CVE-2021-4300
CVSS V2 None
CVSS V3 None
Description
A vulnerability has been found in ghostlander Halcyon and classified as critical. Affected by this vulnerability is the function CBlock::AddToBlockIndex of the file src/main.cpp of the component Block Verification. The manipulation leads to improper access controls. The attack can be launched remotely. Upgrading to version 1.1.1.0-hal is able to address this issue. The name of the patch is 0675b25ae9cc10b5fdc8ea3a32c642979762d45e. It is recommended to upgrade the affected component. The identifier VDB-217417 was assigned to this vulnerability.
Overview
- CVE ID
- CVE-2021-4300
- Assigner
- cna@vuldb.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-01-04T22:15:08
- Last Modified Date
- 2023-01-11T01:40:32
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:halcyon_project:halcyon:*:*:*:*:*:*:*:* | 1 | OR | 1.1.1.0 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-4300 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4300 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-01-04 22:17:18 | Added to TrackCVE | |||
2023-01-04 22:17:19 | Weakness Enumeration | new | ||
2023-01-04 23:14:48 | 2023-01-04T22:27:21 | CVE Modified Date | updated | |
2023-01-04 23:14:48 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-01-04 23:14:49 | CVSS V3 information | new | ||
2023-01-04 23:14:49 | CVSS V2 information | new | ||
2023-01-08 06:25:22 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-08 06:25:23 | CVSS V3 information | new | ||
2023-01-08 06:25:23 | CVSS V2 information | new | ||
2023-01-08 09:20:12 | Undergoing Analysis | Awaiting Analysis | Vulnerability Status | updated |
2023-01-08 09:20:13 | CVSS V3 information | new | ||
2023-01-08 09:20:13 | CVSS V2 information | new | ||
2023-01-09 04:26:10 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-09 04:26:11 | CVSS V3 information | new | ||
2023-01-09 04:26:11 | CVSS V2 information | new | ||
2023-01-09 05:19:34 | Undergoing Analysis | Awaiting Analysis | Vulnerability Status | updated |
2023-01-09 05:19:35 | CVSS V3 information | new | ||
2023-01-09 05:19:35 | CVSS V2 information | new | ||
2023-01-09 18:24:18 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-09 18:24:21 | CVSS V3 information | new | ||
2023-01-09 18:24:21 | CVSS V2 information | new | ||
2023-01-11 02:16:58 | 2023-01-11T01:40:32 | CVE Modified Date | updated | |
2023-01-11 02:16:58 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-11 02:16:59 | Weakness Enumeration | update | ||
2023-01-11 02:17:00 | CPE Information | updated | ||
2023-01-11 02:17:00 | CVSS V3 information | new | ||
2023-01-11 02:17:00 | CVSS V2 information | new |