Логотип exploitDog
bind:CVE-2026-1225
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-1225

Количество 5

Количество 5

ubuntu логотип

CVE-2026-1225

18 дней назад

ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.

EPSS: Низкий
nvd логотип

CVE-2026-1225

18 дней назад

ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.

EPSS: Низкий
debian логотип

CVE-2026-1225

18 дней назад

ACE vulnerability in configuration file processing by QOS.CH logback- ...

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0361-1

7 дней назад

Security update for logback

EPSS: Низкий
github логотип

GHSA-qqpg-mvqg-649v

18 дней назад

Logback allows an attacker to instantiate classes already present on the class path

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2026-1225

ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.

0%
Низкий
18 дней назад
nvd логотип
CVE-2026-1225

ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.

0%
Низкий
18 дней назад
debian логотип
CVE-2026-1225

ACE vulnerability in configuration file processing by QOS.CH logback- ...

0%
Низкий
18 дней назад
suse-cvrf логотип
SUSE-SU-2026:0361-1

Security update for logback

0%
Низкий
7 дней назад
github логотип
GHSA-qqpg-mvqg-649v

Logback allows an attacker to instantiate classes already present on the class path

0%
Низкий
18 дней назад

Уязвимостей на страницу