Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/logback@1:1.2.11-3?distro=trixie
Typedeb
Namespacedebian
Namelogback
Version1:1.2.11-3
Qualifiers
distro trixie
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1:1.2.11-5
Latest_non_vulnerable_version1:1.2.11-6
Affected_by_vulnerabilities
0
url VCID-kfd6-e5jj-fkht
vulnerability_id VCID-kfd6-e5jj-fkht
summary
logback serialization vulnerability
A serialization vulnerability in logback receiver component part of logback allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.

This is only exploitable if logback receiver component is deployed. See https://logback.qos.ch/manual/receivers.html
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6378.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6378.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6378
reference_id
reference_type
scores
0
value 0.00613
scoring_system epss
scoring_elements 0.69881
published_at 2026-04-18T12:55:00Z
1
value 0.00613
scoring_system epss
scoring_elements 0.69871
published_at 2026-04-16T12:55:00Z
2
value 0.00613
scoring_system epss
scoring_elements 0.69829
published_at 2026-04-13T12:55:00Z
3
value 0.00613
scoring_system epss
scoring_elements 0.69844
published_at 2026-04-12T12:55:00Z
4
value 0.00613
scoring_system epss
scoring_elements 0.69858
published_at 2026-04-11T12:55:00Z
5
value 0.00613
scoring_system epss
scoring_elements 0.69796
published_at 2026-04-04T12:55:00Z
6
value 0.00613
scoring_system epss
scoring_elements 0.6978
published_at 2026-04-02T12:55:00Z
7
value 0.00613
scoring_system epss
scoring_elements 0.69835
published_at 2026-04-09T12:55:00Z
8
value 0.00613
scoring_system epss
scoring_elements 0.6982
published_at 2026-04-08T12:55:00Z
9
value 0.00613
scoring_system epss
scoring_elements 0.69772
published_at 2026-04-07T12:55:00Z
10
value 0.0063
scoring_system epss
scoring_elements 0.70312
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6378
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6378
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6378
3
reference_url https://github.com/qos-ch/logback
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback
4
reference_url https://github.com/qos-ch/logback/commit/9c782b45be4abdafb7e17481e24e7354c2acd1eb
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback/commit/9c782b45be4abdafb7e17481e24e7354c2acd1eb
5
reference_url https://github.com/qos-ch/logback/commit/b8eac23a9de9e05fb6d51160b3f46acd91af9731
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback/commit/b8eac23a9de9e05fb6d51160b3f46acd91af9731
6
reference_url https://github.com/qos-ch/logback/commit/bb095154be011267b64e37a1d401546e7cc2b7c3
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback/commit/bb095154be011267b64e37a1d401546e7cc2b7c3
7
reference_url https://github.com/qos-ch/logback/issues/745#issuecomment-1836227158
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback/issues/745#issuecomment-1836227158
8
reference_url https://logback.qos.ch/manual/receivers.html
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://logback.qos.ch/manual/receivers.html
9
reference_url https://logback.qos.ch/news.html#1.2.13
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://logback.qos.ch/news.html#1.2.13
10
reference_url https://logback.qos.ch/news.html#1.3.12
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T17:51:31Z/
url https://logback.qos.ch/news.html#1.3.12
11
reference_url https://security.netapp.com/advisory/ntap-20241129-0012
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20241129-0012
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057423
reference_id 1057423
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057423
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2252230
reference_id 2252230
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2252230
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-6378
reference_id CVE-2023-6378
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-6378
15
reference_url https://github.com/advisories/GHSA-vmq6-5m68-f53m
reference_id GHSA-vmq6-5m68-f53m
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vmq6-5m68-f53m
16
reference_url https://access.redhat.com/errata/RHSA-2024:0793
reference_id RHSA-2024:0793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0793
17
reference_url https://access.redhat.com/errata/RHSA-2024:4631
reference_id RHSA-2024:4631
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:4631
18
reference_url https://usn.ubuntu.com/7616-1/
reference_id USN-7616-1
reference_type
scores
url https://usn.ubuntu.com/7616-1/
fixed_packages
0
url pkg:deb/debian/logback@1:1.2.11-5?distro=trixie
purl pkg:deb/debian/logback@1:1.2.11-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/logback@1:1.2.11-5%3Fdistro=trixie
1
url pkg:deb/debian/logback@1:1.2.11-6?distro=trixie
purl pkg:deb/debian/logback@1:1.2.11-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/logback@1:1.2.11-6%3Fdistro=trixie
aliases CVE-2023-6378, GHSA-vmq6-5m68-f53m
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kfd6-e5jj-fkht
Fixing_vulnerabilities
0
url VCID-24ma-xwcb-uud9
vulnerability_id VCID-24ma-xwcb-uud9
summary
QOS.CH logback-core is vulnerable to Arbitrary Code Execution through file processing
QOS.CH logback-core versions up to 1.5.18 contain an ACE vulnerability in conditional configuration file processing in Java applications. This vulnerability allows an attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting a malicious environment variable before program execution.

