{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T02:25:53.725","vulnerabilities":[{"cve":{"id":"CVE-2021-23411","sourceIdentifier":"report@snyk.io","published":"2021-07-21T15:15:15.703","lastModified":"2024-11-21T05:51:40.077","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the main functionality. It accepts input that can result in the output (an anchor a tag) containing undesirable Javascript code that can be executed upon user interaction."},{"lang":"es","value":"Las versiones afectadas de este paquete son vulnerables al Cross-site Scripting (XSS) a través de la funcionalidad principal. Acepta entradas que pueden resultar en la salida (un ancla una etiqueta) que contiene código Javascript no deseado que puede ser ejecutado en la interacción del usuario"}],"metrics":{"cvssMetricV31":[{"source":"report@snyk.io","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:anchorme_project:anchorme:*:*:*:*:*:node.js:*:*","matchCriteriaId":"EB362AB9-D981-494B-9411-7888B5FFB97F"}]}]}],"references":[{"url":"https://github.com/alexcorvi/anchorme.js/blob/gh-pages/src/transform.ts%23L81","source":"report@snyk.io","tags":["Broken Link"]},{"url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1320695","source":"report@snyk.io","tags":["Exploit","Third Party Advisory"]},{"url":"https://snyk.io/vuln/SNYK-JS-ANCHORME-1311008","source":"report@snyk.io","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/alexcorvi/anchorme.js/blob/gh-pages/src/transform.ts%23L81","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1320695","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://snyk.io/vuln/SNYK-JS-ANCHORME-1311008","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}