Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/938024?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/938024?format=api", "purl": "pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie", "type": "deb", "namespace": "debian", "name": "rsyslog", "version": "8.2512.0-3", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "8.2602.0-1", "latest_non_vulnerable_version": "8.2602.0-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47993?format=api", "vulnerability_id": "VCID-2vuy-ga2a-2ke4", "summary": "Multiple vulnerabilities have been found in RSYSLOG, allowing\n attackers to cause Denial of Service.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3683.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3683.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3683", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02849", "scoring_system": "epss", "scoring_elements": "0.86162", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02849", "scoring_system": "epss", "scoring_elements": "0.86231", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02849", "scoring_system": "epss", "scoring_elements": "0.86228", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02849", "scoring_system": "epss", "scoring_elements": "0.86224", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02849", "scoring_system": "epss", "scoring_elements": "0.86172", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02849", "scoring_system": "epss", "scoring_elements": "0.86185", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02849", "scoring_system": "epss", "scoring_elements": "0.86186", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02849", "scoring_system": "epss", "scoring_elements": "0.86205", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02849", "scoring_system": "epss", "scoring_elements": "0.86216", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02868", "scoring_system": "epss", "scoring_elements": "0.86277", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02868", "scoring_system": "epss", "scoring_elements": "0.86282", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3683" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3683", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3683" }, { "reference_url": "http://secunia.com/advisories/61494", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61494" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3047", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3047" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/09/30/15", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/09/30/15" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/10/03/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/10/03/1" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "reference_url": "http://www.rsyslog.com/remote-syslog-pri-vulnerability-cve-2014-3683/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.rsyslog.com/remote-syslog-pri-vulnerability-cve-2014-3683/" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2381-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2381-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1149081", "reference_id": "1149081", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1149081" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sysklogd_project:sysklogd:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sysklogd_project:sysklogd:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sysklogd_project:sysklogd:1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sysklogd_project:sysklogd:1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sysklogd_project:sysklogd:1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:1.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sysklogd_project:sysklogd:1.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:1.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3683", "reference_id": "CVE-2014-3683", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3683" }, { "reference_url": "https://security.gentoo.org/glsa/201412-35", "reference_id": "GLSA-201412-35", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-35" }, { "reference_url": "https://usn.ubuntu.com/2381-1/", "reference_id": "USN-2381-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2381-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938032?format=api", "purl": "pkg:deb/debian/rsyslog@8.4.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.4.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938023?format=api", "purl": "pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2102.0-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938021?format=api", "purl": "pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2302.0-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938026?format=api", "purl": "pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2504.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938024?format=api", "purl": "pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938025?format=api", "purl": "pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2602.0-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-3683" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2vuy-ga2a-2ke4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87273?format=api", "vulnerability_id": "VCID-4vr2-rn4g-bbep", "summary": "rsyslog: parseLegacySyslogMsg off-by-two buffer overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3200.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3200.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3200", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.6739", "scoring_system": "epss", "scoring_elements": "0.98556", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.6739", "scoring_system": "epss", "scoring_elements": "0.98557", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.6739", "scoring_system": "epss", "scoring_elements": "0.9856", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.6739", "scoring_system": "epss", "scoring_elements": "0.98562", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.6739", "scoring_system": "epss", "scoring_elements": "0.98565", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.6739", "scoring_system": "epss", "scoring_elements": "0.98566", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.6739", "scoring_system": "epss", "scoring_elements": "0.98568", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.6739", "scoring_system": "epss", "scoring_elements": "0.98569", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.6739", "scoring_system": "epss", "scoring_elements": "0.98574", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.6739", "scoring_system": "epss", "scoring_elements": "0.98575", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3200" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3200", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3200" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=644611", "reference_id": "644611", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=644611" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=727644", "reference_id": "727644", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=727644" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1247", "reference_id": "RHSA-2011:1247", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1247" }, { "reference_url": "https://usn.ubuntu.com/1224-1/", "reference_id": "USN-1224-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1224-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938028?format=api", "purl": "pkg:deb/debian/rsyslog@5.8.5-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@5.8.5-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938023?format=api", "purl": "pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2102.0-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938021?format=api", "purl": "pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2302.0-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938026?format=api", "purl": "pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2504.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938024?format=api", "purl": "pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938025?format=api", "purl": "pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2602.0-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-3200" ], "risk_score": 1.2, "exploitability": "2.0", "weighted_severity": "0.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4vr2-rn4g-bbep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82049?format=api", "vulnerability_id": "VCID-7eg3-vksv-9bga", "summary": "rsyslog: out-of-bounds read in contrib/pmdb2diag/pmdb2diag.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17040.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17040.