{"api_version":"1","generated_at":"2026-04-23T08:41:52+00:00","cve":"CVE-2021-44961","urls":{"html":"https://cve.report/CVE-2021-44961","api":"https://cve.report/api/cve/CVE-2021-44961.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-44961","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-44961"},"summary":{"title":"CVE-2021-44961","description":"A memory leakage flaw exists in the class PerimeterGenerator of Slic3r libslic3r 1.3.0 and Master Commit b1a5500. Specially crafted stl files can exhaust available memory. An attacker can provide malicious files to trigger this vulnerability.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2022-03-01 02:15:00","updated_at":"2022-03-08 20:10:00"},"problem_types":["CWE-401"],"metrics":[],"references":[{"url":"https://hackmd.io/nDT_UKLyRQendxDwil9A4w","name":"https://hackmd.io/nDT_UKLyRQendxDwil9A4w","refsource":"MISC","tags":[],"title":"Slic3r libslic3r PerimeterGenerator Memory Leakage Vulnerability - HackMD","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://libslic3r.com","name":"http://libslic3r.com","refsource":"MISC","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://slic3r.com","name":"http://slic3r.com","refsource":"MISC","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-44961","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-44961","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"44961","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"slic3r","cpe5":"libslic3r","cpe6":"1.3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2021-44961","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A memory leakage flaw exists in the class PerimeterGenerator of Slic3r libslic3r 1.3.0 and Master Commit b1a5500. Specially crafted stl files can exhaust available memory. An attacker can provide malicious files to trigger this vulnerability."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"http://libslic3r.com","refsource":"MISC","name":"http://libslic3r.com"},{"url":"http://slic3r.com","refsource":"MISC","name":"http://slic3r.com"},{"refsource":"MISC","name":"https://hackmd.io/nDT_UKLyRQendxDwil9A4w","url":"https://hackmd.io/nDT_UKLyRQendxDwil9A4w"}]}},"nvd":{"publishedDate":"2022-03-01 02:15:00","lastModifiedDate":"2022-03-08 20:10:00","problem_types":["CWE-401"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":5.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.8,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:slic3r:libslic3r:1.3.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"44961","Ordinal":"222828","Title":"CVE-2021-44961","CVE":"CVE-2021-44961","Year":"2021"},"notes":[]}}}