A successful attack requires the Janino library and Spring Framework to be present on the user's class path. Additionally, the attacker must have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privileges.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11226.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-11226.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-11226
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18024
published_at 2026-04-21T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.17994
published_at 2026-04-18T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.17983
published_at 2026-04-16T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.1804
published_at 2026-04-13T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18089
published_at 2026-04-12T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18133
published_at 2026-04-11T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18126
published_at 2026-04-09T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18064
published_at 2026-04-08T12:55:00Z
8
value 0.00058
scoring_system epss
scoring_elements 0.17979
published_at 2026-04-07T12:55:00Z
9
value 0.00058
scoring_system epss
scoring_elements 0.18277
published_at 2026-04-04T12:55:00Z
10
value 0.00058
scoring_system epss
scoring_elements 0.18224
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-11226
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/qos-ch/logback
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback
4
reference_url https://github.com/qos-ch/logback/commit/61f6a2544f36b3016e0efd434ee21f19269f1df7
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback/commit/61f6a2544f36b3016e0efd434ee21f19269f1df7
5
reference_url https://github.com/qos-ch/logback/issues/974
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback/issues/974
6
reference_url https://github.com/qos-ch/logback/releases/tag/v_1.5.19
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback/releases/tag/v_1.5.19
7
reference_url https://logback.qos.ch/news.html#1.3.16
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L/AU:N/RE:M/U:Green
1
value 5.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T13:14:51Z/
url https://logback.qos.ch/news.html#1.3.16
8
reference_url https://logback.qos.ch/news.html#1.5.19
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L/AU:N/RE:M/U:Green
1
value 5.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-10-01T13:14:51Z/
url https://logback.qos.ch/news.html#1.5.19
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2400602
reference_id 2400602
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2400602
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-11226
reference_id CVE-2025-11226
reference_type
scores
0
value 5.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2025-11226
11
reference_url https://github.com/advisories/GHSA-25qh-j22f-pwp8
reference_id GHSA-25qh-j22f-pwp8
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-25qh-j22f-pwp8
fixed_packages
0
url pkg:deb/debian/logback@0?distro=trixie
purl pkg:deb/debian/logback@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/logback@0%3Fdistro=trixie
1
url pkg:deb/debian/logback@1:1.2.3-6?distro=trixie
purl pkg:deb/debian/logback@1:1.2.3-6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6f98-j1tr-zfcm
1
vulnerability VCID-kfd6-e5jj-fkht
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/logback@1:1.2.3-6%3Fdistro=trixie
2
url pkg:deb/debian/logback@1:1.2.11-3?distro=trixie
purl pkg:deb/debian/logback@1:1.2.11-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-kfd6-e5jj-fkht
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/logback@1:1.2.11-3%3Fdistro=trixie
3
url pkg:deb/debian/logback@1:1.2.11-6?distro=trixie
purl pkg:deb/debian/logback@1:1.2.11-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/logback@1:1.2.11-6%3Fdistro=trixie
aliases CVE-2025-11226, GHSA-25qh-j22f-pwp8
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-24ma-xwcb-uud9
1
url VCID-2y5d-qg7z-2kdg
vulnerability_id VCID-2y5d-qg7z-2kdg
summary QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components.
