{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T21:48:21.406","vulnerabilities":[{"cve":{"id":"CVE-2021-35053","sourceIdentifier":"vulnerability@kaspersky.com","published":"2021-11-03T20:15:08.347","lastModified":"2024-11-21T06:11:45.347","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Possible system denial of service in case of arbitrary changing Firefox browser parameters. An attacker could change specific Firefox browser parameters file in a certain way and then reboot the system to make the system unbootable."},{"lang":"es","value":"Una posible denegación de servicio del sistema en caso de cambio arbitrario de los parámetros del navegador Firefox. Un atacante podría cambiar un archivo específico de parámetros del navegador Firefox de una manera determinada y luego reiniciar el sistema para hacer que el sistema no pueda arrancar"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:kaspersky:endpoint_security:*:*:*:*:*:*:*:*","versionStartIncluding":"11.1.0","versionEndIncluding":"11.6.0","matchCriteriaId":"C1EAF339-B9C2-4F0D-BAC0-DA29D3BE860D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}],"references":[{"url":"https://support.kaspersky.com/general/vulnerability.aspx?el=12430#01112021","source":"vulnerability@kaspersky.com","tags":["Broken Link"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1280/","source":"vulnerability@kaspersky.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-22-431/","source":"vulnerability@kaspersky.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://support.kaspersky.com/general/vulnerability.aspx?el=12430#01112021","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-1280/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-22-431/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}}]}