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17040", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00503", "scoring_system": "epss", "scoring_elements": "0.66028", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00503", "scoring_system": "epss", "scoring_elements": "0.66152", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00503", "scoring_system": "epss", "scoring_elements": "0.66103", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00503", "scoring_system": "epss", "scoring_elements": "0.66138", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00503", "scoring_system": "epss", "scoring_elements": "0.66069", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00503", "scoring_system": "epss", "scoring_elements": "0.66097", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00503", "scoring_system": "epss", "scoring_elements": "0.66065", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00503", "scoring_system": "epss", "scoring_elements": "0.66114", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00503", "scoring_system": "epss", "scoring_elements": "0.66126", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00503", "scoring_system": "epss", "scoring_elements": "0.66145", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00503", "scoring_system": "epss", "scoring_elements": "0.66133", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17040" }, { "reference_url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog" }, { "reference_url": "https://github.com/rsyslog/rsyslog/pull/3875", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/rsyslog/rsyslog/pull/3875" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766641", "reference_id": "1766641", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766641" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1908.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.1908.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1908.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17040", "reference_id": "CVE-2019-17040", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17040" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938035?format=api", "purl": "pkg:deb/debian/rsyslog@8.1910.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.1910.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938023?format=api", "purl": "pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2102.0-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938021?format=api", "purl": "pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2302.0-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938026?format=api", "purl": "pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2504.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938024?format=api", "purl": "pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938025?format=api", "purl": "pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2602.0-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-17040" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7eg3-vksv-9bga" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47992?format=api", "vulnerability_id": "VCID-8mwn-2k1d-rkfz", "summary": "Multiple vulnerabilities have been found in RSYSLOG, allowing\n attackers to cause Denial of Service.", "references": [ { "reference_url": "http://advisories.mageia.org/MGASA-2014-0411.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://advisories.mageia.org/MGASA-2014-0411.html" }, { "reference_url": "http://linux.oracle.com/errata/ELSA-2014-1654", "reference_id": "", "reference_type": "", "scores": [], "url": "http://linux.oracle.com/errata/ELSA-2014-1654" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00005.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00021.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1397.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1397.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1654.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1654.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1671.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1671.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3634.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3634.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3634", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.29383", "scoring_system": "epss", "scoring_elements": "0.96611", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.29383", "scoring_system": "epss", "scoring_elements": "0.96568", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.29383", "scoring_system": "epss", "scoring_elements": "0.96578", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.29383", "scoring_system": "epss", "scoring_elements": "0.96583", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.29383", "scoring_system": "epss", "scoring_elements": "0.96586", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.29383", "scoring_system": "epss", "scoring_elements": "0.96594", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.29383", "scoring_system": "epss", "scoring_elements": "0.96596", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.29383", "scoring_system": "epss", "scoring_elements": "0.96598", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.29383", "scoring_system": "epss", "scoring_elements": "0.966", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.29383", "scoring_system": "epss", "scoring_elements": "0.96606", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3634" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3634", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3634" }, { "reference_url": "http://secunia.com/advisories/61494", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61494" }, { "reference_url": "http://secunia.com/advisories/61720", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61720" }, { "reference_url": "http://secunia.com/advisories/61930", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/61930" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3040", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3040" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:130", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:130" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/09/30/15", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/09/30/15" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/10/03/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/10/03/1" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html" }, { "reference_url": "http://www.rsyslog.com/remote-syslog-pri-vulnerability/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.rsyslog.com/remote-syslog-pri-vulnerability/" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2381-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2381-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142373", "reference_id": "1142373", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1142373" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sysklogd_project:sysklogd:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sysklogd_project:sysklogd:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sysklogd_project:sysklogd:1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sysklogd_project:sysklogd:1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sysklogd_project:sysklogd:1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:1.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sysklogd_project:sysklogd:1.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sysklogd_project:sysklogd:1.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3634", "reference_id": "CVE-2014-3634", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3634" }, { "reference_url": "https://security.gentoo.org/glsa/201412-35", "reference_id": "GLSA-201412-35", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-35" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1397", "reference_id": "RHSA-2014:1397", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1397" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1654", "reference_id": "RHSA-2014:1654", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1671", "reference_id": "RHSA-2014:1671", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1671" }, { "reference_url": "https://usn.ubuntu.com/2381-1/", "reference_id": "USN-2381-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2381-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938031?format=api", "purl": "pkg:deb/debian/rsyslog@8.4.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.4.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938023?format=api", "purl": "pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2102.0-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938021?format=api", "purl": "pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2302.0-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938026?format=api", "purl": "pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2504.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938024?format=api", "purl": "pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938025?format=api", "purl": "pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2602.0-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-3634" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8mwn-2k1d-rkfz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84086?format=api", "vulnerability_id": "VCID-96hb-thus-r3f2", "summary": "rsyslog: multiple format string vulnerabilities in zmq3 modules", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12588.