Search for vulnerabilities
Vulnerability details: VCID-632q-8e7a-aaac
Vulnerability ID VCID-632q-8e7a-aaac
Aliases BIT-2021-3281
BIT-django-2021-3281
CVE-2021-3281
GHSA-fvgf-6h6h-3322
PYSEC-2021-9
Summary In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3281.html
rhas Important https://access.redhat.com/errata/RHSA-2021:0780
rhas Moderate https://access.redhat.com/errata/RHSA-2021:0781
rhas Moderate https://access.redhat.com/errata/RHSA-2021:3490
rhas Moderate https://access.redhat.com/errata/RHSA-2021:5070
cvssv3 5.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3281.json
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.00134 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.00148 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.00177 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.00177 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.00177 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.00177 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.00177 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.00244 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.30185 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.30613 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.30613 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.32421 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.32421 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.32421 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.32421 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.32421 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.32421 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.32421 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.33479 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.33479 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.33479 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.33479 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.33479 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.33479 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.33479 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.33479 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.33479 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.33479 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.33479 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.33479 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.35936 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.35936 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.35936 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.35936 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.35936 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.35936 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.35936 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.35936 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.35936 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.35936 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.35936 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.36239 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.36239 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.36239 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.36239 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.36239 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.36239 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.36239 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.36239 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.36239 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.36239 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.36239 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.36239 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.36239 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.36239 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.36239 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.36239 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.36239 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.38316 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.38316 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.38316 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.38316 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.38316 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.38316 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.38316 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.38316 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.38316 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.38316 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.38316 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.38316 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.38316 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.38316 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.38316 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.38316 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.38316 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
epss 0.59773 https://api.first.org/data/v1/epss?cve=CVE-2021-3281
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1919969
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3281
cvssv3.1 5.3 https://docs.djangoproject.com/en/3.1/releases/3.0.12
generic_textual MODERATE https://docs.djangoproject.com/en/3.1/releases/3.0.12
cvssv3.1 5.3 https://docs.djangoproject.com/en/3.1/releases/security
generic_textual MODERATE https://docs.djangoproject.com/en/3.1/releases/security
cvssv3.1 6.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-fvgf-6h6h-3322
cvssv3.1 3.7 https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 5.3 https://github.com/django/django/commit/02e6592835b4559909aa3aaaf67988fef435f624
