Search for vulnerabilities
Vulnerability details: VCID-ftmk-wbwx-aaar
Vulnerability ID VCID-ftmk-wbwx-aaar
Aliases CVE-2021-46877
GHSA-3x8x-79m2-3w2w
Summary jackson-databind possible Denial of Service if using JDK serialization to serialize JsonNode
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2023:4505
ssvc Track https://access.redhat.com/errata/RHSA-2023:4505
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2023:4506
ssvc Track https://access.redhat.com/errata/RHSA-2023:4506
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2023:4507
ssvc Track https://access.redhat.com/errata/RHSA-2023:4507
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2023:4509
ssvc Track https://access.redhat.com/errata/RHSA-2023:4509
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2023:4918
ssvc Track https://access.redhat.com/errata/RHSA-2023:4918
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2023:4919
ssvc Track https://access.redhat.com/errata/RHSA-2023:4919
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2023:4920
ssvc Track https://access.redhat.com/errata/RHSA-2023:4920
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2023:4921
ssvc Track https://access.redhat.com/errata/RHSA-2023:4921
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2023:4924
ssvc Track https://access.redhat.com/errata/RHSA-2023:4924
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46877.json
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00097 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00099 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00099 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00121 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00121 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00121 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00121 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00121 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00121 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00121 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00121 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00121 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00121 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00121 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00121 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00121 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00121 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00121 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00121 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
epss 0.00302 https://api.first.org/data/v1/epss?cve=CVE-2021-46877
cvssv3.1 6.2 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-3x8x-79m2-3w2w
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-3x8x-79m2-3w2w
cvssv3.1 7.5 https://github.com/FasterXML/jackson-databind
generic_textual HIGH https://github.com/FasterXML/jackson-databind
cvssv3.1 7.5 https://github.com/FasterXML/jackson-databind/commit/3ccde7d938fea547e598fdefe9a82cff37fed5cb
generic_textual HIGH https://github.com/FasterXML/jackson-databind/commit/3ccde7d938fea547e598fdefe9a82cff37fed5cb
cvssv3.1 7.5 https://github.com/FasterXML/jackson-databind/issues/3328
generic_textual HIGH https://github.com/FasterXML/jackson-databind/issues/3328
ssvc Track https://github.com/FasterXML/jackson-databind/issues/3328
cvssv3.1 7.5 https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.12.6
generic_textual HIGH https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.12.6
cvssv3.1 7.5 https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.13.1
generic_textual HIGH https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.13.1
cvssv3.1 7.5 https://groups.google.com/g/jackson-user/c/OsBsirPM_Vw
generic_textual HIGH https://groups.google.com/g/jackson-user/c/OsBsirPM_Vw
ssvc Track https://groups.google.com/g/jackson-user/c/OsBsirPM_Vw
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2021-46877
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2021-46877
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2021-46877
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46877.json
https://api.first.org/data/v1/epss?cve=CVE-2021-46877
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46877
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://github.com/FasterXML/jackson-databind
https://github.com/FasterXML/jackson-databind/commit/3ccde7d938fea547e598fdefe9a82cff37fed5cb
https://github.com/FasterXML/jackson-databind/issues/3328
https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.12.6
https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.13.1
https://groups.google.com/g/jackson-user/c/OsBsirPM_Vw
2185707 https://bugzilla.redhat.com/show_bug.cgi?id=2185707
cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*
cpe:2.3:a:fasterxml:jackson-databind:2.13.0:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fasterxml:jackson-databind:2.13.0:-:*:*:*:*:*:*
cpe:2.3:a:fasterxml:jackson-databind:2.13.0:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fasterxml:jackson-databind:2.13.0:rc1:*:*:*:*:*:*
cpe:2.3:a:fasterxml:jackson-databind:2.13.0:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:fasterxml:jackson-databind:2.13.0:rc2:*:*:*:*:*:*
CVE-2021-46877 https://nvd.nist.gov/vuln/detail/CVE-2021-46877
GHSA-3x8x-79m2-3w2w https://github.com/advisories/GHSA-3x8x-79m2-3w2w
RHSA-2023:2097 https://access.redhat.com/errata/RHSA-2023:2097
RHSA-2023:3223 https://access.redhat.com/errata/RHSA-2023:3223
RHSA-2023:3299 https://access.redhat.com/errata/RHSA-2023:3299
RHSA-2023:3373 https://access.redhat.com/errata/RHSA-2023:3373
RHSA-2023:3610 https://access.redhat.com/errata/RHSA-2023:3610
RHSA-2023:3815 https://access.redhat.com/errata/RHSA-2023:3815
RHSA-2023:4505 https://access.redhat.com/errata/RHSA-2023:4505
RHSA-2023:4506 https://access.redhat.com/errata/RHSA-2023:4506
RHSA-2023:4507 https://access.redhat.com/errata/RHSA-2023:4507
RHSA-2023:4509 https://access.redhat.com/errata/RHSA-2023:4509
RHSA-2023:4627 https://access.redhat.com/errata/RHSA-2023:4627
RHSA-2023:4918 https://access.redhat.com/errata/RHSA-2023:4918
RHSA-2023:4919 https://access.redhat.com/errata/RHSA-2023:4919
RHSA-2023:4920 https://access.redhat.com/errata/RHSA-2023:4920
RHSA-2023:4921 https://access.redhat.com/errata/RHSA-2023:4921
RHSA-2023:4924 https://access.redhat.com/errata/RHSA-2023:4924
RHSA-2023:5147 https://access.redhat.com/errata/RHSA-2023:5147
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2023:4505
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:07:40Z/ Found at https://access.redhat.com/errata/RHSA-2023:4505
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2023:4506
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:07:40Z/ Found at https://access.redhat.com/errata/RHSA-2023:4506
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2023:4507
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:07:40Z/ Found at https://access.redhat.com/errata/RHSA-2023:4507
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2023:4509
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:07:40Z/ Found at https://access.redhat.com/errata/RHSA-2023:4509
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2023:4918
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:07:40Z/ Found at https://access.redhat.com/errata/RHSA-2023:4918
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2023:4919
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:07:40Z/ Found at https://access.redhat.com/errata/RHSA-2023:4919
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2023:4920
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:07:40Z/ Found at https://access.redhat.com/errata/RHSA-2023:4920
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2023:4921
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:07:40Z/ Found at https://access.redhat.com/errata/RHSA-2023:4921
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2023:4924
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-13T20:07:40Z/ Found at https://access.redhat.com/errata/RHSA-2023:4924
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46877.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/FasterXML/jackson-databind
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/FasterXML/jackson-databind/commit/3ccde7d938fea547e598fdefe9a82cff37fed5cb
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/FasterXML/jackson-databind/issues/3328
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T15:58:50Z/ Found at https://github.com/FasterXML/jackson-databind/issues/3328
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.12.6
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.13.1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://groups.google.com/g/jackson-user/c/OsBsirPM_Vw
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-26T15:58:50Z/ Found at https://groups.google.com/g/jackson-user/c/OsBsirPM_Vw
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2021-46877
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2021-46877
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.24411
EPSS Score 0.00097
Published At April 2, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.