references
0
reference_url https://access.redhat.com/errata/RHSA-2017:1675
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:1675
1
reference_url https://access.redhat.com/errata/RHSA-2017:1676
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:1676
2
reference_url https://access.redhat.com/errata/RHSA-2017:1832
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:1832
3
reference_url https://access.redhat.com/errata/RHSA-2018:2927
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2018:2927
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5929.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5929.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5929
reference_id
reference_type
scores
0
value 0.10144
scoring_system epss
scoring_elements 0.93098
published_at 2026-04-09T12:55:00Z
1
value 0.10144
scoring_system epss
scoring_elements 0.93093
published_at 2026-04-08T12:55:00Z
2
value 0.10144
scoring_system epss
scoring_elements 0.93085
published_at 2026-04-07T12:55:00Z
3
value 0.10144
scoring_system epss
scoring_elements 0.93086
published_at 2026-04-04T12:55:00Z
4
value 0.10144
scoring_system epss
scoring_elements 0.93083
published_at 2026-04-02T12:55:00Z
5
value 0.10144
scoring_system epss
scoring_elements 0.93073
published_at 2026-04-01T12:55:00Z
6
value 0.10144
scoring_system epss
scoring_elements 0.93128
published_at 2026-04-21T12:55:00Z
7
value 0.10144
scoring_system epss
scoring_elements 0.93118
published_at 2026-04-16T12:55:00Z
8
value 0.10144
scoring_system epss
scoring_elements 0.93122
published_at 2026-04-18T12:55:00Z
9
value 0.10144
scoring_system epss
scoring_elements 0.93103
published_at 2026-04-11T12:55:00Z
10
value 0.10144
scoring_system epss
scoring_elements 0.931
published_at 2026-04-12T12:55:00Z
11
value 0.10144
scoring_system epss
scoring_elements 0.93102
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5929
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5929
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5929
7
reference_url https://github.com/qos-ch/logback
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback
8
reference_url https://github.com/qos-ch/logback/commit/f46044b805bca91efe5fd6afe52257cd02f775f8
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback/commit/f46044b805bca91efe5fd6afe52257cd02f775f8
9
reference_url https://lists.apache.org/thread.html/18d509024d9aeb07f0e9579066f80bf5d4dcf20467b0c240043890d1@%3Ccommits.cassandra.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/18d509024d9aeb07f0e9579066f80bf5d4dcf20467b0c240043890d1@%3Ccommits.cassandra.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/a6db61616180d73711d6db25703085940026e2dbc40f153f9d22b203@%3Ccommits.cassandra.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/a6db61616180d73711d6db25703085940026e2dbc40f153f9d22b203@%3Ccommits.cassandra.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/fa4eaaa6ff41ac6f79811e053c152ee89b7c5da8a6ac848ae97df67f@%3Ccommits.cassandra.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/fa4eaaa6ff41ac6f79811e053c152ee89b7c5da8a6ac848ae97df67f@%3Ccommits.cassandra.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r0bb19330e48d5ad784fa20dacba9e5538d8d60f5cd9142e0f1432b4b@%3Ccommits.cassandra.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r0bb19330e48d5ad784fa20dacba9e5538d8d60f5cd9142e0f1432b4b@%3Ccommits.cassandra.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r2a08573ddee4a86dc96d469485a5843a01710ee0dc2078dfca410c79@%3Ccommits.cassandra.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r2a08573ddee4a86dc96d469485a5843a01710ee0dc2078dfca410c79@%3Ccommits.cassandra.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/r2c2d57ca180e8173c90fe313ddf8eabbdcf8e3ae196f8b9f42599790@%3Ccommits.mnemonic.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r2c2d57ca180e8173c90fe313ddf8eabbdcf8e3ae196f8b9f42599790@%3Ccommits.mnemonic.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/r397bf63783240fbb5713389d3f889d287ae0c11509006700ac720037@%3Ccommits.cassandra.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r397bf63783240fbb5713389d3f889d287ae0c11509006700ac720037@%3Ccommits.cassandra.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/r4673642893562c58cbee60c151ded6c077e8a2d02296e862224a9161@%3Ccommits.cassandra.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r4673642893562c58cbee60c151ded6c077e8a2d02296e862224a9161@%3Ccommits.cassandra.apache.org%3E
17
reference_url https://lists.apache.org/thread.html/r632ec30791b441e2eb5a3129532bf1b689bf181d0ef7daf50bcf0fd6@%3Ccommits.cassandra.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r632ec30791b441e2eb5a3129532bf1b689bf181d0ef7daf50bcf0fd6@%3Ccommits.cassandra.apache.org%3E
