{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T15:17:21.767","vulnerabilities":[{"cve":{"id":"CVE-2021-39537","sourceIdentifier":"cve@mitre.org","published":"2021-09-20T16:15:12.477","lastModified":"2024-11-21T06:19:38.517","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow."},{"lang":"es","value":"Se ha detectado un problema en ncurses versiones hasta v6.2-1. La función  _nc_captoinfo en el archivo captoinfo.c presenta un desbordamiento de búfer en la región heap de la memoria"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:ncurses:*:*:*:*:*:*:*:*","versionEndIncluding":"6.2.1","matchCriteriaId":"A503C728-34E7-46FB-B7FE-0098E21DEB95"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x:10.12.6:*:*:*:*:*:*:*","matchCriteriaId":"E84CE847-550E-445B-8972-2FB5BCF6B04F"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:11.7:*:*:*:*:*:*:*","matchCriteriaId":"F88F919B-09C2-433C-B416-24E3A8664045"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:13.0:*:*:*:*:*:*:*","matchCriteriaId":"669C9F3E-1DE9-4770-B611-04404D3A19D3"}]}]}],"references":[{"url":"http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup","source":"cve@mitre.org","tags":["Patch","Third Party Advisory"]},{"url":"http://seclists.org/fulldisclosure/2022/Oct/28","source":"cve@mitre.org","tags":["Mailing List","Third Party Advisory"]},{"url":"http://seclists.org/fulldisclosure/2022/Oct/41","source":"cve@mitre.org","tags":["Mailing List","Third Party Advisory"]},{"url":"http://seclists.org/fulldisclosure/2022/Oct/43","source":"cve@mitre.org","tags":["Mailing List","Third Party Advisory"]},{"url":"http://seclists.org/fulldisclosure/2022/Oct/45","source":"cve@mitre.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00004.html","source":"cve@mitre.org"},{"url":"https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html","source":"cve@mitre.org","tags":["Exploit","Mailing List","Vendor Advisory"]},{"url":"https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html","source":"cve@mitre.org","tags":["Mailing List","Vendor Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20230427-0012/","source":"cve@mitre.org"},{"url":"https://support.apple.com/kb/HT213443","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://support.apple.com/kb/HT213444","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://support.apple.com/kb/HT213488","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"http://seclists.org/fulldisclosure/2022/Oct/28","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://seclists.org/fulldisclosure/2022/Oct/41","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://seclists.org/fulldisclosure/2022/Oct/43","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://seclists.org/fulldisclosure/2022/Oct/45","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00004.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.gnu.org/archive/html/bug-ncurses/2020-08/msg00006.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mailing List","Vendor Advisory"]},{"url":"https://lists.gnu.org/archive/html/bug-ncurses/2021-10/msg00023.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Vendor Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20230427-0012/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://support.apple.com/kb/HT213443","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://support.apple.com/kb/HT213444","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://support.apple.com/kb/HT213488","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}