Логотип exploitDog
bind:CVE-2026-1225
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-1225

Количество 6

Количество 6

ubuntu логотип

CVE-2026-1225

2 месяца назад

ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.

EPSS: Низкий
redhat логотип

CVE-2026-1225

2 месяца назад

ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.

CVSS3: 5
EPSS: Низкий
nvd логотип

CVE-2026-1225

2 месяца назад

ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.

EPSS: Низкий
debian логотип

CVE-2026-1225

2 месяца назад

ACE vulnerability in configuration file processing by QOS.CH logback- ...

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0361-1

около 2 месяцев назад

Security update for logback

EPSS: Низкий
github логотип

GHSA-qqpg-mvqg-649v

2 месяца назад

Logback allows an attacker to instantiate classes already present on the class path

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2026-1225

ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.

0%
Низкий
2 месяца назад
redhat логотип
CVE-2026-1225

ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.

CVSS3: 5
0%
Низкий
2 месяца назад
nvd логотип
CVE-2026-1225

ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file. The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.

0%
Низкий
2 месяца назад
debian логотип
CVE-2026-1225

ACE vulnerability in configuration file processing by QOS.CH logback- ...

0%
Низкий
2 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0361-1

Security update for logback

0%
Низкий
около 2 месяцев назад
github логотип
GHSA-qqpg-mvqg-649v

Logback allows an attacker to instantiate classes already present on the class path

0%
Низкий
2 месяца назад

Уязвимостей на страницу