{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T20:41:53.122","vulnerabilities":[{"cve":{"id":"CVE-2021-47663","sourceIdentifier":"info@cert.vde.com","published":"2025-04-24T10:15:16.703","lastModified":"2025-04-29T13:52:47.470","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"Due to improper JSON Web Tokens implementation an unauthenticated remote attacker can guess a valid session ID and therefore impersonate a user to gain full access."},{"lang":"es","value":"Debido a una implementación incorrecta de tokens web JSON, un atacante remoto no autenticado puede adivinar una ID de sesión válida y, por lo tanto, hacerse pasar por un usuario para obtener acceso completo."}],"metrics":{"cvssMetricV31":[{"source":"info@cert.vde.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:H\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H","baseScore":8.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9}]},"weaknesses":[{"source":"info@cert.vde.com","type":"Secondary","description":[{"lang":"en","value":"CWE-613"}]}],"references":[{"url":"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2351978921001657","source":"info@cert.vde.com"}]}}]}