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12588.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12588", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0043", "scoring_system": "epss", "scoring_elements": "0.62437", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0043", "scoring_system": "epss", "scoring_elements": "0.62592", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0043", "scoring_system": "epss", "scoring_elements": "0.62545", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0043", "scoring_system": "epss", "scoring_elements": "0.62586", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0043", "scoring_system": "epss", "scoring_elements": "0.62495", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0043", "scoring_system": "epss", "scoring_elements": "0.62527", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0043", "scoring_system": "epss", "scoring_elements": "0.62493", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0043", "scoring_system": "epss", "scoring_elements": "0.62544", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0043", "scoring_system": "epss", "scoring_elements": "0.6256", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0043", "scoring_system": "epss", "scoring_elements": "0.62578", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0043", "scoring_system": "epss", "scoring_elements": "0.62567", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12588" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12588", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12588" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "9.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481335", "reference_id": "1481335", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1481335" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938033?format=api", "purl": "pkg:deb/debian/rsyslog@8.28.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.28.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938023?format=api", "purl": "pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2102.0-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938021?format=api", "purl": "pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2302.0-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938026?format=api", "purl": "pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2504.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938024?format=api", "purl": "pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938025?format=api", "purl": "pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2602.0-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-12588" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-96hb-thus-r3f2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87482?format=api", "vulnerability_id": "VCID-cbts-ng32-67e7", "summary": "rsyslog: Memory leak when multiple rulesets used", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1490.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1490.json" }, { "reference_url": "https://access.redhat.com/security/cve/cve-2011-1490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/security/cve/cve-2011-1490" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1490", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36029", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36043", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.35933", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36124", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36154", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.3599", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36039", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36062", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36069", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.3603", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36004", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1490" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1490" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1490" }, { "reference_url": "https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a" }, { "reference_url": "https://security-tracker.debian.org/tracker/CVE-2011-1490", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security-tracker.debian.org/tracker/CVE-2011-1490" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=694126", "reference_id": "694126", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694126" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1490", "reference_id": "CVE-2011-1490", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1490" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938027?format=api", "purl": "pkg:deb/debian/rsyslog@5.7.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@5.7.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938023?format=api", "purl": "pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2102.0-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938021?format=api", "purl": "pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2302.0-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938026?format=api", "purl": "pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2504.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938024?format=api", "purl": "pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938025?format=api", "purl": "pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2602.0-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-1490" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cbts-ng32-67e7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47991?format=api", "vulnerability_id": "VCID-cq52-ykyq-qug5", "summary": "Multiple vulnerabilities have been found in RSYSLOG, allowing\n attackers to cause Denial of Service.", "references": [ { "reference_url": "http://bugzilla.adiscon.com/show_bug.cgi?id=221", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugzilla.adiscon.com/show_bug.cgi?id=221" }, { "reference_url": "http://git.adiscon.com/?p=rsyslog.git%3Ba=commit%3Bh=6bad782f154b7f838c7371bf99c13f6dc4ec4101", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.adiscon.com/?p=rsyslog.git%3Ba=commit%3Bh=6bad782f154b7f838c7371bf99c13f6dc4ec4101" }, { "reference_url": "http://rsyslog.com/changelog-for-4-6-6-v4-stable/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rsyslog.com/changelog-for-4-6-6-v4-stable/" }, { "reference_url": "http://rsyslog.com/changelog-for-5-7-4-v5-beta/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rsyslog.com/changelog-for-5-7-4-v5-beta/" }, { "reference_url": "http://rsyslog.com/changelog-for-6-1-4-devel/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rsyslog.com/changelog-for-6-1-4-devel/" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4623.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4623.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4623", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25447", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25551", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25619", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25656", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25424", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25493", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.2554", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25509", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25452", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25457", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4623" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4623" }, { "reference_url": "http://secunia.com/advisories/45848", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/45848" }, { "reference_url": "http://secunia.com/advisories/47698", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/47698" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2011/12/22/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2011/12/22/2" }, { "reference_url": "http://www.securityfocus.com/bid/51171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/51171" }, { "reference_url": "http://www.securitytracker.com/id?1026556", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1026556" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1338-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1338-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=769822", "reference_id": "769822", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=769822" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:5.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:5.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:6.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:6.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:6.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:6.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:6.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:6.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:6.