap-based buffer overflow in rsyslog.com rsyslog
26 Sep, 2012
Low
Patched
Stack-based buffer overflow in rsyslog.com rsyslog
06 Sep, 2011
Medium
Patched
Public exploit