File size: 64,003 Bytes
c980379
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
{
  "file_function_focus": [
    {
      "score": 0.25626450777053833,
      "text": "CVE ID: CVE-2016-4008 State: PUBLISHED Published: 2016-05-05T18:00:00 Last Updated: 2024-08-06T00:17:30.800Z Vendors: n/a Products: n/a Problem Types: n/a Description: The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. Additional Analyst Notes: - CVE Program Container: References: - https://security.gentoo.org/glsa/201703-05 - http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html - http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=a6e0a0b58f5cdaf4e9beca5bce69c0980",
      "cve_id": "CVE-2016-4008",
      "chunk_id": 0,
      "metadata": {
        "published": "2016-05-05T18:00:00",
        "problem_types": "n/a",
        "vendors": "n/a",
        "products": "n/a",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2016/4xxx/CVE-2016-4008.json",
        "last_modified": "2024-08-06T00:17:30.800Z",
        "references": "https://security.gentoo.org/glsa/201703-05, http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html, http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625, http://www.ubuntu.com/usn/USN-2957-2, http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html, http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html, https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html, http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=f435825c0f527a8e52e6ffbc3ad0bc60531d537e, http://www.debian.org/security/2016/dsa-3568, http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html, http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html, http://www.ubuntu.com/usn/USN-2957-1, http://www.openwall.com/lists/oss-security/2016/04/11/3"
      },
      "rerank_score": 0.7202061414718628
    },
    {
      "score": 0.2438894510269165,
      "text": "e specific flaw exists within the ASN.1 parser. When parsing ASN.1 strings, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7472. Additional Analyst Notes: - CVE Program Container: References: - https://www.zerodayinitiative.com/advisories/ZDI-19-253/",
      "cve_id": "CVE-2019-6740",
      "chunk_id": 1,
      "metadata": {
        "products": "Galaxy S9",
        "problem_types": "CWE-122",
        "cwe": "CWE-122",
        "published": "2019-06-03T18:15:47",
        "severity": "CRITICAL",
        "last_modified": "2024-08-04T20:31:04.226Z",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2019/6xxx/CVE-2019-6740.json",
        "vendors": "Samsung",
        "cvss_score": 9.6,
        "references": "https://www.zerodayinitiative.com/advisories/ZDI-19-253/",
        "cvss_vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
      },
      "rerank_score": 0.0643041580915451
    },
    {
      "score": 0.24674034118652344,
      "text": "CVE ID: CVE-2009-0590 State: PUBLISHED Published: 2009-03-27T16:00:00 Last Updated: 2024-08-07T04:40:04.972Z Vendors: n/a Products: n/a Problem Types: n/a Description: The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length. Additional Analyst Notes: - CVE Program Container: References: - http://marc.info/?l=bugtraq&m=124464882609472&w=2 - http://www.vupen.com/english/advisories/2009/0850 - http://securitytracker.com/id?1021905 - http://secunia.com/advisories/34896 - http://www.mandriva",
      "cve_id": "CVE-2009-0590",
      "chunk_id": 0,
      "metadata": {
        "last_modified": "2024-08-07T04:40:04.972Z",
        "products": "n/a",
        "references": "http://marc.info/?l=bugtraq&m=124464882609472&w=2, http://www.vupen.com/english/advisories/2009/0850, http://securitytracker.com/id?1021905, http://secunia.com/advisories/34896, http://www.mandriva.com/security/advisories?name=MDVSA-2009:087, http://www.vupen.com/english/advisories/2009/1175, http://secunia.com/advisories/42724, http://www.securityfocus.com/archive/1/502429/100/0/threaded, http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html, http://wiki.rpath.com/Advisories:rPSA-2009-0057, http://www.debian.org/security/2009/dsa-1763, http://secunia.com/advisories/38794, http://lists.vmware.com/pipermail/security-announce/2010/000082.html, http://sourceforge.net/project/shownotes.php?release_id=671059&group_id=116847, http://secunia.com/advisories/34960, http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html, http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0057, http://secunia.com/advisories/34666, http://www.ubuntu.com/usn/usn-750-1, http://security.FreeBSD.org/advisories/FreeBSD-SA-09:08.openssl.asc, http://marc.info/?l=bugtraq&m=124464882609472&w=2, http://www.vupen.com/english/advisories/2009/1020, http://secunia.com/advisories/35729, http://www.redhat.com/support/errata/RHSA-2009-1335.html, http://www.osvdb.org/52864, http://secunia.com/advisories/34561, http://secunia.com/advisories/35380, http://marc.info/?l=bugtraq&m=127678688104458&w=2, http://secunia.com/advisories/42467, http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html, http://secunia.com/advisories/35065, https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html, https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10198, http://secunia.com/advisories/36533, http://www.php.net/archive/2009.php#id2009-04-08-1, http://secunia.com/advisories/34411, ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-008.txt.asc, http://www.securityfocus.com/archive/1/515055/100/0/threaded, http://secunia.com/advisories/34509, https://exchange.xforce.ibmcloud.com/vulnerabilities/49431, http://secunia.com/advisories/35181, http://sunsolve.sun.com/search/document.do?assetkey=1-26-258048-1, http://secunia.com/advisories/38834, http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html, https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6996, https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html, http://www.vupen.com/english/advisories/2010/3126, http://voodoo-circle.sourceforge.net/sa/sa-20090326-01.html, http://support.apple.com/kb/HT3865, http://www.vupen.com/english/advisories/2009/1220, http://www.openssl.org/news/secadv_20090325.txt, http://www.vupen.com/english/advisories/2009/1548, http://secunia.com/advisories/36701, http://support.avaya.com/elmodocs2/security/ASA-2009-172.htm, http://www.vmware.com/security/advisories/VMSA-2010-0019.html, http://marc.info/?l=bugtraq&m=125017764422557&w=2, https://kb.bluecoat.com/index?page=content&id=SA50, http://secunia.com/advisories/34460, http://marc.info/?l=bugtraq&m=125017764422557&w=2, http://www.securityfocus.com/bid/34256, http://secunia.com/advisories/42733, http://www.vupen.com/english/advisories/2010/0528",
        "problem_types": "n/a",
        "vendors": "n/a",
        "published": "2009-03-27T16:00:00",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2009/0xxx/CVE-2009-0590.json"
      },
      "rerank_score": 0.06226126104593277
    },
    {
      "score": 0.22262418270111084,
      "text": "CVE ID: CVE-2012-1165 State: PUBLISHED Published: 2012-03-15T17:00:00 Last Updated: 2024-08-06T18:53:36.063Z Vendors: n/a Products: n/a Problem Types: n/a Description: The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulnerability than CVE-2006-7250. Additional Analyst Notes: - CVE Program Container: References: - http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077666.html - http://rhn.redhat.com/errata/RHSA-2012-0531.html - http://h20000.www2.hp.com/bizsupport/TechSupport/Docum",
      "cve_id": "CVE-2012-1165",
      "chunk_id": 0,
      "metadata": {
        "published": "2012-03-15T17:00:00",
        "products": "n/a",
        "last_modified": "2024-08-06T18:53:36.063Z",
        "references": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077666.html, http://rhn.redhat.com/errata/RHSA-2012-0531.html, http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041, http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html, http://secunia.com/advisories/48899, https://downloads.avaya.com/css/P8/documents/100162507, http://rhn.redhat.com/errata/RHSA-2012-1308.html, http://www.openwall.com/lists/oss-security/2012/03/12/3, http://rhn.redhat.com/errata/RHSA-2012-1307.html, http://www.openwall.com/lists/oss-security/2012/03/12/6, http://rhn.redhat.com/errata/RHSA-2012-0488.html, http://www.debian.org/security/2012/dsa-2454, http://www.ubuntu.com/usn/USN-1424-1, http://secunia.com/advisories/48895, http://secunia.com/advisories/48580, http://rhn.redhat.com/errata/RHSA-2012-1306.html, http://www.securitytracker.com/id?1026787, http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077086.html, http://marc.info/?l=bugtraq&m=134039053214295&w=2, http://rhn.redhat.com/errata/RHSA-2012-0426.html, http://cvs.openssl.org/chngview?cn=22252, http://marc.info/?l=bugtraq&m=133728068926468&w=2, http://marc.info/?l=bugtraq&m=134039053214295&w=2, http://www.securityfocus.com/bid/52764, http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041, http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077221.html, http://www.openwall.com/lists/oss-security/2012/03/13/2, http://www.openwall.com/lists/oss-security/2012/03/12/7, http://marc.info/?l=bugtraq&m=133728068926468&w=2",
