Added |
CPE Configuration |
|
OR
*cpe:2.3:a:tribe29:checkmk:*:*:*:*:*:*:*:* versions from (including) 1.5.0 up to (excluding) 2.0.0
*cpe:2.3:a:tribe29:checkmk:2.0.0:-:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:b1:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:b2:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:b3:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:b4:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:b5:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:b6:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:b7:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:b8:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:i1:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:p1:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:p10:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:p11:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:p12:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:p13:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:p14:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:p15:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:p16:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:p17:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:p2:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:p3:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:p4:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:p5:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:p6:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:p7:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:p8:*:*:*:*:*:*
*cpe:2.3:a:tribe29:checkmk:2.0.0:p9:*:*:*:*:*:*
|
Added |
CVSS V2 |
|
NIST (AV:N/AC:M/Au:N/C:P/I:P/A:P)
|
Added |
CVSS V2 Metadata |
|
Victim must voluntarily interact with attack mechanism
|
Added |
CVSS V3.1 |
|
NIST AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
Added |
CWE |
|
NIST CWE-434
|
Changed |
Reference Type |
http://checkmk.com No Types Assigned
|
http://checkmk.com Product
|
Changed |
Reference Type |
https://github.com/Edgarloyola/CVE-2021-40905 No Types Assigned
|
https://github.com/Edgarloyola/CVE-2021-40905 Exploit, Third Party Advisory
|