7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.2 High
AI Score
Confidence
High
0.0005 Low
EPSS
Percentile
16.7%
A serialization vulnerability in logback receiver component part of
logback version 1.4.13,Β 1.3.13 andΒ 1.2.12 allows an attacker to mount a Denial-Of-Service
attack by sending poisoned data.
CPE | Name | Operator | Version |
---|---|---|---|
qos:logback | qos logback | eq | 1.2.12 |
qos:logback | qos logback | eq | 1.3.13 |
qos:logback | qos logback | eq | 1.4.13 |
[
{
"defaultStatus": "unaffected",
"modules": [
"logback receiver"
],
"platforms": [
"Windows",
"Linux",
"MacOS"
],
"product": "logback",
"repo": "https://github.com/qos-ch/logback",
"vendor": "QOS.CH Sarl",
"versions": [
{
"status": "unaffected",
"version": "1.4.14"
},
{
"status": "unaffected",
"version": "1.3.14"
},
{
"status": "unaffected",
"version": "1.2.13"
}
]
}
]
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.2 High
AI Score
Confidence
High
0.0005 Low
EPSS
Percentile
16.7%