Vulnerability Details CVE-2021-3811
adminlte is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 40.7%
CVSS Severity
CVSS v3 Score 6.7
CVSS v2 Score 4.3
Products affected by CVE-2021-3811
-
cpe:2.3:a:pi-hole:web_interface:-
-
cpe:2.3:a:pi-hole:web_interface:0.1
-
cpe:2.3:a:pi-hole:web_interface:1.0
-
cpe:2.3:a:pi-hole:web_interface:1.0.0
-
cpe:2.3:a:pi-hole:web_interface:1.1
-
cpe:2.3:a:pi-hole:web_interface:1.1.0
-
cpe:2.3:a:pi-hole:web_interface:1.1.1
-
cpe:2.3:a:pi-hole:web_interface:1.1.2
-
cpe:2.3:a:pi-hole:web_interface:1.1.3
-
cpe:2.3:a:pi-hole:web_interface:1.1.4
-
cpe:2.3:a:pi-hole:web_interface:1.1.5
-
cpe:2.3:a:pi-hole:web_interface:1.1.6
-
cpe:2.3:a:pi-hole:web_interface:1.1.7
-
cpe:2.3:a:pi-hole:web_interface:1.2
-
cpe:2.3:a:pi-hole:web_interface:1.2.1
-
cpe:2.3:a:pi-hole:web_interface:1.3
-
cpe:2.3:a:pi-hole:web_interface:1.3.0
-
cpe:2.3:a:pi-hole:web_interface:1.4
-
cpe:2.3:a:pi-hole:web_interface:1.4.1
-
cpe:2.3:a:pi-hole:web_interface:1.4.2
-
cpe:2.3:a:pi-hole:web_interface:1.4.3
-
cpe:2.3:a:pi-hole:web_interface:1.4.3.1
-
cpe:2.3:a:pi-hole:web_interface:1.4.3.1a
-
cpe:2.3:a:pi-hole:web_interface:1.4.4
-
cpe:2.3:a:pi-hole:web_interface:1.4.4.1
-
cpe:2.3:a:pi-hole:web_interface:1.4.4.2
-
cpe:2.3:a:pi-hole:web_interface:2.0.0
-
cpe:2.3:a:pi-hole:web_interface:2.0.1
-
cpe:2.3:a:pi-hole:web_interface:2.0.2
-
cpe:2.3:a:pi-hole:web_interface:2.0.3
-
cpe:2.3:a:pi-hole:web_interface:2.0.4
-
cpe:2.3:a:pi-hole:web_interface:2.0.5
-
cpe:2.3:a:pi-hole:web_interface:2.1.0
-
cpe:2.3:a:pi-hole:web_interface:2.1.1
-
cpe:2.3:a:pi-hole:web_interface:2.1.2
-
cpe:2.3:a:pi-hole:web_interface:2.2.0
-
cpe:2.3:a:pi-hole:web_interface:2.3
-
cpe:2.3:a:pi-hole:web_interface:2.3.1
-
cpe:2.3:a:pi-hole:web_interface:2.4
-
cpe:2.3:a:pi-hole:web_interface:2.5
-
cpe:2.3:a:pi-hole:web_interface:2.5.1
-
cpe:2.3:a:pi-hole:web_interface:2.5.2
-
cpe:2.3:a:pi-hole:web_interface:3.0
-
cpe:2.3:a:pi-hole:web_interface:3.0.1
-
cpe:2.3:a:pi-hole:web_interface:3.0.1a
-
cpe:2.3:a:pi-hole:web_interface:3.1
-
cpe:2.3:a:pi-hole:web_interface:3.2
-
cpe:2.3:a:pi-hole:web_interface:3.2.1
-
cpe:2.3:a:pi-hole:web_interface:3.3
-
cpe:2.3:a:pi-hole:web_interface:4.0
-
cpe:2.3:a:pi-hole:web_interface:4.1
-
cpe:2.3:a:pi-hole:web_interface:4.1.1
-
cpe:2.3:a:pi-hole:web_interface:4.2
-
cpe:2.3:a:pi-hole:web_interface:4.3
-
cpe:2.3:a:pi-hole:web_interface:4.3.2
-
cpe:2.3:a:pi-hole:web_interface:4.3.3
-
cpe:2.3:a:pi-hole:web_interface:5.0
-
cpe:2.3:a:pi-hole:web_interface:5.1
-
cpe:2.3:a:pi-hole:web_interface:5.1.1
-
cpe:2.3:a:pi-hole:web_interface:5.2
-
cpe:2.3:a:pi-hole:web_interface:5.2.1
-
cpe:2.3:a:pi-hole:web_interface:5.2.2
-
cpe:2.3:a:pi-hole:web_interface:5.3
-
cpe:2.3:a:pi-hole:web_interface:5.3.1
-
cpe:2.3:a:pi-hole:web_interface:5.3.2
-
cpe:2.3:a:pi-hole:web_interface:5.4
-
cpe:2.3:a:pi-hole:web_interface:5.5
-
cpe:2.3:a:pi-hole:web_interface:5.5.1