gsd-2018-8088
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before 1.8.0-beta2 allows remote attackers to bypass intended access restrictions via crafted data. EventData in the slf4j-ext module in QOS.CH SLF4J, has been fixed in SLF4J versions 1.7.26 later and in the 2.0.x series.
Aliases
Aliases



{
   GSD: {
      alias: "CVE-2018-8088",
      description: "org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before 1.8.0-beta2 allows remote attackers to bypass intended access restrictions via crafted data.",
      id: "GSD-2018-8088",
      references: [
         "https://www.suse.com/security/cve/CVE-2018-8088.html",
         "https://access.redhat.com/errata/RHSA-2020:2561",
         "https://access.redhat.com/errata/RHSA-2019:3140",
         "https://access.redhat.com/errata/RHSA-2019:2413",
         "https://access.redhat.com/errata/RHSA-2018:2930",
         "https://access.redhat.com/errata/RHSA-2018:2669",
         "https://access.redhat.com/errata/RHSA-2018:2420",
         "https://access.redhat.com/errata/RHSA-2018:2419",
         "https://access.redhat.com/errata/RHSA-2018:2143",
         "https://access.redhat.com/errata/RHSA-2018:1575",
         "https://access.redhat.com/errata/RHSA-2018:1525",
         "https://access.redhat.com/errata/RHSA-2018:1451",
         "https://access.redhat.com/errata/RHSA-2018:1450",
         "https://access.redhat.com/errata/RHSA-2018:1449",
         "https://access.redhat.com/errata/RHSA-2018:1448",
         "https://access.redhat.com/errata/RHSA-2018:1447",
         "https://access.redhat.com/errata/RHSA-2018:1323",
         "https://access.redhat.com/errata/RHSA-2018:1251",
         "https://access.redhat.com/errata/RHSA-2018:1249",
         "https://access.redhat.com/errata/RHSA-2018:1248",
         "https://access.redhat.com/errata/RHSA-2018:1247",
         "https://access.redhat.com/errata/RHSA-2018:0630",
         "https://access.redhat.com/errata/RHSA-2018:0629",
         "https://access.redhat.com/errata/RHSA-2018:0628",
         "https://access.redhat.com/errata/RHSA-2018:0627",
         "https://access.redhat.com/errata/RHSA-2018:0592",
         "https://access.redhat.com/errata/RHSA-2018:0582",
         "https://linux.oracle.com/cve/CVE-2018-8088.html",
      ],
   },
   gsd: {
      metadata: {
         exploitCode: "unknown",
         remediation: "unknown",
         reportConfidence: "confirmed",
         type: "vulnerability",
      },
      osvSchema: {
         aliases: [
            "CVE-2018-8088",
         ],
         details: "org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before 1.8.0-beta2 allows remote attackers to bypass intended access restrictions via crafted data. EventData in the slf4j-ext module in QOS.CH SLF4J, has been fixed in SLF4J versions 1.7.26 later and in the 2.0.x series.",
         id: "GSD-2018-8088",
         modified: "2023-12-13T01:22:34.086437Z",
         schema_version: "1.4.0",
      },
   },
   namespaces: {
      "cve.org": {
         CVE_data_meta: {
            ASSIGNER: "cve@mitre.org",
            ID: "CVE-2018-8088",
            STATE: "PUBLIC",
         },
         affects: {
            vendor: {
               vendor_data: [
                  {
                     product: {
                        product_data: [
                           {
                              product_name: "n/a",
                              version: {
                                 version_data: [
                                    {
                                       version_value: "n/a",
                                    },
                                 ],
                              },
                           },
                        ],
                     },
                     vendor_name: "n/a",
                  },
               ],
            },
         },
         data_format: "MITRE",
         data_type: "CVE",
         data_version: "4.0",
         description: {
            description_data: [
               {
                  lang: "eng",
                  value: "org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before 1.8.0-beta2 allows remote attackers to bypass intended access restrictions via crafted data. EventData in the slf4j-ext module in QOS.CH SLF4J, has been fixed in SLF4J versions 1.7.26 later and in the 2.0.x series.",
               },
            ],
         },
         problemtype: {
            problemtype_data: [
               {
                  description: [
                     {
                        lang: "eng",
                        value: "n/a",
                     },
                  ],
               },
            ],
         },
         references: {
            reference_data: [
               {
                  name: "RHSA-2018:1448",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:1448",
               },
               {
                  name: "1040627",
                  refsource: "SECTRACK",
                  url: "http://www.securitytracker.com/id/1040627",
               },
               {
                  name: "RHSA-2018:1449",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:1449",
               },
               {
                  name: "https://jira.qos.ch/browse/SLF4J-431",
                  refsource: "MISC",
                  url: "https://jira.qos.ch/browse/SLF4J-431",
               },
               {
                  name: "RHSA-2018:1248",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:1248",
               },
               {
                  name: "RHSA-2018:1251",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:1251",
               },
               {
                  name: "RHSA-2018:2143",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:2143",
               },
               {
                  name: "RHSA-2018:1450",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:1450",