        "vendors": "n/a",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2012/1xxx/CVE-2012-1165.json",
        "problem_types": "n/a"
      },
      "rerank_score": 0.0578303262591362
    },
    {
      "score": 0.2591143250465393,
      "text": "CVE ID: CVE-2005-1935 State: PUBLISHED Published: 2005-06-09T04:00:00 Last Updated: 2024-08-07T22:06:57.662Z Vendors: n/a Products: n/a Problem Types: n/a Description: Heap-based buffer overflow in the BERDecBitString function in Microsoft ASN.1 library (MSASN1.DLL) allows remote attackers to execute arbitrary code via nested constructed bit strings, which leads to a realloc of a non-null pointer and causes the function to overwrite previously freed memory, as demonstrated using a SPNEGO token with a constructed bit string during HTTP authentication, and a different vulnerability than CVE-2003-0818. NOTE: the researcher has claimed that MS:MS04-007 fixes this issue. Additional Analyst Notes:",
      "cve_id": "CVE-2005-1935",
      "chunk_id": 0,
      "metadata": {
        "published": "2005-06-09T04:00:00",
        "references": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20870, http://www.phreedom.org/solar/exploits/msasn1-bitstring/",
        "vendors": "n/a",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2005/1xxx/CVE-2005-1935.json",
        "products": "n/a",
        "last_modified": "2024-08-07T22:06:57.662Z",
        "problem_types": "n/a"
      },
      "rerank_score": 0.0565408356487751
    }
  ],
  "cwe_focus": [
    {
      "score": 0.2751823663711548,
      "text": "CVE ID: CVE-2020-8939 State: PUBLISHED Published: 2020-12-15T14:55:35 Last Updated: 2024-08-04T10:12:11.010Z Severity: MEDIUM (CVSS 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N) Vendors: Google LLC Products: Asylo Problem Types: CWE-125 Description: An out of bounds read on the enc_untrusted_inet_ntop function allows an attack to extend the result size that is used by memcpy() to read memory from within the enclave heap. We recommend upgrading past commit 6ff3b77ffe110a33a2f93848a6333f33616f02c4 Additional Analyst Notes: - CVE Program Container: References: - https://github.com/google/asylo/commit/6ff3b77ffe110a33a2f93848a6333f33616f02c4",
      "cve_id": "CVE-2020-8939",
      "chunk_id": 0,
      "metadata": {
        "problem_types": "CWE-125",
        "vendors": "Google LLC",
        "last_modified": "2024-08-04T10:12:11.010Z",
        "references": "https://github.com/google/asylo/commit/6ff3b77ffe110a33a2f93848a6333f33616f02c4",
        "severity": "MEDIUM",
        "cvss_score": 5.3,
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2020/8xxx/CVE-2020-8939.json",
        "cwe": "CWE-125",
        "cvss_vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N",
        "products": "Asylo",
        "published": "2020-12-15T14:55:35"
      },
      "rerank_score": 0.12189315259456635
    },
    {
      "score": 0.26371169090270996,
      "text": "CVE ID: CVE-2021-41581 State: PUBLISHED Published: 2021-09-24T02:12:33 Last Updated: 2024-08-04T03:15:29.047Z Vendors: n/a Products: n/a Problem Types: n/a Description: x509_constraints_parse_mailbox in lib/libcrypto/x509/x509_constraints.c in LibreSSL through 3.4.0 has a stack-based buffer over-read. When the input exceeds DOMAIN_PART_MAX_LEN, the buffer lacks '\\0' termination. Additional Analyst Notes: - CVE Program Container: References: - https://github.com/libressl-portable/openbsd/issues/126",
      "cve_id": "CVE-2021-41581",
      "chunk_id": 0,
      "metadata": {
        "products": "n/a",
        "problem_types": "n/a",
        "last_modified": "2024-08-04T03:15:29.047Z",
        "references": "https://github.com/libressl-portable/openbsd/issues/126",
        "vendors": "n/a",
        "published": "2021-09-24T02:12:33",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2021/41xxx/CVE-2021-41581.json"
      },
      "rerank_score": 0.09560760110616684
    },
    {
      "score": 0.27542662620544434,
      "text": "CVE ID: CVE-2019-18840 State: PUBLISHED Published: 2019-11-09T12:58:52 Last Updated: 2024-08-05T02:02:39.610Z Severity: HIGH (CVSS 7.5 CVSS:3.0/AC:L/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N) Vendors: n/a Products: n/a Problem Types: n/a Description: In wolfSSL 4.1.0 through 4.2.0c, there are missing sanity checks of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer overflow inside the DecodedCert structure in GetName in wolfcrypt/src/asn.c because the domain name location index is mishandled. Because a pointer is overwritten, there is an invalid free. Additional Analyst Notes: - CVE Program Container: References: - https://github.c",
