Search for vulnerabilities
Vulnerability details: VCID-p4nz-dy9w-aaae
Vulnerability ID VCID-p4nz-dy9w-aaae
Aliases CVE-2021-26701
GHSA-ghhp-997w-qr28
Summary .NET Core Remote Code Execution Vulnerability
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
rhas Important https://access.redhat.com/errata/RHSA-2021:0787
rhas Important https://access.redhat.com/errata/RHSA-2021:0788
rhas Important https://access.redhat.com/errata/RHSA-2021:0789
rhas Important https://access.redhat.com/errata/RHSA-2021:0790
rhas Important https://access.redhat.com/errata/RHSA-2021:0793
rhas Important https://access.redhat.com/errata/RHSA-2021:0794
cvssv3 8.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26701.json
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.01033 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.08067 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.08067 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.08067 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.08067 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.08067 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.08067 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.08067 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.08067 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.08067 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.08067 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.08409 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.12098 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.12607 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.12607 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.12607 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
epss 0.13140 https://api.first.org/data/v1/epss?cve=CVE-2021-26701
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1933740
cvssv3.1_qr CRITICAL https://github.com/advisories/GHSA-ghhp-997w-qr28
cvssv3.1 9.8 https://github.com/dotnet/announcements/issues/178
generic_textual CRITICAL https://github.com/dotnet/announcements/issues/178
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2021-26701
cvssv3 8.1 https://nvd.nist.gov/vuln/detail/CVE-2021-26701
cvssv3.1 9.8 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26701
generic_textual CRITICAL https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26701
archlinux High https://security.archlinux.org/AVG-1698
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26701.json
https://api.first.org/data/v1/epss?cve=CVE-2021-26701
https://github.com/dotnet/announcements/issues/178
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP/
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26701
1933740 https://bugzilla.redhat.com/show_bug.cgi?id=1933740
ASA-202103-20 https://security.archlinux.org/ASA-202103-20
ASA-202103-21 https://security.archlinux.org/ASA-202103-21
AVG-1698 https://security.archlinux.org/AVG-1698
cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_core:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:powershell_core:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:powershell_core:7.0:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:powershell_core:7.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:powershell_core:7.1:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2019:-:*:*:*:*:macos:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio_2019:-:*:*:*:*:macos:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
CVE-2021-26701 https://nvd.nist.gov/vuln/detail/CVE-2021-26701
GHSA-ghhp-997w-qr28 https://github.com/advisories/GHSA-ghhp-997w-qr28
RHSA-2021:0787 https://access.redhat.com/errata/RHSA-2021:0787
RHSA-2021:0788 https://access.redhat.com/errata/RHSA-2021:0788
RHSA-2021:0789 https://access.redhat.com/errata/RHSA-2021:0789
RHSA-2021:0790 https://access.redhat.com/errata/RHSA-2021:0790
RHSA-2021:0793 https://access.redhat.com/errata/RHSA-2021:0793
RHSA-2021:0794 https://access.redhat.com/errata/RHSA-2021:0794
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26701.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/dotnet/announcements/issues/178
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2021-26701
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2021-26701
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26701
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.75357
EPSS Score 0.01033
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.