               },
               {
                  name: "RHSA-2018:2669",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:2669",
               },
               {
                  name: "RHSA-2018:1323",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:1323",
               },
               {
                  name: "RHSA-2018:2420",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:2420",
               },
               {
                  name: "RHSA-2018:0630",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:0630",
               },
               {
                  name: "RHSA-2018:1525",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:1525",
               },
               {
                  name: "RHSA-2018:1575",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:1575",
               },
               {
                  name: "RHSA-2018:1451",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:1451",
               },
               {
                  name: "RHSA-2018:0629",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:0629",
               },
               {
                  name: "RHSA-2018:0628",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:0628",
               },
               {
                  name: "RHSA-2018:0582",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:0582",
               },
               {
                  name: "103737",
                  refsource: "BID",
                  url: "http://www.securityfocus.com/bid/103737",
               },
               {
                  name: "RHSA-2018:2419",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:2419",
               },
               {
                  name: "RHSA-2018:1447",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:1447",
               },
               {
                  name: "RHSA-2018:1247",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:1247",
               },
               {
                  name: "RHSA-2018:0627",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:0627",
               },
               {
                  name: "RHSA-2018:2930",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:2930",
               },
               {
                  name: "RHSA-2018:1249",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:1249",
               },
               {
                  name: "RHSA-2018:0592",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2018:0592",
               },
               {
                  name: "[infra-devnull] 20190321 [GitHub] [tika] dadoonet opened pull request #268: Update slf4j to 1.8.0-beta4",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/956ba8e76b6793a6670b2eb0129a5e3003ce2124ca3130fd57d48d0f@%3Cdevnull.infra.apache.org%3E",
               },
               {
                  name: "[infra-devnull] 20190321 [GitHub] [tika] grossws commented on issue #268: Update slf4j to 1.8.0-beta4",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/95ce76613c869dbccf1d3d29327099ccc71aeec156f76c30853044fa@%3Cdevnull.infra.apache.org%3E",
               },
               {
                  name: "RHSA-2019:2413",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2019:2413",
               },
               {
                  name: "RHSA-2019:3140",
                  refsource: "REDHAT",
                  url: "https://access.redhat.com/errata/RHSA-2019:3140",
               },
               {
                  name: "https://www.oracle.com/security-alerts/cpujul2020.html",
                  refsource: "MISC",
                  url: "https://www.oracle.com/security-alerts/cpujul2020.html",
               },
               {
                  name: "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
                  refsource: "MISC",
                  url: "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
               },
               {
                  name: "https://jira.qos.ch/browse/SLF4J-431",
                  refsource: "MISC",
                  url: "https://jira.qos.ch/browse/SLF4J-431",
               },
               {
                  name: "https://jira.qos.ch/browse/SLF4J-430",
                  refsource: "MISC",
                  url: "https://jira.qos.ch/browse/SLF4J-430",
               },
               {
                  name: "https://github.com/qos-ch/slf4j/commit/d2b27fba88e983f921558da27fc29b5f5d269405",
                  refsource: "MISC",
                  url: "https://github.com/qos-ch/slf4j/commit/d2b27fba88e983f921558da27fc29b5f5d269405",
               },
               {
                  name: "[hadoop-common-dev] 20200824 [jira] [Created] (HADOOP-17220) Upgrade slf4j to 1.7.30 ( To Adress: CVE-2018-8088)",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/reb3eeb985afdead17fadb7c33d5d472c1015a85ea5c9b038ec77f378@%3Ccommon-dev.hadoop.apache.org%3E",
               },
               {
                  name: "[hadoop-common-issues] 20200824 [jira] [Created] (HADOOP-17220) Upgrade slf4j to 1.7.30 ( To Adress: CVE-2018-8088)",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/raabf1a00b2652575fca9fcb44166a828a0cab97a7d1594001eabc991@%3Ccommon-issues.hadoop.apache.org%3E",
               },
               {
                  name: "[hadoop-common-issues] 20200824 [jira] [Updated] (HADOOP-17220) Upgrade slf4j to 1.7.30 ( To Adress: CVE-2018-8088)",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/r767861f053c15f9e9201b939a0d508dd58475a072e76135eaaca17f0@%3Ccommon-issues.hadoop.apache.org%3E",
               },
               {
                  name: "[hadoop-common-issues] 20200824 [jira] [Commented] (HADOOP-17220) Upgrade slf4j to 1.7.30 ( To Adress: CVE-2018-8088)",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/rfe52b7cbba4dcba521e13130e5d28d5818b78d70db0af1b470fa0264@%3Ccommon-issues.hadoop.apache.org%3E",
               },
               {
