{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T17:27:32.753642100Z","vulnerabilities":[{"cve":{"id":"CVE-2021-32821","sourceIdentifier":"security-advisories@github.com","published":"2023-01-03T17:15:10.210","lastModified":"2024-11-21T06:07:49.157","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"MooTools is a collection of JavaScript utilities for JavaScript developers. All known versions include a CSS selector parser that is vulnerable to Regular Expression Denial of Service (ReDoS). An attack requires that an attacker can inject a string into a CSS selector at runtime, which is quite common with e.g. jQuery CSS selectors. No patches are available for this issue."},{"lang":"es","value":"MooTools es una colección de utilidades de JavaScript para desarrolladores de JavaScript. Todas las versiones conocidas incluyen un analizador selector de CSS que es vulnerable a la denegación de servicio de expresión regular (ReDoS). Un ataque requiere que un atacante pueda inyectar una cadena en un selector CSS en tiempo de ejecución, lo cual es bastante común, por ejemplo, con los selectores CSS jQuery. No hay parches disponibles para este problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":6.2,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-1333"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mootools:mootools:*:*:*:*:*:*:*:*","versionEndIncluding":"1.6.0","matchCriteriaId":"77D659B8-A7F5-47F3-8BC9-596941EFE8E9"}]}]}],"references":[{"url":"https://securitylab.github.com/advisories/GHSL-2020-345-redos-mootools/","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://securitylab.github.com/advisories/GHSL-2020-345-redos-mootools/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}