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:6.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:6.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:6.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:6.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:6.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4623", "reference_id": "CVE-2011-4623", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4623" }, { "reference_url": "https://security.gentoo.org/glsa/201412-35", "reference_id": "GLSA-201412-35", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-35" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0796", "reference_id": "RHSA-2012:0796", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0796" }, { "reference_url": "https://usn.ubuntu.com/1338-1/", "reference_id": "USN-1338-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1338-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938029?format=api", "purl": "pkg:deb/debian/rsyslog@5.7.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@5.7.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938023?format=api", "purl": "pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2102.0-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938021?format=api", "purl": "pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2302.0-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938026?format=api", "purl": "pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2504.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938024?format=api", "purl": "pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938025?format=api", "purl": "pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2602.0-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-4623" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cq52-ykyq-qug5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84444?format=api", "vulnerability_id": "VCID-g5b3-53m2-yug1", "summary": "rsyslog: imptcp: integer overflow when Octet-Counted TCP Framing is enabled", "references": [ { "reference_url": "https://access.redhat.com/errata/RHBA-2019:2501", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHBA-2019:2501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2439", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2439" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16881.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16881.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16881", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02616", "scoring_system": "epss", "scoring_elements": "0.85577", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02616", "scoring_system": "epss", "scoring_elements": "0.85679", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02616", "scoring_system": "epss", "scoring_elements": "0.85658", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02616", "scoring_system": "epss", "scoring_elements": "0.85655", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02616", "scoring_system": "epss", "scoring_elements": "0.85651", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02616", "scoring_system": "epss", "scoring_elements": "0.85673", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02616", "scoring_system": "epss", "scoring_elements": "0.85589", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02616", "scoring_system": "epss", "scoring_elements": "0.85607", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02616", "scoring_system": "epss", "scoring_elements": "0.85613", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02616", "scoring_system": "epss", "scoring_elements": "0.85632", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02616", "scoring_system": "epss", "scoring_elements": "0.85644", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16881" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16881", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16881" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16881", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16881" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00028.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00028.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1658366", "reference_id": "1658366", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1658366" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_manager:4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:virtualization_manager:4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_manager:4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16881", "reference_id": "CVE-2018-16881", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16881" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2110", "reference_id": "RHSA-2019:2110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2437", "reference_id": "RHSA-2019:2437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2437" }, { "reference_url": "https://usn.ubuntu.com/5419-1/", "reference_id": "USN-5419-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5419-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938034?format=api", "purl": "pkg:deb/debian/rsyslog@8.27.0-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.27.0-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938023?format=api", "purl": "pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2102.0-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938021?format=api", "purl": "pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2302.0-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938026?format=api", "purl": "pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2504.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938024?format=api", "purl": "pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938025?format=api", "purl": "pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2602.0-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-16881" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g5b3-53m2-yug1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87480?format=api", "vulnerability_id": "VCID-gg4f-gzty-y7e1", "summary": "rsyslog: Memory leak when $RepeatedMsgReduction turned on", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1488.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1488.json" }, { "reference_url": "https://access.redhat.com/security/cve/cve-2011-1488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/security/cve/cve-2011-1488" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1488", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36029", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36043", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.35933", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36124", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36154", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.3599", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36039", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36062", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36069", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.3603", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36004", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1488" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1488" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1488" }, { "reference_url": "https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a" }, { "reference_url": "https://security-tracker.debian.org/tracker/CVE-2011-1488", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security-tracker.debian.org/tracker/CVE-2011-1488" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=694122", "reference_id": "694122", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694122" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1488", "reference_id": "CVE-2011-1488", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1488" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938027?format=api", "purl": "pkg:deb/debian/rsyslog@5.7.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@5.7.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938023?format=api", "purl": "pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2102.0-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938021?format=api", "purl": "pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2302.0-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938026?format=api", "purl": "pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2504.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938024?format=api", "purl": "pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938025?format=api", "purl": "pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2602.0-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-1488" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gg4f-gzty-y7e1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90750?format=api", "vulnerability_id": "VCID-mz5a-qa1x-cbez", "summary": "rsyslog: $AllowedSender restriction not honoured", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5617.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5617.