                  name: "[hadoop-common-commits] 20200824 [hadoop] branch branch-3.3 updated: HADOOP-17220. Upgrade slf4j to 1.7.30 ( To Address: CVE-2018-8088). Contributed by Brahma Reddy Battula.",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/rd86db9679150e9297b5c0fcb6f0e80a8b81b54fcf423de5a914bca78@%3Ccommon-commits.hadoop.apache.org%3E",
               },
               {
                  name: "[hadoop-common-issues] 20200824 [jira] [Updated] (HADOOP-17220) Upgrade slf4j to 1.7.30 ( To Address: CVE-2018-8088)",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/r1660c72a660f0522947ca6ce329dcc74e1ee20c58bbe208472754489@%3Ccommon-issues.hadoop.apache.org%3E",
               },
               {
                  name: "[hadoop-common-commits] 20200824 [hadoop] branch trunk updated: HADOOP-17220. Upgrade slf4j to 1.7.30 ( To Address: CVE-2018-8088). Contributed by Brahma Reddy Battula.",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/re6fb6b0de9d679310437ff87fc94e39da5a14dce9c73864a41837462@%3Ccommon-commits.hadoop.apache.org%3E",
               },
               {
                  name: "[logging-notifications] 20200825 [jira] [Commented] (LOG4J2-2329) Fix dependency in log4j-slf4j-impl to slf4j due to CVE-2018-8088",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/r81711cde77c2c5742b7b8533c978e79771b700af0ef4d3149d70df25@%3Cnotifications.logging.apache.org%3E",
               },
               {
                  name: "https://www.oracle.com/security-alerts/cpuoct2020.html",
                  refsource: "MISC",
                  url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
               },
               {
                  name: "[pulsar-commits] 20201215 [GitHub] [pulsar] yanshuchong opened a new issue #8967: CVSS issue list",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E",
               },
               {
                  name: "[pulsar-commits] 20210127 [GitHub] [pulsar] GLouMcK opened a new issue #9347: Security Vulnerabilities - Black Duck Scan",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E",
               },
               {
                  name: "[iotdb-notifications] 20210325 [jira] [Created] (IOTDB-1258) jcl-over-slf4j have Security Vulnerabilities CVE-2018-8088",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/r17e7e6abc53d29c0e269153517d36f4bec2755b95900596e6df15cbe@%3Cnotifications.iotdb.apache.org%3E",
               },
               {
                  name: "[iotdb-reviews] 20210325 [GitHub] [iotdb] wangchao316 opened a new pull request #2906: [IOTDB-1258] jcl-over-slf4j have security vulnerabilities CVE-2018-8088",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/r37644f0a00aca9fbcbc21c0f9a91f927b63153ec3607be469cd515e5@%3Creviews.iotdb.apache.org%3E",
               },
               {
                  name: "[iotdb-reviews] 20210327 [GitHub] [iotdb] wangchao316 closed pull request #2906: [IOTDB-1258] jcl-over-slf4j have security vulnerabilities CVE-2018-8088",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/r2d05924f903403927a2f4e78d9b1249a42f0bd09f69a7c1954d74a42@%3Creviews.iotdb.apache.org%3E",
               },
               {
                  name: "[iotdb-reviews] 20210327 [GitHub] [iotdb] wangchao316 opened a new pull request #2906: [IOTDB-1258] jcl-over-slf4j have security vulnerabilities CVE-2018-8088",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/r48247c12cf652e95a01fc94ee5aa8641f3ec481235774790e53eb55e@%3Creviews.iotdb.apache.org%3E",
               },
               {
                  name: "[zookeeper-issues] 20210327 [jira] [Created] (ZOOKEEPER-4264) Apache Zookeeper 3.6.2 - slf4j 1.7.25 has security vulnerability CVE-2018-8088",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/r0f376559fd39cf1a53ac3afbc1fc5d62649dcac9916d4697445a94fa@%3Cissues.zookeeper.apache.org%3E",
               },
               {
                  name: "[zookeeper-issues] 20210327 [jira] [Updated] (ZOOKEEPER-4264) Apache Zookeeper 3.6.2 - slf4j 1.7.25 has security vulnerability CVE-2018-8088",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/r32be21da011479df41468a62bc09d12f0d3b4e3a71679d33cb0e8c56@%3Cissues.zookeeper.apache.org%3E",
               },
               {
                  name: "[zookeeper-dev] 20210327 [jira] [Created] (ZOOKEEPER-4264) Apache Zookeeper 3.6.2 - slf4j 1.7.25 has security vulnerability CVE-2018-8088",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/rf58e1bee31d66665437dde9acd9abed53f8483034b69fa9ca7cde09c@%3Cdev.zookeeper.apache.org%3E",
               },
               {
                  name: "[zookeeper-issues] 20210328 [jira] [Commented] (ZOOKEEPER-4264) Apache Zookeeper 3.6.2 - slf4j 1.7.25 has security vulnerability CVE-2018-8088",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/rc378b97d52856f9f3c5ced14771fed8357e4187a3a0f9a2f0515931a@%3Cissues.zookeeper.apache.org%3E",
               },
               {
                  name: "[iotdb-reviews] 20210328 [GitHub] [iotdb] HTHou merged pull request #2906: [IOTDB-1258] jcl-over-slf4j have security vulnerabilities CVE-2018-8088",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/rfb45527bad7220ada9e30957762e1da254ce405e67cc3ddf6f3558d9@%3Creviews.iotdb.apache.org%3E",
               },
               {
                  name: "[iotdb-commits] 20210328 [iotdb] branch master updated: [IOTDB-1258] jcl-over-slf4j have security vulnerabilities CVE-2018-8088 (#2906)",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/r9e25496608036573736cee484d8d03dae400f09e443b0000b6adc042@%3Ccommits.iotdb.apache.org%3E",
               },
               {
                  name: "[flink-dev] 20210720 [jira] [Created] (FLINK-23444) Slf4j 1.7.15 has the high-risk vulnerability CVE-2018-8088",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/r99a6552e45ca6ba1082031421f51799a4a665eda905ab2c2aa9d6ffa@%3Cdev.flink.apache.org%3E",
               },
