vulnerability

Rocky Linux: CVE-2025-26646: .NET-9.0 (Multiple Advisories)

Severity
9
CVSS
(AV:N/AC:M/Au:S/C:C/I:C/A:C)
Published
Jul 29, 2025
Added
Jul 31, 2025
Modified
Oct 13, 2025

Description

External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network.

Solutions

rocky-upgrade-aspnetcore-runtime-8.0rocky-upgrade-aspnetcore-runtime-9.0rocky-upgrade-aspnetcore-runtime-dbg-8.0rocky-upgrade-aspnetcore-runtime-dbg-9.0rocky-upgrade-aspnetcore-targeting-pack-8.0rocky-upgrade-aspnetcore-targeting-pack-9.0rocky-upgrade-dotnetrocky-upgrade-dotnet-apphost-pack-8.0rocky-upgrade-dotnet-apphost-pack-8.0-debuginforocky-upgrade-dotnet-apphost-pack-9.0rocky-upgrade-dotnet-apphost-pack-9.0-debuginforocky-upgrade-dotnet-hostrocky-upgrade-dotnet-host-debuginforocky-upgrade-dotnet-hostfxr-8.0rocky-upgrade-dotnet-hostfxr-8.0-debuginforocky-upgrade-dotnet-hostfxr-9.0rocky-upgrade-dotnet-hostfxr-9.0-debuginforocky-upgrade-dotnet-runtime-8.0rocky-upgrade-dotnet-runtime-8.0-debuginforocky-upgrade-dotnet-runtime-9.0rocky-upgrade-dotnet-runtime-9.0-debuginforocky-upgrade-dotnet-runtime-dbg-8.0rocky-upgrade-dotnet-runtime-dbg-9.0rocky-upgrade-dotnet-sdk-8.0rocky-upgrade-dotnet-sdk-8.0-debuginforocky-upgrade-dotnet-sdk-8.0-source-built-artifactsrocky-upgrade-dotnet-sdk-9.0rocky-upgrade-dotnet-sdk-9.0-debuginforocky-upgrade-dotnet-sdk-9.0-source-built-artifactsrocky-upgrade-dotnet-sdk-aot-9.0rocky-upgrade-dotnet-sdk-aot-9.0-debuginforocky-upgrade-dotnet-sdk-dbg-8.0rocky-upgrade-dotnet-sdk-dbg-9.0rocky-upgrade-dotnet-targeting-pack-8.0rocky-upgrade-dotnet-targeting-pack-9.0rocky-upgrade-dotnet-templates-8.0rocky-upgrade-dotnet-templates-9.0rocky-upgrade-dotnet8.0-debuginforocky-upgrade-dotnet8.0-debugsourcerocky-upgrade-dotnet9.0-debuginforocky-upgrade-dotnet9.0-debugsourcerocky-upgrade-netstandard-targeting-pack-2.1
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.