18
reference_url https://lists.apache.org/thread.html/r718f27bed898008a8e037d9cc848cfc1df4d18abcbaee0cb0c142cfb@%3Ccommits.cassandra.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r718f27bed898008a8e037d9cc848cfc1df4d18abcbaee0cb0c142cfb@%3Ccommits.cassandra.apache.org%3E
19
reference_url https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770181158b4246976ed8295c9@%3Cdev.brooklyn.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770181158b4246976ed8295c9@%3Cdev.brooklyn.apache.org%3E
20
reference_url https://lists.apache.org/thread.html/ra007cec726a3927c918ec94c4316d05d1829c49eae8dc3648adc35e2@%3Ccommits.cassandra.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/ra007cec726a3927c918ec94c4316d05d1829c49eae8dc3648adc35e2@%3Ccommits.cassandra.apache.org%3E
21
reference_url https://lists.apache.org/thread.html/rbb4dfca2f7e3e8f3570eec21c79832d33a51dfde6762725660b60169@%3Cdev.mnemonic.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rbb4dfca2f7e3e8f3570eec21c79832d33a51dfde6762725660b60169@%3Cdev.mnemonic.apache.org%3E
22
reference_url https://lists.apache.org/thread.html/rc5f0cc2f3b153bdf15ee7389d78585829abc9c7af4d322ba1085dd3e@%3Ccommits.cassandra.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rc5f0cc2f3b153bdf15ee7389d78585829abc9c7af4d322ba1085dd3e@%3Ccommits.cassandra.apache.org%3E
23
reference_url https://lists.apache.org/thread.html/rd2227af3c9ada2a72dc72ed05517f5857a34d487580e1f2803922ff9@%3Ccommits.cassandra.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/rd2227af3c9ada2a72dc72ed05517f5857a34d487580e1f2803922ff9@%3Ccommits.cassandra.apache.org%3E
24
reference_url https://lists.apache.org/thread.html/re9b787727291786dfe088e3cd078c7d195c0b5781e15d3cd24a3b2fc@%3Cdev.mnemonic.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/re9b787727291786dfe088e3cd078c7d195c0b5781e15d3cd24a3b2fc@%3Cdev.mnemonic.apache.org%3E
25
reference_url https://logback.qos.ch/news.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://logback.qos.ch/news.html
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5929
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-5929
27
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1432858
reference_id 1432858
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1432858
28
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857343
reference_id 857343
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857343
29
reference_url http://www.cvedetails.com/cve/CVE-2017-5929/
reference_id CVE-2017-5929
reference_type
scores
url http://www.cvedetails.com/cve/CVE-2017-5929/
30
reference_url https://github.com/advisories/GHSA-vmfg-rjjm-rjrj
reference_id GHSA-vmfg-rjjm-rjrj
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vmfg-rjjm-rjrj
31
reference_url https://access.redhat.com/errata/RHSA-2020:0983
reference_id RHSA-2020:0983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0983
fixed_packages
0
url pkg:deb/debian/logback@1:1.1.9-3?distro=trixie
purl pkg:deb/debian/logback@1:1.1.9-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/logback@1:1.1.9-3%3Fdistro=trixie
1
url pkg:deb/debian/logback@1:1.2.3-6?distro=trixie
purl pkg:deb/debian/logback@1:1.2.3-6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6f98-j1tr-zfcm
1
vulnerability VCID-kfd6-e5jj-fkht
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/logback@1:1.2.3-6%3Fdistro=trixie
2
url pkg:deb/debian/logback@1:1.2.11-3?distro=trixie
purl pkg:deb/debian/logback@1:1.2.11-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-kfd6-e5jj-fkht
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/logback@1:1.2.11-3%3Fdistro=trixie
3
url pkg:deb/debian/logback@1:1.2.11-6?distro=trixie
purl pkg:deb/debian/logback@1:1.2.11-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/logback@1:1.2.11-6%3Fdistro=trixie
aliases CVE-2017-5929, GHSA-vmfg-rjjm-rjrj
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2y5d-qg7z-2kdg
2
url VCID-6f98-j1tr-zfcm
vulnerability_id VCID-6f98-j1tr-zfcm
summary
Deserialization of Untrusted Data
In logback version 1.2.9 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
references
0
reference_url http://logback.qos.ch/news.html
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://logback.qos.ch/news.html
1
reference_url http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://packetstormsecurity.com/files/167794/Open-Xchange-App-Suite-7.10.x-Cross-Site-Scripting-Command-Injection.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42550.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42550.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42550