               {
                  name: "[flink-issues] 20210720 [jira] [Created] (FLINK-23444) Slf4j 1.7.15 has the high-risk vulnerability CVE-2018-8088",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/r573eb577a67503e72181eee637d9b0ac042197e632bcdfce76af06a3@%3Cissues.flink.apache.org%3E",
               },
               {
                  name: "[flink-issues] 20210721 [jira] [Commented] (FLINK-23444) Slf4j 1.7.15 has the high-risk vulnerability CVE-2018-8088",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/r891761d5014f9ffd79d9737482de832462de538b6c4bdcef21aad729@%3Cissues.flink.apache.org%3E",
               },
               {
                  name: "[flink-issues] 20210725 [jira] [Commented] (FLINK-23444) Slf4j 1.7.15 has the high-risk vulnerability CVE-2018-8088",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/rc7de83170d3402af15bfed3d59f80aea20f250535bdce30e4cad24db@%3Cissues.flink.apache.org%3E",
               },
               {
                  name: "[flink-issues] 20210804 [jira] [Closed] (FLINK-23444) Slf4j 1.7.15 has the high-risk vulnerability CVE-2018-8088",
                  refsource: "MLIST",
                  url: "https://lists.apache.org/thread.html/r5cf87a035b297c19f4043a37b73c341576dd92f819bd3e4aa27de541@%3Cissues.flink.apache.org%3E",
               },
               {
                  name: "https://www.oracle.com/security-alerts/cpuoct2021.html",
                  refsource: "MISC",
                  url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
               },
               {
                  name: "https://www.slf4j.org/news.html",
                  refsource: "MISC",
                  url: "https://www.slf4j.org/news.html",
               },
               {
                  name: "https://security.netapp.com/advisory/ntap-20231227-0010/",
                  refsource: "CONFIRM",
                  url: "https://security.netapp.com/advisory/ntap-20231227-0010/",
               },
            ],
         },
      },
      "gitlab.com": {
         advisories: [
            {
               affected_range: "(,1.7.25],[1.8.0-alpha0,1.8.0-beta2]",
               affected_versions: "All versions up to 1.7.25, all versions starting from 1.8.0-alpha0 up to 1.8.0-beta2",
               cvss_v2: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               cvss_v3: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               cwe_ids: [
                  "CWE-1035",
                  "CWE-937",
               ],
               date: "2022-06-29",
               description: "org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before 1.8.0-beta2 allows remote attackers to bypass intended access restrictions via crafted data. EventData in the slf4j-ext module in QOS.CH SLF4J, has been fixed in SLF4J versions 1.7.26 later and in the 2.0.x series.",
               fixed_versions: [
                  "1.7.26",
                  "1.8.0-beta4",
               ],
               identifier: "CVE-2018-8088",
               identifiers: [
                  "GHSA-w77p-8cfg-2x43",
                  "CVE-2018-8088",
               ],
               not_impacted: "All versions after 1.7.25 before 1.8.0-alpha0, all versions after 1.8.0-beta2",
               package_slug: "maven/org.slf4j/slf4j-ext",
               pubdate: "2022-05-13",
               solution: "Upgrade to versions 1.7.26, 1.8.0-beta4 or above. *Note*: 1.8.0-beta4 may be an unstable version. Use caution.",
               title: "Improper Access Control in SLF4J",
               urls: [
                  "https://nvd.nist.gov/vuln/detail/CVE-2018-8088",
                  "https://github.com/qos-ch/slf4j/commit/d2b27fba88e983f921558da27fc29b5f5d269405",
                  "https://access.redhat.com/errata/RHSA-2018:0582",
                  "https://access.redhat.com/errata/RHSA-2018:0592",
                  "https://access.redhat.com/errata/RHSA-2018:0627",
                  "https://access.redhat.com/errata/RHSA-2018:0628",
                  "https://access.redhat.com/errata/RHSA-2018:0629",
                  "https://access.redhat.com/errata/RHSA-2018:0630",
                  "https://access.redhat.com/errata/RHSA-2018:1247",
                  "https://access.redhat.com/errata/RHSA-2018:1248",
                  "https://access.redhat.com/errata/RHSA-2018:1249",
                  "https://access.redhat.com/errata/RHSA-2018:1251",
                  "https://access.redhat.com/errata/RHSA-2018:1323",
                  "https://access.redhat.com/errata/RHSA-2018:1447",
                  "https://access.redhat.com/errata/RHSA-2018:1448",
                  "https://access.redhat.com/errata/RHSA-2018:1449",
                  "https://access.redhat.com/errata/RHSA-2018:1450",
                  "https://access.redhat.com/errata/RHSA-2018:1451",
                  "https://access.redhat.com/errata/RHSA-2018:1525",
                  "https://access.redhat.com/errata/RHSA-2018:1575",
                  "https://access.redhat.com/errata/RHSA-2018:2143",
                  "https://access.redhat.com/errata/RHSA-2018:2419",
                  "https://access.redhat.com/errata/RHSA-2018:2420",
                  "https://access.redhat.com/errata/RHSA-2018:2669",
                  "https://access.redhat.com/errata/RHSA-2018:2930",
                  "https://access.redhat.com/errata/RHSA-2019:2413",
                  "https://access.redhat.com/errata/RHSA-2019:3140",
                  "https://jira.qos.ch/browse/SLF4J-430",
                  "https://jira.qos.ch/browse/SLF4J-431",
                  "https://lists.apache.org/thread.html/956ba8e76b6793a6670b2eb0129a5e3003ce2124ca3130fd57d48d0f@%3Cdevnull.infra.apache.org%3E",
                  "https://lists.apache.org/thread.html/95ce76613c869dbccf1d3d29327099ccc71aeec156f76c30853044fa@%3Cdevnull.infra.apache.org%3E",