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5617", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60067", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59896", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59974", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59999", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59969", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60019", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60032", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60053", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60038", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60021", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.6006", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5617" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5617", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5617" }, { "reference_url": "http://secunia.com/advisories/32857", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32857" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47080", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47080" }, { "reference_url": "http://www.rsyslog.com/Article322.phtml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.rsyslog.com/Article322.phtml" }, { "reference_url": "http://www.rsyslog.com/Article327.phtml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.rsyslog.com/Article327.phtml" }, { "reference_url": "http://www.rsyslog.com/Topic4.phtml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.rsyslog.com/Topic4.phtml" }, { "reference_url": "http://www.securityfocus.com/bid/32630", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32630" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=476647", "reference_id": "476647", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=476647" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508027", "reference_id": "508027", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508027" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.12.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.12.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.13.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.13.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.13.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.15.1:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.15.1:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.15.1:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.17.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.17.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.4:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.17.4:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.4:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.5:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.17.5:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.17.5:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.19.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.19.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.19.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.19.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.19.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.19.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.19.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.19.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.19.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.19.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.19.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.19.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.19.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.19.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.20.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.20.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.20.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5617", "reference_id": "CVE-2008-5617", "reference_type": "", "scores": [ { "value": "8.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5617" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938022?format=api", "purl": "pkg:deb/debian/rsyslog@3.18.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@3.18.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938023?format=api", "purl": "pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2102.0-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938021?format=api", "purl": "pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2302.0-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938026?format=api", "purl": "pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2504.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938024?format=api", "purl": "pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938025?format=api", "purl": "pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2602.0-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-5617" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mz5a-qa1x-cbez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87481?format=api", "vulnerability_id": "VCID-pgy6-vbk7-hkg8", "summary": "rsyslog: Memory leak when multiple rulesets used", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00005.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1489.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1489.json" }, { "reference_url": "https://access.redhat.com/security/cve/cve-2011-1489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/security/cve/cve-2011-1489" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1489", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36029", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36043", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.35933", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36124", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36154", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.3599", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36039", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36062", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36069", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.3603", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36004", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1489" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1489" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1489" }, { "reference_url": "https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/rsyslog/rsyslog/commit/1ef709cc97d54f74d3fdeb83788cc4b01f4c6a2a" }, { "reference_url": "https://security-tracker.debian.org/tracker/CVE-2011-1489", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security-tracker.debian.org/tracker/CVE-2011-1489" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=694126", "reference_id": "694126", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694126" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1489", "reference_id": "CVE-2011-1489", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1489" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938027?format=api", "purl": "pkg:deb/debian/rsyslog@5.7.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@5.7.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938023?format=api", "purl": "pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2102.0-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938021?format=api", "purl": "pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2302.0-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938026?format=api", "purl": "pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2504.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938024?format=api", "purl": "pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938025?format=api", "purl": "pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2602.0-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-1489" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pgy6-vbk7-hkg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82035?format=api", "vulnerability_id": "VCID-qh6a-u11q-g3gp", "summary": "rsyslog: heap-based overflow in contrib/pmaixforwardedfrom/pmaixforwardedfrom.c", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17041.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17041.