reference_id
reference_type
scores
0
value 0.02729
scoring_system epss
scoring_elements 0.85963
published_at 2026-04-21T12:55:00Z
1
value 0.02729
scoring_system epss
scoring_elements 0.85885
published_at 2026-04-01T12:55:00Z
2
value 0.02729
scoring_system epss
scoring_elements 0.85896
published_at 2026-04-02T12:55:00Z
3
value 0.02729
scoring_system epss
scoring_elements 0.85912
published_at 2026-04-04T12:55:00Z
4
value 0.02729
scoring_system epss
scoring_elements 0.85914
published_at 2026-04-07T12:55:00Z
5
value 0.02729
scoring_system epss
scoring_elements 0.85933
published_at 2026-04-08T12:55:00Z
6
value 0.02729
scoring_system epss
scoring_elements 0.85943
published_at 2026-04-09T12:55:00Z
7
value 0.02729
scoring_system epss
scoring_elements 0.85958
published_at 2026-04-11T12:55:00Z
8
value 0.02729
scoring_system epss
scoring_elements 0.85956
published_at 2026-04-12T12:55:00Z
9
value 0.02729
scoring_system epss
scoring_elements 0.85951
published_at 2026-04-13T12:55:00Z
10
value 0.02729
scoring_system epss
scoring_elements 0.85969
published_at 2026-04-16T12:55:00Z
11
value 0.02729
scoring_system epss
scoring_elements 0.85972
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42550
4
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-371761.pdf
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://cert-portal.siemens.com/productcert/pdf/ssa-371761.pdf
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42550
6
reference_url http://seclists.org/fulldisclosure/2022/Jul/11
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2022/Jul/11
7
reference_url https://github.com/cn-panda/logbackRceDemo
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/cn-panda/logbackRceDemo
8
reference_url https://github.com/qos-ch/logback
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback
9
reference_url https://github.com/qos-ch/logback/blob/1502cba4c1dfd135b2e715bc0cf80c0045d4d128/logback-site/src/site/pages/news.html
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback/blob/1502cba4c1dfd135b2e715bc0cf80c0045d4d128/logback-site/src/site/pages/news.html
10
reference_url https://github.com/qos-ch/logback/commit/87291079a1de9369ac67e20dc70a8fdc7cc4359c
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback/commit/87291079a1de9369ac67e20dc70a8fdc7cc4359c
11
reference_url https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42
12
reference_url https://jira.qos.ch/browse/LOGBACK-1591
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://jira.qos.ch/browse/LOGBACK-1591
13
reference_url https://security.netapp.com/advisory/ntap-20211229-0001
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20211229-0001
14
reference_url https://security.netapp.com/advisory/ntap-20211229-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20211229-0001/
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2033560
reference_id 2033560
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2033560
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-42550
reference_id CVE-2021-42550
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-42550
17
reference_url https://github.com/advisories/GHSA-668q-qrv7-99fm
reference_id GHSA-668q-qrv7-99fm
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-668q-qrv7-99fm
18
reference_url https://access.redhat.com/errata/RHSA-2022:1108
reference_id RHSA-2022:1108
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1108
19
reference_url https://access.redhat.com/errata/RHSA-2022:1110
reference_id RHSA-2022:1110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1110
20
reference_url https://access.redhat.com/errata/RHSA-2022:5498
reference_id RHSA-2022:5498
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5498
21
reference_url https://access.redhat.com/errata/RHSA-2022:5532
reference_id RHSA-2022:5532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5532
22
reference_url https://usn.ubuntu.com/7616-1/
reference_id USN-7616-1
reference_type
scores
url https://usn.ubuntu.com/7616-1/
fixed_packages
0
url pkg:deb/debian/logback@1:1.2.8-1?distro=trixie
purl pkg:deb/debian/logback@1:1.2.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/logback@1:1.2.8-1%3Fdistro=trixie
1
url pkg:deb/debian/logback@1:1.2.11-3?distro=trixie
purl pkg:deb/debian/logback@1:1.2.11-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-kfd6-e5jj-fkht
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/logback@1:1.2.11-3%3Fdistro=trixie
2