                  "https://lists.apache.org/thread.html/r0f376559fd39cf1a53ac3afbc1fc5d62649dcac9916d4697445a94fa@%3Cissues.zookeeper.apache.org%3E",
                  "https://lists.apache.org/thread.html/r1660c72a660f0522947ca6ce329dcc74e1ee20c58bbe208472754489@%3Ccommon-issues.hadoop.apache.org%3E",
                  "https://lists.apache.org/thread.html/r17e7e6abc53d29c0e269153517d36f4bec2755b95900596e6df15cbe@%3Cnotifications.iotdb.apache.org%3E",
                  "https://lists.apache.org/thread.html/r2d05924f903403927a2f4e78d9b1249a42f0bd09f69a7c1954d74a42@%3Creviews.iotdb.apache.org%3E",
                  "https://lists.apache.org/thread.html/r32be21da011479df41468a62bc09d12f0d3b4e3a71679d33cb0e8c56@%3Cissues.zookeeper.apache.org%3E",
                  "https://lists.apache.org/thread.html/r37644f0a00aca9fbcbc21c0f9a91f927b63153ec3607be469cd515e5@%3Creviews.iotdb.apache.org%3E",
                  "https://lists.apache.org/thread.html/r48247c12cf652e95a01fc94ee5aa8641f3ec481235774790e53eb55e@%3Creviews.iotdb.apache.org%3E",
                  "https://lists.apache.org/thread.html/r573eb577a67503e72181eee637d9b0ac042197e632bcdfce76af06a3@%3Cissues.flink.apache.org%3E",
                  "https://lists.apache.org/thread.html/r5cf87a035b297c19f4043a37b73c341576dd92f819bd3e4aa27de541@%3Cissues.flink.apache.org%3E",
                  "https://lists.apache.org/thread.html/r767861f053c15f9e9201b939a0d508dd58475a072e76135eaaca17f0@%3Ccommon-issues.hadoop.apache.org%3E",
                  "https://lists.apache.org/thread.html/r81711cde77c2c5742b7b8533c978e79771b700af0ef4d3149d70df25@%3Cnotifications.logging.apache.org%3E",
                  "https://lists.apache.org/thread.html/r891761d5014f9ffd79d9737482de832462de538b6c4bdcef21aad729@%3Cissues.flink.apache.org%3E",
                  "https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E",
                  "https://lists.apache.org/thread.html/r99a6552e45ca6ba1082031421f51799a4a665eda905ab2c2aa9d6ffa@%3Cdev.flink.apache.org%3E",
                  "https://lists.apache.org/thread.html/r9e25496608036573736cee484d8d03dae400f09e443b0000b6adc042@%3Ccommits.iotdb.apache.org%3E",
                  "https://lists.apache.org/thread.html/raabf1a00b2652575fca9fcb44166a828a0cab97a7d1594001eabc991@%3Ccommon-issues.hadoop.apache.org%3E",
                  "https://lists.apache.org/thread.html/rc378b97d52856f9f3c5ced14771fed8357e4187a3a0f9a2f0515931a@%3Cissues.zookeeper.apache.org%3E",
                  "https://lists.apache.org/thread.html/rc7de83170d3402af15bfed3d59f80aea20f250535bdce30e4cad24db@%3Cissues.flink.apache.org%3E",
                  "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E",
                  "https://lists.apache.org/thread.html/rd86db9679150e9297b5c0fcb6f0e80a8b81b54fcf423de5a914bca78@%3Ccommon-commits.hadoop.apache.org%3E",
                  "https://lists.apache.org/thread.html/re6fb6b0de9d679310437ff87fc94e39da5a14dce9c73864a41837462@%3Ccommon-commits.hadoop.apache.org%3E",
                  "https://lists.apache.org/thread.html/reb3eeb985afdead17fadb7c33d5d472c1015a85ea5c9b038ec77f378@%3Ccommon-dev.hadoop.apache.org%3E",
                  "https://lists.apache.org/thread.html/rf58e1bee31d66665437dde9acd9abed53f8483034b69fa9ca7cde09c@%3Cdev.zookeeper.apache.org%3E",
                  "https://lists.apache.org/thread.html/rfb45527bad7220ada9e30957762e1da254ce405e67cc3ddf6f3558d9@%3Creviews.iotdb.apache.org%3E",
                  "https://lists.apache.org/thread.html/rfe52b7cbba4dcba521e13130e5d28d5818b78d70db0af1b470fa0264@%3Ccommon-issues.hadoop.apache.org%3E",
                  "https://www.oracle.com/security-alerts/cpujul2020.html",
                  "https://www.oracle.com/security-alerts/cpuoct2020.html",
                  "https://www.oracle.com/security-alerts/cpuoct2021.html",
                  "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
                  "https://github.com/advisories/GHSA-w77p-8cfg-2x43",
               ],
               uuid: "269ad388-bcc1-43e6-98ab-061a5bb0477c",
            },
         ],
      },
      "nvd.nist.gov": {
         cve: {
            configurations: [
               {
                  nodes: [
                     {
                        cpeMatch: [
                           {
                              criteria: "cpe:2.3:a:qos:slf4j:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "D42F1233-D2BD-4CF0-94F9-8BE35346BC1F",
                              versionEndExcluding: "1.7.26",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:qos:slf4j:1.8.0:alpha1:*:*:*:*:*:*",
                              matchCriteriaId: "53E5592F-9FFB-4ABE-82B9-D6A130359C6C",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:qos:slf4j:1.8.0:alpha2:*:*:*:*:*:*",
                              matchCriteriaId: "51E52584-4E04-40CE-AD6D-7D2B9A97DF2C",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:qos:slf4j:1.8.0:beta1:*:*:*:*:*:*",
                              matchCriteriaId: "9EA01C6A-4A37-436E-939E-A4C6E29D0F81",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:qos:slf4j:1.8.0:beta2:*:*:*:*:*:*",
                              matchCriteriaId: "BA0E73F4-0197-422E-B454-A6090BD1D911",
                              vulnerable: true,
                           },
                        ],
                        negate: false,
                        operator: "OR",
                     },
                  ],
               },
               {
                  nodes: [
                     {
                        cpeMatch: [
                           {
                              criteria: "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.1:*:*:*:*:*:*:*",
                              matchCriteriaId: "7117F117-D439-45EB-BB95-397E5E52C9BB",
                              vulnerable: true,
                           },
                        ],
                        negate: false,
                        operator: "OR",
                     },
