Total vulnerabilities in the database
In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
Software | From | Fixed in |
---|---|---|
qos / logback | 1.3.0-alpha6 | 1.3.0-alpha6.x |
qos / logback | 1.3.0-alpha7 | 1.3.0-alpha7.x |
qos / logback | 1.3.0-alpha8 | 1.3.0-alpha8.x |
qos / logback | 1.3.0-alpha9 | 1.3.0-alpha9.x |
qos / logback | 1.3.0-alpha10 | 1.3.0-alpha10.x |
qos / logback | - | 1.2.7.x |
qos / logback | 1.3.0-alpha0 | 1.3.0-alpha0.x |
qos / logback | 1.3.0-alpha1 | 1.3.0-alpha1.x |
qos / logback | 1.3.0-alpha2 | 1.3.0-alpha2.x |
qos / logback | 1.3.0-alpha3 | 1.3.0-alpha3.x |
qos / logback | 1.3.0-alpha4 | 1.3.0-alpha4.x |
qos / logback | 1.3.0-alpha5 | 1.3.0-alpha5.x |
redhat / satellite | 6.0 | 6.0.x |
siemens / sinec_nms | - | 1.0.3 |
![]() |
- | 1.2.9 |