url pkg:deb/debian/logback@1:1.2.11-6?distro=trixie
purl pkg:deb/debian/logback@1:1.2.11-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/logback@1:1.2.11-6%3Fdistro=trixie
aliases CVE-2021-42550, GHSA-668q-qrv7-99fm
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6f98-j1tr-zfcm
3
url VCID-khac-mqdh-hqd7
vulnerability_id VCID-khac-mqdh-hqd7
summary
Logback is vulnerable to an attacker mounting a Denial-Of-Service attack by sending poisoned data
A serialization vulnerability in logback receiver component part of 
logback version 1.4.13, 1.3.13 and 1.2.12 allows an attacker to mount a Denial-Of-Service 
attack by sending poisoned data.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6481.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6481.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6481
reference_id
reference_type
scores
0
value 0.00224
scoring_system epss
scoring_elements 0.45104
published_at 2026-04-18T12:55:00Z
1
value 0.00224
scoring_system epss
scoring_elements 0.4511
published_at 2026-04-16T12:55:00Z
2
value 0.00224
scoring_system epss
scoring_elements 0.45062
published_at 2026-04-13T12:55:00Z
3
value 0.00224
scoring_system epss
scoring_elements 0.4506
published_at 2026-04-12T12:55:00Z
4
value 0.00224
scoring_system epss
scoring_elements 0.45093
published_at 2026-04-11T12:55:00Z
5
value 0.00224
scoring_system epss
scoring_elements 0.45071
published_at 2026-04-09T12:55:00Z
6
value 0.00224
scoring_system epss
scoring_elements 0.4507
published_at 2026-04-08T12:55:00Z
7
value 0.00224
scoring_system epss
scoring_elements 0.45018
published_at 2026-04-07T12:55:00Z
8
value 0.00224
scoring_system epss
scoring_elements 0.45076
published_at 2026-04-04T12:55:00Z
9
value 0.00224
scoring_system epss
scoring_elements 0.45055
published_at 2026-04-02T12:55:00Z
10
value 0.0023
scoring_system epss
scoring_elements 0.45779
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6481
2
reference_url https://github.com/qos-ch/logback
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback
3
reference_url https://github.com/qos-ch/logback/commit/7018a3609c7bcc9dc7bf5903509901a986e5f578
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback/commit/7018a3609c7bcc9dc7bf5903509901a986e5f578
4
reference_url https://github.com/qos-ch/logback/commit/c612b2fa3caf6eef3c75f1cd5859438451d0fd6f
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/qos-ch/logback/commit/c612b2fa3caf6eef3c75f1cd5859438451d0fd6f
5
reference_url https://logback.qos.ch/news.html#1.3.12
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://logback.qos.ch/news.html#1.3.12
6
reference_url https://logback.qos.ch/news.html#1.3.14
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://logback.qos.ch/news.html#1.3.14
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2252956
reference_id 2252956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2252956
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-6481
reference_id CVE-2023-6481
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-6481
9
reference_url https://github.com/advisories/GHSA-gm62-rw4g-vrc4
reference_id GHSA-gm62-rw4g-vrc4
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-gm62-rw4g-vrc4
10
reference_url https://access.redhat.com/errata/RHSA-2024:0793
reference_id RHSA-2024:0793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0793
11
reference_url https://access.redhat.com/errata/RHSA-2024:0843
reference_id RHSA-2024:0843
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0843
fixed_packages
0
url pkg:deb/debian/logback@0?distro=trixie
purl pkg:deb/debian/logback@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/logback@0%3Fdistro=trixie
1
url pkg:deb/debian/logback@1:1.2.3-6?distro=trixie
purl pkg:deb/debian/logback@1:1.2.3-6?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6f98-j1tr-zfcm
1
vulnerability VCID-kfd6-e5jj-fkht
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/logback@1:1.2.3-6%3Fdistro=trixie
2
url pkg:deb/debian/logback@1:1.2.11-3?distro=trixie
purl pkg:deb/debian/logback@1:1.2.11-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-kfd6-e5jj-fkht
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/logback@1:1.2.11-3%3Fdistro=trixie
3
url pkg:deb/debian/logback@1:1.2.11-6?distro=trixie
purl pkg:deb/debian/logback@1:1.2.11-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/logback@1:1.2.11-6%3Fdistro=trixie
aliases CVE-2023-6481, GHSA-gm62-rw4g-vrc4
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-khac-mqdh-hqd7
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/logback@1:1.2.11-3%3Fdistro=trixie