                     {
                        cpeMatch: [
                           {
                              criteria: "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
                              vulnerable: false,
                           },
                           {
                              criteria: "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
                              vulnerable: false,
                           },
                        ],
                        negate: false,
                        operator: "OR",
                     },
                  ],
                  operator: "AND",
               },
               {
                  nodes: [
                     {
                        cpeMatch: [
                           {
                              criteria: "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "B142ACCC-F7A9-4A3B-BE60-0D6691D5058D",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "B1ABA871-3271-48E2-A69C-5AD70AF94E53",
                              vulnerable: true,
                           },
                        ],
                        negate: false,
                        operator: "OR",
                     },
                     {
                        cpeMatch: [
                           {
                              criteria: "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "1D8B549B-E57B-4DFE-8A13-CAB06B5356B3",
                              vulnerable: false,
                           },
                           {
                              criteria: "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
                              vulnerable: false,
                           },
                           {
                              criteria: "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
                              vulnerable: false,
                           },
                        ],
                        negate: false,
                        operator: "OR",
                     },
                  ],
                  operator: "AND",
               },
               {
                  nodes: [
                     {
                        cpeMatch: [
                           {
                              criteria: "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "6BBD7A51-0590-4DDF-8249-5AFA8D645CB6",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "BB28F9AF-3D06-4532-B397-96D7E4792503",
                              vulnerable: true,
                           },
                        ],
                        negate: false,
                        operator: "OR",
                     },
                     {
                        cpeMatch: [
                           {
                              criteria: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "51EF4996-72F4-4FA4-814F-F5991E7A8318",
                              vulnerable: false,
                           },
                        ],
                        negate: false,
                        operator: "OR",
                     },
                  ],
                  operator: "AND",
               },
               {
                  nodes: [
                     {
                        cpeMatch: [
                           {
                              criteria: "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "33C068A4-3780-4EAB-A937-6082DF847564",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
                              matchCriteriaId: "F96E3779-F56A-45FF-BB3D-4980527D721E",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
                              matchCriteriaId: "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
                              matchCriteriaId: "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
                              matchCriteriaId: "83737173-E12E-4641-BC49-0BD84A6B29D0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "51EF4996-72F4-4FA4-814F-F5991E7A8318",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
                              matchCriteriaId: "D99A687E-EAE6-417E-A88E-D0082BC194CD",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
                              matchCriteriaId: "B353CE99-D57C-465B-AAB0-73EF581127D1",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
                              matchCriteriaId: "7431ABC1-9252-419E-8CC1-311B41360078",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*",
                              matchCriteriaId: "D5F7E11E-FB34-4467-8919-2B6BEAABF665",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
                              matchCriteriaId: "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
                              matchCriteriaId: "17F256A9-D3B9-4C72-B013-4EFD878BFEA8",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "825ECE2D-E232-46E0-A047-074B34DB1E97",
                              vulnerable: true,
                           },
                        ],
                        negate: false,
                        operator: "OR",
                     },
                  ],
               },
               {
                  nodes: [
                     {
                        cpeMatch: [
                           {
                              criteria: "cpe:2.3:a:oracle:goldengate_application_adapters:12.3.2.1.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "F6F259E6-10A8-4207-8FC2-85ABD70B04C0",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:goldengate_stream_analytics:*:*:*:*:*:*:*:*",
                              matchCriteriaId: "F4E7F2AA-B851-4D85-9895-2CDD6BE9FCB4",
