Added |
CPE Configuration |
|
OR
*cpe:2.3:a:ledgersmb:ledgersmb:*:*:*:*:*:*:*:* versions from (including) 1.1.0 up to (including) 1.1.12
*cpe:2.3:a:ledgersmb:ledgersmb:*:*:*:*:*:*:*:* versions from (including) 1.2.0 up to (including) 1.2.26
*cpe:2.3:a:ledgersmb:ledgersmb:*:*:*:*:*:*:*:* versions from (including) 1.3.0 up to (including) 1.3.47
*cpe:2.3:a:ledgersmb:ledgersmb:*:*:*:*:*:*:*:* versions from (including) 1.4.0 up to (including) 1.4.42
*cpe:2.3:a:ledgersmb:ledgersmb:*:*:*:*:*:*:*:* versions from (including) 1.5.0 up to (including) 1.5.30
*cpe:2.3:a:ledgersmb:ledgersmb:*:*:*:*:*:*:*:* versions from (including) 1.6.0 up to (including) 1.6.33
*cpe:2.3:a:ledgersmb:ledgersmb:*:*:*:*:*:*:*:* versions from (including) 1.7.0 up to (including) 1.7.32
*cpe:2.3:a:ledgersmb:ledgersmb:*:*:*:*:*:*:*:* versions from (including) 1.8.0 up to (including) 1.8.17
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
*cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
|
Added |
CVSS V2 |
|
NIST (AV:N/AC:M/Au:N/C:P/I:P/A:P)
|
Added |
CVSS V2 Metadata |
|
Victim must voluntarily interact with attack mechanism
|
Added |
CVSS V3.1 |
|
NIST AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
|
Added |
CWE |
|
NIST CWE-79
|
Changed |
Reference Type |
https://github.com/ledgersmb/ledgersmb/commit/98fa476d46a4a7e5e9492ed69b4fa190be5547fc No Types Assigned
|
https://github.com/ledgersmb/ledgersmb/commit/98fa476d46a4a7e5e9492ed69b4fa190be5547fc Patch, Third Party Advisory
|
Changed |
Reference Type |
https://huntr.dev/bounties/ef7f4cf7-3a81-4516-b261-f5b6ac21430c No Types Assigned
|
https://huntr.dev/bounties/ef7f4cf7-3a81-4516-b261-f5b6ac21430c Third Party Advisory
|
Changed |
Reference Type |
https://ledgersmb.org/cve-2021-3694-cross-site-scripting No Types Assigned
|
https://ledgersmb.org/cve-2021-3694-cross-site-scripting Vendor Advisory
|
Changed |
Reference Type |
https://www.debian.org/security/2021/dsa-4962 No Types Assigned
|
https://www.debian.org/security/2021/dsa-4962 Third Party Advisory
|