      "cve_id": "CVE-2019-18840",
      "chunk_id": 0,
      "metadata": {
        "cvss_vector": "CVSS:3.0/AC:L/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N",
        "severity": "HIGH",
        "last_modified": "2024-08-05T02:02:39.610Z",
        "references": "https://github.com/wolfSSL/wolfssl/issues/2555",
        "products": "n/a",
        "published": "2019-11-09T12:58:52",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2019/18xxx/CVE-2019-18840.json",
        "vendors": "n/a",
        "problem_types": "n/a",
        "cvss_score": 7.5
      },
      "rerank_score": 0.0745200663805008
    },
    {
      "score": 0.27149730920791626,
      "text": "CVE ID: CVE-2025-11680 State: PUBLISHED Published: 2025-10-20T14:04:06.854Z Last Updated: 2025-10-20T14:34:57.848Z Vendors: warmcat Products: libwebsockets Problem Types: CWE-787 Description: Out-of-bounds Write in unfilter_scanline in warmcat libwebsockets allows, when the LWS_WITH_UPNG flag is enabled during compilation and the HTML display stack is used, to write past a heap allocated buffer possibly causing a crash, when the user visits an attacker controlled website that contains a crafted PNG file with a big width value that causes an integer overflow which value is used for determining the size of a heap allocation. Additional Analyst Notes: - CISA ADP Vulnrichment: References: - http",
      "cve_id": "CVE-2025-11680",
      "chunk_id": 0,
      "metadata": {
        "last_modified": "2025-10-20T14:34:57.848Z",
        "vendors": "warmcat",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2025/11xxx/CVE-2025-11680.json",
        "published": "2025-10-20T14:04:06.854Z",
        "references": "https://libwebsockets.org/git/libwebsockets/commit?id=2b715249f39291c86443b969a1088d59b6a89b78, https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-11680",
        "products": "libwebsockets",
        "cwe": "CWE-787",
        "problem_types": "CWE-787"
      },
      "rerank_score": 0.07184864580631256
    },
    {
      "score": 0.2666282653808594,
      "text": "CVE ID: CVE-2023-1380 State: PUBLISHED Published: 2023-03-27T00:00:00 Last Updated: 2024-08-02T05:49:10.358Z Vendors: n/a Products: Kernel Problem Types: CWE-125 Description: A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service. Additional Analyst Notes: - CVE Program Container: References: - https://bugzilla.redhat.com/show_bug.cgi?id=2177883 - https://lore.kernel.org/linux-wireless/20230309104457.22628-1-jisoo.jang%40yonsei.ac.kr/T/#u - https://",
      "cve_id": "CVE-2023-1380",
      "chunk_id": 0,
      "metadata": {
        "references": "https://bugzilla.redhat.com/show_bug.cgi?id=2177883, https://lore.kernel.org/linux-wireless/20230309104457.22628-1-jisoo.jang%40yonsei.ac.kr/T/#u, https://www.openwall.com/lists/oss-security/2023/03/14/1, https://security.netapp.com/advisory/ntap-20230511-0001/, http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html, http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html, https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html, https://www.debian.org/security/2023/dsa-5480, https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
        "products": "Kernel",
        "problem_types": "CWE-125",
        "published": "2023-03-27T00:00:00",
        "last_modified": "2024-08-02T05:49:10.358Z",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2023/1xxx/CVE-2023-1380.json",
        "cwe": "CWE-125",
        "vendors": "n/a"
      },
      "rerank_score": 0.0640094131231308
    }
  ],
  "root_cause_focus": [
    {
      "score": 0.22617650032043457,
      "text": "y assumes that the source string is always null terminated. This causes a read outside of the source string triggering the buffer overflow detection. detected buffer overflow in strlen ------------[ cut here ]------------ kernel BUG at lib/string.c:1149! invalid opcode: 0000 [#1] SMP PTI CPU: 1 PID: 910 Comm: mount.ocfs2 Not tainted 5.14.0-1-amd64 #1 Debian 5.14.6-2 RIP: 0010:fortify_panic+0xf/0x11 ... Call Trace: ocfs2_initialize_super.isra.0.cold+0xc/0x18 [ocfs2] ocfs2_fill_super+0x359/0x19b0 [ocfs2] mount_bdev+0x185/0x1b0 legacy_get_tree+0x27/0x40 vfs_get_tree+0x25/0xb0 path_mount+0x454/0xa20 __x64_sys_mount+0x103/0x140 do_syscall_64+0x3b/0xc0 entry_SYSCALL_64_after_hwframe+0x44/0xae Addi",
      "cve_id": "CVE-2021-47458",
      "chunk_id": 1,
      "metadata": {
