8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
9.2 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.081 Low
EPSS
Percentile
94.2%
.NET Core Remote Code Execution Vulnerability
Vendor | Product | Version | CPE |
---|---|---|---|
microsoft | .net_core_2.1 | 2.1 | cpe:2.3:a:microsoft:.net_core_2.1:2.1:*:*:*:*:*:*:* |
microsoft | .net_core_3.1 | 3.1 | cpe:2.3:a:microsoft:.net_core_3.1:3.1:*:*:*:*:*:*:* |
microsoft | .net_5.0 | 5.0.0 | cpe:2.3:a:microsoft:.net_5.0:5.0.0:*:*:*:*:*:*:* |
microsoft | microsoft_visual_studio_2019_16.4 (includes 16.0 - 16.3) | 16.0 | cpe:2.3:a:microsoft:microsoft_visual_studio_2019_16.4 (includes 16.0 - 16.3):16.0:*:*:*:*:*:*:* |
microsoft | microsoft_visual_studio_2017_15.9 (includes 15.0 - 15.8) | 15.9.0 | cpe:2.3:a:microsoft:microsoft_visual_studio_2017_15.9 (includes 15.0 - 15.8):15.9.0:*:*:*:*:*:*:* |
microsoft | microsoft_visual_studio_2019_16.7 (includes 16.0 – 16.6) | 16.0.0 | cpe:2.3:a:microsoft:microsoft_visual_studio_2019_16.7 (includes 16.0 – 16.6):16.0.0:*:*:*:*:*:*:* |
microsoft | visual_studio_2019 | * | cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:* |
microsoft | microsoft_visual_studio_2019_16.8 (includes 16.0 - 16.7) | 16.0 | cpe:2.3:a:microsoft:microsoft_visual_studio_2019_16.8 (includes 16.0 - 16.7):16.0:*:*:*:*:*:*:* |
microsoft | microsoft_visual_studio_2019_16.9 (includes 16.0 - 16.8) | 15.0.0 | cpe:2.3:a:microsoft:microsoft_visual_studio_2019_16.9 (includes 16.0 - 16.8):15.0.0:*:*:*:*:*:*:* |
microsoft | powershell_core_7.1 | 7.1.0 | cpe:2.3:a:microsoft:powershell_core_7.1:7.1.0:*:*:*:*:*:*:* |
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP/
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26701
More
8.1 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
9.2 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.081 Low
EPSS
Percentile
94.2%