generic_textual MODERATE https://github.com/django/django/commit/02e6592835b4559909aa3aaaf67988fef435f624
cvssv3.1 5.3 https://github.com/django/django/commit/05413afa8c18cdb978fcdf470e09f7a12b234a23
generic_textual MODERATE https://github.com/django/django/commit/05413afa8c18cdb978fcdf470e09f7a12b234a23
cvssv3.1 5.3 https://github.com/django/django/commit/21e7622dec1f8612c85c2fc37fe8efbfd3311e37
generic_textual MODERATE https://github.com/django/django/commit/21e7622dec1f8612c85c2fc37fe8efbfd3311e37
cvssv3.1 5.3 https://github.com/django/django/commit/52e409ed17287e9aabda847b6afe58be2fa9f86a
generic_textual MODERATE https://github.com/django/django/commit/52e409ed17287e9aabda847b6afe58be2fa9f86a
cvssv3.1 5.3 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2021-9.yaml
generic_textual MODERATE https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2021-9.yaml
cvssv3.1 3.7 https://groups.google.com/forum/#%21forum/django-announce
generic_textual MODERATE https://groups.google.com/forum/#%21forum/django-announce
cvssv3.1 7.5 https://groups.google.com/forum/#!forum/django-announce
generic_textual HIGH https://groups.google.com/forum/#!forum/django-announce
cvssv3.1 5.3 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO
generic_textual MODERATE https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2021-3281
cvssv3 5.3 https://nvd.nist.gov/vuln/detail/CVE-2021-3281
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2021-3281
archlinux Low https://security.archlinux.org/AVG-1518
cvssv3.1 5.3 https://security.netapp.com/advisory/ntap-20210226-0004
generic_textual MODERATE https://security.netapp.com/advisory/ntap-20210226-0004
generic_textual Medium https://ubuntu.com/security/notices/USN-4715-1
generic_textual Medium https://ubuntu.com/security/notices/USN-4715-2
cvssv3.1 5.3 https://www.djangoproject.com/weblog/2021/feb/01/security-releases
generic_textual MODERATE https://www.djangoproject.com/weblog/2021/feb/01/security-releases
generic_textual Medium https://www.djangoproject.com/weblog/2021/feb/01/security-releases/
Reference id Reference type URL
http://people.canonical.com/~ubuntu-security/cve/2021/CVE-2021-3281.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3281.json
https://api.first.org/data/v1/epss?cve=CVE-2021-3281
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3281
https://docs.djangoproject.com/en/3.1/releases/3.0.12
https://docs.djangoproject.com/en/3.1/releases/3.0.12/
https://docs.djangoproject.com/en/3.1/releases/security
https://docs.djangoproject.com/en/3.1/releases/security/
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/django/django
https://github.com/django/django/commit/02e6592835b4559909aa3aaaf67988fef435f624
https://github.com/django/django/commit/05413afa8c18cdb978fcdf470e09f7a12b234a23
https://github.com/django/django/commit/21e7622dec1f8612c85c2fc37fe8efbfd3311e37
https://github.com/django/django/commit/52e409ed17287e9aabda847b6afe58be2fa9f86a
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2021-9.yaml
https://groups.google.com/forum/#%21forum/django-announce
https://groups.google.com/forum/#!forum/django-announce
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/
https://security.netapp.com/advisory/ntap-20210226-0004
https://security.netapp.com/advisory/ntap-20210226-0004/
https://ubuntu.com/security/notices/USN-4715-1
https://ubuntu.com/security/notices/USN-4715-2
https://www.djangoproject.com/weblog/2021/feb/01/security-releases
https://www.djangoproject.com/weblog/2021/feb/01/security-releases/
1919969 https://bugzilla.redhat.com/show_bug.cgi?id=1919969
981562 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981562
ASA-202102-18 https://security.archlinux.org/ASA-202102-18
AVG-1518 https://security.archlinux.org/AVG-1518
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
CVE-2021-3281 https://nvd.nist.gov/vuln/detail/CVE-2021-3281
GHSA-fvgf-6h6h-3322 https://github.com/advisories/GHSA-fvgf-6h6h-3322
RHSA-2021:0780 https://access.redhat.com/errata/RHSA-2021:0780
RHSA-2021:0781 https://access.redhat.com/errata/RHSA-2021:0781
RHSA-2021:3490 https://access.redhat.com/errata/RHSA-2021:3490
RHSA-2021:5070 https://access.redhat.com/errata/RHSA-2021:5070
USN-4715-1 https://usn.ubuntu.com/4715-1/
USN-4715-2 https://usn.ubuntu.com/4715-2/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3281.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://docs.djangoproject.com/en/3.1/releases/3.0.12
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://docs.djangoproject.com/en/3.1/releases/security
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/django/django/commit/02e6592835b4559909aa3aaaf67988fef435f624
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/django/django/commit/05413afa8c18cdb978fcdf470e09f7a12b234a23
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/django/django/commit/21e7622dec1f8612c85c2fc37fe8efbfd3311e37
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/django/django/commit/52e409ed17287e9aabda847b6afe58be2fa9f86a
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2021-9.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://groups.google.com/forum/#%21forum/django-announce
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://groups.google.com/forum/#!forum/django-announce
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-3281
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-3281
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-3281
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://security.netapp.com/advisory/ntap-20210226-0004
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://www.djangoproject.com/weblog/2021/feb/01/security-releases
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.49134
EPSS Score 0.00134
Published At Dec. 17, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.