{"id":"CVE-2021-36773","details":"uBlock Origin before 1.36.2 and nMatrix before 4.4.9 support an arbitrary depth of parameter nesting for strict blocking, which allows crafted web sites to cause a denial of service (unbounded recursion that can trigger memory consumption and a loss of all blocking functionality).","modified":"2026-04-09T08:09:11.992990Z","published":"2021-07-18T04:15:08.110Z","references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/06/msg00024.html"},{"type":"REPORT","url":"https://news.ycombinator.com/item?id=27833752"},{"type":"EVIDENCE","url":"https://github.com/vtriolet/writings/blob/main/posts/2021/ublock_origin_and_umatrix_denial_of_service.adoc"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gorhill/ublock","events":[{"introduced":"0"},{"fixed":"8b5733a58d3acf9fb62815e14699c986bd1c2fdc"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.36.2"}]}},{"type":"GIT","repo":"https://github.com/gorhill/umatrix","events":[{"introduced":"0"},{"fixed":"be3990e24e39f46a22dadb247028bae75621d75d"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.4.2"}]}}],"versions":["0.1.0.2","0.2.0.0","0.2.0.1","0.2.1.0","0.2.1.1","0.2.1.2","0.2.2.0","0.2.2.1","0.2.3.0","0.2.3.1","0.2.3.2","0.2.3.3","0.2.3.4","0.2.3.5","0.3.0.0","0.3.0.1","0.3.0.2","0.3.1.0","0.3.1.1","0.3.1.2","0.3.1.3","0.3.2.0","0.3.2.1","0.3.2.2","0.3.2.3","0.4.0.0","0.4.0.1","0.5.0.0","0.5.0.1","0.5.1.0","0.5.2.0","0.5.3.0","0.5.5.0","0.5.5.1","0.5.5.2","0.5.6.0","0.6.0.0","0.6.0.1","0.6.1.0","0.6.2.0","0.6.3.0","0.6.3.1","0.6.3.2","0.6.3.3","0.6.4.0","0.6.5.0","0.6.6.0","0.7.0.0","0.7.0.1","0.7.0.10","0.7.0.11","0.7.0.2","0.7.0.3","0.7.0.4","0.7.0.5","0.7.0.6","0.7.0.7","0.7.0.8","0.7.0.9","0.7.2.0","0.7.2.1","0.8.0.0","0.8.0.0-alpha.10","0.8.0.0-alpha.11","0.8.0.0-alpha.14","0.8.0.0-alpha.15","0.8.0.0-alpha.16","0.8.0.0-alpha.17","0.8.0.0-alpha.18","0.8.0.0-alpha.19","0.8.0.0-alpha.2","0.8.0.0-alpha.3","0.8.0.0-alpha.4","0.8.0.0-alpha.6","0.8.0.0-alpha.7","0.8.0.0-alpha.8","0.8.0.0-alpha.9","0.8.0.0-rc.0","0.8.0.0-rc.1","0.8.0.0-rc.2","0.8.0.1","0.8.1.0","0.8.1.1","0.8.1.2","0.8.1.3","0.8.1.4","0.8.2.0","0.8.2.1","0.8.2.2","0.8.2.3","0.8.5.0","0.8.5.1","0.8.5.2","0.8.5.3","0.8.5.4-beta.0","0.8.5.5","0.8.5.6","0.8.6.0","0.8.7.0","0.8.8.0","0.8.8.1","0.8.8.2","0.8.8.3","0.8.8.4","0.8.9.0","0.8.9.1","0.9.0.0","0.9.0.1","0.9.1.0","0.9.1.1","0.9.1.2","0.9.2.0","0.9.2.1","0.9.3.0","0.9.3.1","0.9.3.3","0.9.3.4","0.9.3.6","0.9.4.0","0.9.4.1","0.9.4.2","0.9.4.3","0.9.4.4","0.9.4.5","0.9.5.0","0.9.6.0","0.9.7.0","0.9.7.5","0.9.8.0","0.9.8.1","0.9.8.2","0.9.8.3","0.9.8.5","0.9.8.6","0.9.9.0","0.9.9.1","0.9.9.2","1.0.0","1.0.0.0","1.0.0.1","1.1.0","1.1.0.0","1.1.0.1","1.1.1","1.1.10","1.1.12","1.1.14","1.1.16","1.1.18","1.1.20","1.1.4","1.1.6","1.1.8","1.10.0","1.10.2","1.11.0","1.11.2","1.12.0","1.12.1","1.13.0","1.13.10","1.13.2","1.13.4","1.13.8","1.14.0","1.14.12","1.14.14","1.14.20","1.14.22","1.14.4","1.14.6","1.14.8","1.15.0","1.15.12","1.15.14","1.15.16","1.15.18","1.15.2","1.15.20","1.15.22","1.15.24","1.15.4","1.16.0","1.16.10","1.16.12","1.16.14","1.16.2","1.16.4","1.16.6","1.17.0","1.17.4","1.18.0","1.18.10","1.18.12","1.18.14","1.18.16","1.18.2","1.18.4","1.18.6","1.18.8","1.19.0","1.2.0","1.2.1","1.20.0","1.21.0","1.22.0","1.23.0","1.24.0","1.25.0","1.25.2","1.26.0","1.27.0","1.28.0","1.29.0","1.3.0","1.3.1","1.3.10","1.3.12","1.3.14","1.3.16","1.3.2","1.3.3","1.3.4","1.3.6","1.3.8","1.30.0","1.31.0","1.32.0","1.33.0","1.34.0","1.35.0","1.35.2","1.36.0","1.4.0","1.5.0","1.5.1","1.5.3","1.6.0","1.6.1","1.6.2","1.6.3","1.6.4","1.6.6","1.6.8","1.7.0","1.7.2","1.7.4","1.7.6","1.8.0","1.9.0","1.9.12","1.9.16","1.9.2","1.9.4","1.9.6","1.9.8"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"4.4.9"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-36773.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}