                              versionEndExcluding: "19.1.0.0.1",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "5435B365-BFF3-4A9E-B45C-42D8F1E20FB7",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "1FAC3840-2CF8-44CE-81BB-EEEBDA00A34A",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:utilities_framework:4.3.0.2.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "F7715FC4-631E-462D-AD59-F44235C19837",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:utilities_framework:4.3.0.3.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "2224F133-2D7D-4F3A-995A-31599C579ADB",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:utilities_framework:4.3.0.4.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "EA3D0BC5-109D-4405-8566-3C91A20EA3A3",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:utilities_framework:4.3.0.5.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "A5BBA303-8D2B-48C5-B52A-4E192166699C",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:utilities_framework:4.3.0.6.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "8DF02546-3F0D-4FDD-89B1-8A3FE43FB5BF",
                              vulnerable: true,
                           },
                           {
                              criteria: "cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*",
                              matchCriteriaId: "3F906F04-39E4-4BE4-8A73-9D058AAADB43",
                              vulnerable: true,
                           },
                        ],
                        negate: false,
                        operator: "OR",
                     },
                  ],
               },
            ],
            descriptions: [
               {
                  lang: "en",
                  value: "org.slf4j.ext.EventData in the slf4j-ext module in QOS.CH SLF4J before 1.8.0-beta2 allows remote attackers to bypass intended access restrictions via crafted data. EventData in the slf4j-ext module in QOS.CH SLF4J, has been fixed in SLF4J versions 1.7.26 later and in the 2.0.x series.",
               },
               {
                  lang: "es",
                  value: "org.slf4j.ext.EventData en el módulo slf4j-ext en QOS.CH SLF4J antes de la versión 1.8.0-beta2 permite a los atacantes remotos saltarse las restricciones de acceso previstas a través de datos manipulados. EventData en el módulo slf4j-ext en QOS.CH SLF4J, ha sido corregido en las versiones 1.7.26 posteriores de SLF4J y en la serie 2.0.x",
               },
            ],
            id: "CVE-2018-8088",
            lastModified: "2023-12-27T15:15:44.463",
            metrics: {
               cvssMetricV2: [
                  {
                     acInsufInfo: false,
                     baseSeverity: "HIGH",
                     cvssData: {
                        accessComplexity: "LOW",
                        accessVector: "NETWORK",
                        authentication: "NONE",
                        availabilityImpact: "PARTIAL",
                        baseScore: 7.5,
                        confidentialityImpact: "PARTIAL",
                        integrityImpact: "PARTIAL",
                        vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
                        version: "2.0",
                     },
                     exploitabilityScore: 10,
                     impactScore: 6.4,
                     obtainAllPrivilege: false,
                     obtainOtherPrivilege: false,
                     obtainUserPrivilege: false,
                     source: "nvd@nist.gov",
                     type: "Primary",
                     userInteractionRequired: false,
                  },
               ],
               cvssMetricV31: [
                  {
                     cvssData: {
                        attackComplexity: "LOW",
                        attackVector: "NETWORK",
                        availabilityImpact: "HIGH",
                        baseScore: 9.8,
                        baseSeverity: "CRITICAL",
                        confidentialityImpact: "HIGH",
                        integrityImpact: "HIGH",
                        privilegesRequired: "NONE",
                        scope: "UNCHANGED",
                        userInteraction: "NONE",
                        vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                        version: "3.1",
                     },
                     exploitabilityScore: 3.9,
                     impactScore: 5.9,
                     source: "nvd@nist.gov",
                     type: "Primary",
                  },
               ],
            },
            published: "2018-03-20T16:29:00.547",
            references: [
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                     "VDB Entry",
                  ],
                  url: "http://www.securityfocus.com/bid/103737",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                     "VDB Entry",
                  ],
                  url: "http://www.securitytracker.com/id/1040627",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:0582",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:0592",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:0627",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:0628",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:0629",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:0630",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:1247",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:1248",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:1249",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:1251",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:1323",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:1447",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:1448",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:1449",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:1450",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:1451",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:1525",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:1575",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:2143",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:2419",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:2420",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:2669",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2018:2930",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:2413",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2019:3140",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Patch",