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17041", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01796", "scoring_system": "epss", "scoring_elements": "0.82703", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01796", "scoring_system": "epss", "scoring_elements": "0.82806", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01796", "scoring_system": "epss", "scoring_elements": "0.82772", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01796", "scoring_system": "epss", "scoring_elements": "0.82768", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01796", "scoring_system": "epss", "scoring_elements": "0.82807", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01796", "scoring_system": "epss", "scoring_elements": "0.8272", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01796", "scoring_system": "epss", "scoring_elements": "0.82732", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01796", "scoring_system": "epss", "scoring_elements": "0.82729", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01796", "scoring_system": "epss", "scoring_elements": "0.82755", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01796", "scoring_system": "epss", "scoring_elements": "0.82762", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01796", "scoring_system": "epss", "scoring_elements": "0.82778", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17041" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog" }, { "reference_url": "https://github.com/rsyslog/rsyslog/pull/3884", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/rsyslog/rsyslog/pull/3884" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766693", "reference_id": "1766693", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766693" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942067", "reference_id": "942067", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942067" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1908.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.1908.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1908.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17041", "reference_id": "CVE-2019-17041", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17041" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1000", "reference_id": "RHSA-2020:1000", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1000" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1702", "reference_id": "RHSA-2020:1702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1702" }, { "reference_url": "https://usn.ubuntu.com/5419-1/", "reference_id": "USN-5419-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5419-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938035?format=api", "purl": "pkg:deb/debian/rsyslog@8.1910.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.1910.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938023?format=api", "purl": "pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2102.0-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938021?format=api", "purl": "pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2302.0-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938026?format=api", "purl": "pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2504.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938024?format=api", "purl": "pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938025?format=api", "purl": "pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2602.0-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-17041" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qh6a-u11q-g3gp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82030?format=api", "vulnerability_id": "VCID-s9gb-bjme-gkaf", "summary": "rsyslog: heap-based overflow in contrib/pmcisconames/pmcisconames.c", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00031.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00032.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17042.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17042.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17042", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65369", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65497", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65476", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65448", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65486", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65417", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65444", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65407", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.6546", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.65471", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00487", "scoring_system": "epss", "scoring_elements": "0.6549", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-17042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17042" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/rsyslog/rsyslog/blob/v8-stable/ChangeLog" }, { "reference_url": "https://github.com/rsyslog/rsyslog/pull/3883", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/rsyslog/rsyslog/pull/3883" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00030.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPNCHI7X2IEXRH6RYD6IDPR4PLB5RPC7/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6SUQE25RD37CD24BHKUWMG27U5RQ2FU/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766700", "reference_id": "1766700", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1766700" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942065", "reference_id": "942065", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942065" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1908.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:8.1908.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:8.1908.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17042", "reference_id": "CVE-2019-17042", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17042" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1000", "reference_id": "RHSA-2020:1000", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1000" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1702", "reference_id": "RHSA-2020:1702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1702" }, { "reference_url": "https://usn.ubuntu.com/5419-1/", "reference_id": "USN-5419-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5419-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938035?format=api", "purl": "pkg:deb/debian/rsyslog@8.1910.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.1910.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938023?format=api", "purl": "pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2102.0-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938021?format=api", "purl": "pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2302.0-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938026?format=api", "purl": "pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2504.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938024?format=api", "purl": "pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938025?format=api", "purl": "pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2602.0-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-17042" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s9gb-bjme-gkaf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86634?format=api", "vulnerability_id": "VCID-t4ks-qfwj-s7bt", "summary": "rsyslog: double free flaw in ElasticSearch plugin", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4758.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4758.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4758", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01216", "scoring_system": "epss", "scoring_elements": "0.78982", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01216", "scoring_system": "epss", "scoring_elements": "0.78989", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01216", "scoring_system": "epss", "scoring_elements": "0.79015", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01216", "scoring_system": "epss", "scoring_elements": "0.78999", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01216", "scoring_system": "epss", "scoring_elements": "0.79024", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01216", "scoring_system": "epss", "scoring_elements": "0.7903", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01216", "scoring_system": "epss", "scoring_elements": "0.79054", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01216", "scoring_system": "epss", "scoring_elements": "0.79039", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01216", "scoring_system": "epss", "scoring_elements": "0.79029", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01216", "scoring_system": "epss", "scoring_elements": "0.79057", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4758" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=981719", "reference_id": "981719", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=981719" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938030?format=api", "purl": "pkg:deb/debian/rsyslog@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938023?format=api", "purl": "pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2102.0-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938021?format=api", "purl": "pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2302.0-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938026?format=api", "purl": "pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2504.