Known vulnerabilities in rsyslog.com rsyslog
8.2502.0
8.2412.0
8.2410.0
8.2408.0
8.2406.0
8.2404.0
8.2402.0
8.2312.0
8.2310.0
8.2308.0
8.2306.0
8.2304.0
8.2302.0
8.2212.0
8.2210.0
8.2208.0
8.2206.0
8.2204.1
8.2204.0
8.2202.0
8.2022.0
8.2112.0
8.2110.0
8.2108.0
8.2106.0
8.2104.0
8.2102.0
7.4.10
8.2012.0
8.2010.0
8.2008.0
8.2006.0
8.2004.0
8.2002.0
8.2001.0
141
4.6.1.10
8.1911.0
8.1910.0
8.1908.0
8.1907.0
8.1905.0
8.1904.0
8.1903.0
8.1901.0
8.40.0
8.39.0
8.38.0
8.37.0
8.36.0
8.35.0
8.34.0
8.33.1
8.33.0
8.32.0
8.31.0
8.30.0
8.29.0
8.28.0
8.27.0
8.26.0
8.25.0
8.24.0
8.23.0
8.22.0
8.21.0
8.20.0
8.19.0
8.18.0
8.17.0
8.16.0
8.15.0
8.14.0
8.13.0
8.12.0
8.11.0
8.10.0
8.9.0.
8.9.0
8.8.0.
8.8.0
8.7.0
8.6.0
8.5.0
8.4.2.
8.4.2
8
7.6.7
7.6.4
7.6.3
7.6.2
7.6.1
7.6.0
7.5.8
7.5.7
7.5.6
7.5.5
7.5.4
7.5.3
7.5.2
7.4.9
7.4.8
7.4.7
7.4.6
7.4.5
7.4.4
7.4.3
7.4.2
7.3.2
7.2.0
6.5.0
6.4.1
6.4.0
6.3.12
6.3.11
6.3.10
6.3.9
6.3.8
6.3.7
6.3.6
6.3.5
6.3.4
6.3.3
6.3.2
6.3.1
6.3.0
6.2.2
6.2.1
6.2.0
6.1.12
6.1.11
6.1.10
6.1.9
6.1.8
6.1.7
6.1.6
6.1.5
6.1.4
5.10.1
5.10.0
5.9.7
5.9.6
5.9.5
5.9.4
5.9.3
5.9.2
5.9.1
5.9.0
5.8.13
5.8.12
5.8.11
5.8.10
5.8.9
5.8.8
5.8.7
5.8.6
5.8.5
5.3.0
4.8.0
4.7.5
4.7.4
4.7.3
4.7.2
4.7.1
4.7.0
4.6.8
3.22.3
3.22.2
3.22.1
3.22.0
3.21.11
3.21.10
3.21.9
3.21.8
3.21.7
3.21.6
3.21.5
3.21.4
3.21.3
3.21.2
3.21.1
3.21.0
3.20.6
3.20.5
3.20.4
3.20.3
3.20.2
3.20.1
3.18.6
3.18.5
3.18.4
3.18.3
3.18.2
3.18.1
3.18.0
3.17.3
3.17.2
3.16.2
3.16.1
3.16.0
3.14.2
3
2.0.7
2.0.6
2.0.5
2
1.2.13
1.2.12
1.2.11
1.2.10
1.2.9
1.2.8
1.2.7
1.2.5
1.2.4
1.2.3
1.2.2
1.2.1
1.2.0
1.1.5
1.1.4
1.1.3
1.1.2
1.1.1
1.1.0
1.0.7
1.0.6
1.0.5
1.0.3
1.0.2
1.0.1
1.0.0
1
0.1.3
0.1.1
0.1.0
8.27
8.26
8.25
8.24
8.23
8.22
8.21
8.20
8.19
8.18
8.17
8.16
8.15
8.14
8.13
8.12
8.11
8.10
7.6.6
8.4.1
7.6.5
8.1.0
8.3.3
8.1.5
8.3.4
8.1.6
8.3.5
8.2.0
8.1.1
8.3.0
8.2.1
8.1.2
8.4.0
8.3.1
8.2.2
8.1.3
8.3.2
8.2.3
8.1.4
7.5.0
7.5.1
6.4.2
6.5.1
6.6.0
7.3.8
7.3.9
7.1.4
7.2.3
7.4.1
7.1.5
7.2.4
7.3.3
7.1.2
7.2.1
7.3.0
7.1.3
7.2.2
7.3.1
7.4.0
7.1.8
7.2.7
7.3.6
7.1.9
7.3.7
7.1.6
7.2.5
7.3.4
7.1.7
7.2.6
7.3.5
7.1.0
7.3.15
7.1.1
7.1.10
7.3.11
7.3.12
7.1.12
7.3.13
7.1.11
7.3.14
7.3.10
4.5.0
4.3.2
4.1.4
4.3.1
4.1.3
4.3.0
4.1.2
4.5.4
4.5.3
4.1.7
4.5.2
4.1.6
4.5.1
4.1.5
4.5.8
4.5.7
4.5.6
4.5.5
5.1.5
5.1.4
5.1.6
6.1.2
6.1.1
6.1.0
6.1.3
5.1.1
5.1.0
5.1.3
5.1.2
4.4.1
4.4.0
4.2.0
4.4.2
5.8.2
5.6.4
5.8.1
5.6.3
5.8.4
5.8.3
5.6.5
5.6.0
5.4.2
5.4.1
5.8.0
5.6.2
5.6.1
5.2.0
5.4.0
5.2.2
5.2.1
5.7.3
5.5.5
5.3.7
5.7.2
5.5.4
5.3.6
5.7.5
5.5.7
5.7.4
5.5.6
5.5.1
5.3.3
5.5.0
5.3.2
5.7.1
5.5.3
5.3.5
5.7.0
5.5.2
5.3.4
5.7.7
5.7.6
5.7.9
5.7.8
5.3.1
5.7.10
4.6.3
4.6.2
4.6.1
4.6.0
4.6.7
4.6.6
4.6.5
4.6.4
3.12.4
3.19.0
3.17.5
3.17.1
3.19.2
3.12.3
3.15.0
3.19.9
3.12.5
3.17.0
3.12.2
3.19.5
3.19.8
3.19.7
3.15.1
3.19.4
3.19.3
3.19.6
3.17.4
3.13.0
3.12.1
3.19.1
4.1.0
3.19.10
3.19.12
4.1.1
3.19.11
3.20.0
Security bulletins (9)
| Secuity bulletin | Severity | Status | Published |
|---|---|---|---|
| SB2022050524: Heap-based buffer overflow in rsyslog | High | 05.05.2022 | |
| SB2019111444: Multiple vulnerabilities in rsyslog.com rsyslog | Medium | 14.11.2019 | |
| SB2019100722: Multiple vulnerabilities in Rsyslog | High | 07.10.2019 | |
| SB2017051708: Denial of service in rsyslog | Low | 17.05.2017 | |
| SB2014110202: Buffer overflow in rsyslog.com rsyslog | Medium | 02.11.2014 | |
| SB2014110203: Input validation error in rsyslog.com rsyslog | Medium | 02.11.2014 | |
| SB2013100404: Resource management error in rsyslog.com rsyslog | Medium | 04.10.2013 | |
| SB2012092603: Heap-based buffer overflow in rsyslog.com rsyslog | Low | 26.09.2012 | |
| SB2011090603: Stack-based buffer overflow in rsyslog.com rsyslog | Medium | 06.09.2011 |