{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T19:13:37.693","vulnerabilities":[{"cve":{"id":"CVE-2021-1252","sourceIdentifier":"psirt@cisco.com","published":"2021-04-08T05:15:12.237","lastModified":"2024-11-21T05:43:55.940","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the Excel XLM macro parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper error handling that may result in an infinite loop. An attacker could exploit this vulnerability by sending a crafted Excel file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process hang, resulting in a denial of service condition."},{"lang":"es","value":"Una vulnerabilidad en el módulo de análisis de macros Excel XLM en Clam AntiVirus (ClamAV) versiones 0.103.0 y 0.103.1 del software, podría permitir a un atacante remoto no autenticado causar una condición de denegación de servicio en un dispositivo afectado.&#xa0;La vulnerabilidad es debido a un manejo inapropiado de errores que puede resultar en un bucle infinito.&#xa0;Un atacante podría explotar esta vulnerabilidad mediante el envío de un archivo de Excel diseñado a un dispositivo afectado.&#xa0;Una explotación podría permitir al atacante causar que el proceso de escaneo de ClamAV se bloquee, resultando en una condición de denegación de servicio"}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-835"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:clamav:clamav:0.103.0:*:*:*:*:*:*:*","matchCriteriaId":"C776BACB-EE82-4BE9-86C9-C20732E42E7F"},{"vulnerable":true,"criteria":"cpe:2.3:a:clamav:clamav:0.103.1:*:*:*:*:*:*:*","matchCriteriaId":"D1E389C4-E99E-464E-9466-02204167FEB4"}]}]}],"references":[{"url":"https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html","source":"psirt@cisco.com","tags":["Release Notes","Vendor Advisory"]},{"url":"https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]}]}}]}