8.6
CVE-2021-41593
- EPSS 0.72%
- Veröffentlicht 04.10.2021 17:15:08
- Zuletzt bearbeitet 21.11.2024 06:26:29
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Lightning Labs lnd before 0.13.3-beta allows loss of funds because of dust HTLC exposure.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Lightning Network Daemon Project ≫ Lightning Network Daemon Version < 0.11.0
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.11.0 Update-
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.11.0 Updatebeta
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.11.0 Updatebeta_rc1
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.11.0 Updatebeta_rc2
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.11.0 Updatebeta_rc3
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.11.0 Updatebeta_rc4
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.11.1 Updatebeta
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.11.1 Updatebeta_rc1
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.11.1 Updatebeta_rc2
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.11.1 Updatebeta_rc3
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.11.1 Updatebeta_rc4
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.11.1 Updatebeta_rc5
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.12.0 Updatebeta
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.12.0 Updatebeta_rc1
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.12.0 Updatebeta_rc2
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.12.0 Updatebeta_rc3
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.12.0 Updatebeta_rc4
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.12.0 Updatebeta_rc5
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.12.0 Updatebeta_rc6
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.12.1 Updatebeta
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.12.1 Updatebeta_rc1
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.12.1 Updatebeta_rc2
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.12.1 Updatebeta_rc3
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.12.1 Updatebeta_rc4
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.12.1 Updatebeta_rc5
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.12.1 Updatebeta_rc6
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.13.0 Updatebeta
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.13.0 Updatebeta_rc1
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.13.0 Updatebeta_rc2
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.13.0 Updatebeta_rc3
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.13.0 Updatebeta_rc4
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.13.0 Updatebeta_rc5
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.13.1 Updatebeta
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.13.1 Updatebeta_rc1
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.13.1 Updatebeta_rc2
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.13.2 Updatebeta
Lightning Network Daemon Project ≫ Lightning Network Daemon Version0.13.3 Updatebeta_rc2
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.72% | 0.717 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.6 | 3.9 | 4.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-770 Allocation of Resources Without Limits or Throttling
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.