                     "Third Party Advisory",
                  ],
                  url: "https://github.com/qos-ch/slf4j/commit/d2b27fba88e983f921558da27fc29b5f5d269405",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Issue Tracking",
                     "Vendor Advisory",
                  ],
                  url: "https://jira.qos.ch/browse/SLF4J-430",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Issue Tracking",
                     "Vendor Advisory",
                  ],
                  url: "https://jira.qos.ch/browse/SLF4J-431",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/956ba8e76b6793a6670b2eb0129a5e3003ce2124ca3130fd57d48d0f%40%3Cdevnull.infra.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/95ce76613c869dbccf1d3d29327099ccc71aeec156f76c30853044fa%40%3Cdevnull.infra.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/r0f376559fd39cf1a53ac3afbc1fc5d62649dcac9916d4697445a94fa%40%3Cissues.zookeeper.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/r1660c72a660f0522947ca6ce329dcc74e1ee20c58bbe208472754489%40%3Ccommon-issues.hadoop.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/r17e7e6abc53d29c0e269153517d36f4bec2755b95900596e6df15cbe%40%3Cnotifications.iotdb.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/r2d05924f903403927a2f4e78d9b1249a42f0bd09f69a7c1954d74a42%40%3Creviews.iotdb.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/r32be21da011479df41468a62bc09d12f0d3b4e3a71679d33cb0e8c56%40%3Cissues.zookeeper.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/r37644f0a00aca9fbcbc21c0f9a91f927b63153ec3607be469cd515e5%40%3Creviews.iotdb.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/r48247c12cf652e95a01fc94ee5aa8641f3ec481235774790e53eb55e%40%3Creviews.iotdb.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/r573eb577a67503e72181eee637d9b0ac042197e632bcdfce76af06a3%40%3Cissues.flink.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/r5cf87a035b297c19f4043a37b73c341576dd92f819bd3e4aa27de541%40%3Cissues.flink.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/r767861f053c15f9e9201b939a0d508dd58475a072e76135eaaca17f0%40%3Ccommon-issues.hadoop.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/r81711cde77c2c5742b7b8533c978e79771b700af0ef4d3149d70df25%40%3Cnotifications.logging.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/r891761d5014f9ffd79d9737482de832462de538b6c4bdcef21aad729%40%3Cissues.flink.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf%40%3Ccommits.pulsar.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/r99a6552e45ca6ba1082031421f51799a4a665eda905ab2c2aa9d6ffa%40%3Cdev.flink.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/r9e25496608036573736cee484d8d03dae400f09e443b0000b6adc042%40%3Ccommits.iotdb.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/raabf1a00b2652575fca9fcb44166a828a0cab97a7d1594001eabc991%40%3Ccommon-issues.hadoop.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/rc378b97d52856f9f3c5ced14771fed8357e4187a3a0f9a2f0515931a%40%3Cissues.zookeeper.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/rc7de83170d3402af15bfed3d59f80aea20f250535bdce30e4cad24db%40%3Cissues.flink.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26%40%3Ccommits.pulsar.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/rd86db9679150e9297b5c0fcb6f0e80a8b81b54fcf423de5a914bca78%40%3Ccommon-commits.hadoop.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/re6fb6b0de9d679310437ff87fc94e39da5a14dce9c73864a41837462%40%3Ccommon-commits.hadoop.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/reb3eeb985afdead17fadb7c33d5d472c1015a85ea5c9b038ec77f378%40%3Ccommon-dev.hadoop.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/rf58e1bee31d66665437dde9acd9abed53f8483034b69fa9ca7cde09c%40%3Cdev.zookeeper.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/rfb45527bad7220ada9e30957762e1da254ce405e67cc3ddf6f3558d9%40%3Creviews.iotdb.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://lists.apache.org/thread.html/rfe52b7cbba4dcba521e13130e5d28d5818b78d70db0af1b470fa0264%40%3Ccommon-issues.hadoop.apache.org%3E",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://security.netapp.com/advisory/ntap-20231227-0010/",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpujul2020.html",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Third Party Advisory",
                  ],
                  url: "https://www.oracle.com/security-alerts/cpuoct2020.html",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://www.oracle.com/security-alerts/cpuoct2021.html",
               },
               {
                  source: "cve@mitre.org",
                  tags: [
                     "Patch",
                     "Third Party Advisory",
                  ],
                  url: "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
               },
               {
                  source: "cve@mitre.org",
                  url: "https://www.slf4j.org/news.html",
               },
            ],
            sourceIdentifier: "cve@mitre.org",
            vulnStatus: "Modified",
            weaknesses: [
               {
                  description: [
                     {
                        lang: "en",
                        value: "NVD-CWE-noinfo",
                     },
                  ],
                  source: "nvd@nist.gov",
                  type: "Primary",
               },
            ],
         },
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.