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938024?format=api", "purl": "pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938025?format=api", "purl": "pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2602.0-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-4758" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t4ks-qfwj-s7bt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88286?format=api", "vulnerability_id": "VCID-vzk8-xf4w-y3gm", "summary": "rsyslog: DoS in the imupd plugin by emitting messages when a non-permitted sender tried to send a message to it", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5618.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5618.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5618", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64789", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64663", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64715", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64743", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64701", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64749", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64763", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64781", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64769", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64741", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00474", "scoring_system": "epss", "scoring_elements": "0.64779", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5618" }, { "reference_url": "http://www.rsyslog.com/Topic4.phtml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.rsyslog.com/Topic4.phtml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=476564", "reference_id": "476564", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=476564" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510906", "reference_id": "510906", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510906" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.20.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:3.20.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:3.20.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rsyslog:rsyslog:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5618", "reference_id": "CVE-2008-5618", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5618" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938022?format=api", "purl": "pkg:deb/debian/rsyslog@3.18.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@3.18.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938023?format=api", "purl": "pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2102.0-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938021?format=api", "purl": "pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2302.0-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938026?format=api", "purl": "pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2504.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938024?format=api", "purl": "pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938025?format=api", "purl": "pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2602.0-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-5618" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vzk8-xf4w-y3gm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59433?format=api", "vulnerability_id": "VCID-ybfq-unp3-dbav", "summary": "A vulnerability has been discovered in rsyslog, which could possibly lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24903.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24903.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24903", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66054", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66034", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.66004", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00501", "scoring_system": "epss", "scoring_elements": "0.6604", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00781", "scoring_system": "epss", "scoring_elements": "0.73676", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00781", "scoring_system": "epss", "scoring_elements": "0.73718", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00781", "scoring_system": "epss", "scoring_elements": "0.73697", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00781", "scoring_system": "epss", "scoring_elements": "0.73683", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00781", "scoring_system": "epss", "scoring_elements": "0.73648", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00781", "scoring_system": "epss", "scoring_elements": "0.73652", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24903" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24903", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24903" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010619", "reference_id": "1010619", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010619" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081353", "reference_id": "2081353", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081353" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5150", "reference_id": "dsa-5150", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:53:40Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5150" }, { "reference_url": "https://github.com/rsyslog/rsyslog/commit/f211042ecbb472f9d8beb4678a65d272b6f07705", "reference_id": "f211042ecbb472f9d8beb4678a65d272b6f07705", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:53:40Z/" } ], "url": "https://github.com/rsyslog/rsyslog/commit/f211042ecbb472f9d8beb4678a65d272b6f07705" }, { "reference_url": "https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8", "reference_id": "GHSA-ggw7-xr6h-mmr8", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:53:40Z/" } ], "url": "https://github.com/rsyslog/rsyslog/security/advisories/GHSA-ggw7-xr6h-mmr8" }, { "reference_url": "https://security.gentoo.org/glsa/202408-28", "reference_id": "GLSA-202408-28", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202408-28" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMNNXLCU2UORRVSZO24HL4KMVPK5PHVW/", "reference_id": "GMNNXLCU2UORRVSZO24HL4KMVPK5PHVW", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:53:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMNNXLCU2UORRVSZO24HL4KMVPK5PHVW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20221111-0002/", "reference_id": "ntap-20221111-0002", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T15:53:40Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20221111-0002/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4795", "reference_id": "RHSA-2022:4795", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4795" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4799", "reference_id": "RHSA-2022:4799", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4799" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4800", "reference_id": "RHSA-2022:4800", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4800" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4801", "reference_id": "RHSA-2022:4801", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4801" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4802", "reference_id": "RHSA-2022:4802", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4802" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4803", "reference_id": "RHSA-2022:4803", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4803" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4808", "reference_id": "RHSA-2022:4808", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4808" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4896", "reference_id": "RHSA-2022:4896", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4896" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5439", "reference_id": "RHSA-2022:5439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5439" }, { "reference_url": "https://usn.ubuntu.com/5404-1/", "reference_id": "USN-5404-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5404-1/" }, { "reference_url": "https://usn.ubuntu.com/5404-2/", "reference_id": "USN-5404-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5404-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/938023?format=api", "purl": "pkg:deb/debian/rsyslog@8.2102.0-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2102.0-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938036?format=api", "purl": "pkg:deb/debian/rsyslog@8.2204.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2204.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938021?format=api", "purl": "pkg:deb/debian/rsyslog@8.2302.0-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2302.0-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938026?format=api", "purl": "pkg:deb/debian/rsyslog@8.2504.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2504.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938024?format=api", "purl": "pkg:deb/debian/rsyslog@8.2512.0-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/938025?format=api", "purl": "pkg:deb/debian/rsyslog@8.2602.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2602.0-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-24903" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ybfq-unp3-dbav" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsyslog@8.2512.0-3%3Fdistro=trixie" }