{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T11:38:54.771","vulnerabilities":[{"cve":{"id":"CVE-2021-4280","sourceIdentifier":"cna@vuldb.com","published":"2022-12-25T20:15:25.687","lastModified":"2024-11-21T06:37:18.407","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability was found in styler_praat_scripts. It has been classified as problematic. Affected is an unknown function of the file file_segmenter.praat of the component Slash Handler. The manipulation leads to denial of service. It is possible to launch the attack remotely. The name of the patch is 0cad44aa4a3eb0ecdba071c10eaff16023d8b35f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216780."},{"lang":"es","value":"Se encontró una vulnerabilidad en styler_praat_scripts. Ha sido clasificada como problemática. Una función desconocida del archivo file_segmenter.praat del componente Slash Handler es afectada por esta vulnerabilidad. La manipulación conduce a la denegación del servicio. Es posible lanzar el ataque de forma remota. El nombre del parche es 0cad44aa4a3eb0ecdba071c10eaff16023d8b35f. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-216780."}],"metrics":{"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"cna@vuldb.com","type":"Secondary","description":[{"lang":"en","value":"CWE-404"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-404"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:styler_praat_scripts_project:styler_praat_scripts:*:*:*:*:*:*:*:*","versionEndExcluding":"2021-11-24","matchCriteriaId":"C484B28D-560F-451F-9762-C7258E2EAE22"}]}]}],"references":[{"url":"https://github.com/stylerw/styler_praat_scripts/commit/0cad44aa4a3eb0ecdba071c10eaff16023d8b35f","source":"cna@vuldb.com","tags":["Patch","Third Party Advisory"]},{"url":"https://vuldb.com/?ctiid.216780","source":"cna@vuldb.com","tags":["Third Party Advisory"]},{"url":"https://vuldb.com/?id.216780","source":"cna@vuldb.com","tags":["Third Party Advisory"]},{"url":"https://github.com/stylerw/styler_praat_scripts/commit/0cad44aa4a3eb0ecdba071c10eaff16023d8b35f","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://vuldb.com/?ctiid.216780","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://vuldb.com/?id.216780","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}