        "products": "Linux",
        "references": "https://git.kernel.org/stable/c/ac011cb3ff7a76b3e0e6e77158ee4ba2f929e1fb, https://git.kernel.org/stable/c/4b74ddcc22ee6455946e80a9c4808801f8f8561e, https://git.kernel.org/stable/c/232ed9752510de4436468b653d145565669c8498, https://git.kernel.org/stable/c/7623b1035ca2d17bde0f6a086ad6844a34648df1, https://git.kernel.org/stable/c/d3a83576378b4c904f711598dde2c5e881c4295c, https://git.kernel.org/stable/c/93be0eeea14cf39235e585c8f56df3b3859deaad, https://git.kernel.org/stable/c/0e677ea5b7396f715a76b6b0ef441430e4c4b57f, https://git.kernel.org/stable/c/b15fa9224e6e1239414525d8d556d824701849fc",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2021/47xxx/CVE-2021-47458.json",
        "last_modified": "2025-05-04T07:11:21.260Z",
        "published": "2024-05-22T06:19:46.675Z",
        "vendors": "Linux",
        "problem_types": ""
      },
      "rerank_score": 0.3580714464187622
    },
    {
      "score": 0.25088775157928467,
      "text": "CVE ID: CVE-2012-3480 State: PUBLISHED Published: 2012-08-25T10:00:00 Last Updated: 2024-08-06T20:05:12.639Z Vendors: n/a Products: n/a Problem Types: n/a Description: Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified \"related functions\" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow. Additional Analyst Notes: - CVE Program Container: References: - http://www.openwall.com/lists/oss-security/2012/08/13/4 - http://lists.fedoraproject.org/pipermail/package-announce/201",
      "cve_id": "CVE-2012-3480",
      "chunk_id": 0,
      "metadata": {
        "vendors": "n/a",
        "references": "http://www.openwall.com/lists/oss-security/2012/08/13/4, http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html, http://osvdb.org/84710, http://www.securityfocus.com/bid/54982, http://www.openwall.com/lists/oss-security/2012/08/13/6, http://rhn.redhat.com/errata/RHSA-2012-1325.html, http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html, http://sourceware.org/bugzilla/show_bug.cgi?id=14459, http://rhn.redhat.com/errata/RHSA-2012-1262.html, https://security.gentoo.org/glsa/201503-04, http://rhn.redhat.com/errata/RHSA-2012-1207.html, http://www.securitytracker.com/id?1027374, http://www.ubuntu.com/usn/USN-1589-1, http://secunia.com/advisories/50201, http://secunia.com/advisories/50422, http://rhn.redhat.com/errata/RHSA-2012-1208.html",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2012/3xxx/CVE-2012-3480.json",
        "last_modified": "2024-08-06T20:05:12.639Z",
        "problem_types": "n/a",
        "products": "n/a",
        "published": "2012-08-25T10:00:00"
      },
      "rerank_score": 0.1205206885933876
    },
    {
      "score": 0.22298675775527954,
      "text": "sized buffer data is memcpy\u2018d into, but after the memcpy a null byte is written to what is assumed to be the end of the buffer to terminate the char*, but without length checks, this null write occurs at an arbitrary offset from the buffer. An attacker can provide malicious input to trigger this vulnerability. Additional Analyst Notes: - CVE Program Container: References: - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280",
      "cve_id": "CVE-2021-21814",
      "chunk_id": 1,
      "metadata": {
        "problem_types": "stack-based buffer overflow",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2021/21xxx/CVE-2021-21814.json",
        "last_modified": "2024-08-03T18:23:29.664Z",
        "vendors": "n/a",
        "cvss_score": 7.8,
        "cvss_vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
        "published": "2021-08-13T22:39:59",
        "severity": "HIGH",
        "references": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280",
        "products": "AT&T"
      },
      "rerank_score": 0.08900631964206696
    },
    {
      "score": 0.22700989246368408,
      "text": "CVE ID: CVE-2022-49401 State: PUBLISHED Published: 2025-02-26T02:12:28.603Z Last Updated: 2025-05-04T08:36:53.713Z Vendors: Linux Products: Linux Description: In the Linux kernel, the following vulnerability has been resolved: mm/page_owner: use strscpy() instead of strlcpy() current->comm[] is not a string (no guarantee for a zero byte in it). strlcpy(s1, s2, l) is calling strlen(s2), potentially causing out-of-bound access, as reported by syzbot: detected buffer overflow in __fortify_strlen ------------[ cut here ]------------ kernel BUG at lib/string_helpers.c:980! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 4087 Comm: dhcpcd-run-hooks Not tainted 5.18.0-rc3-syzkaller-01537-g2",
      "cve_id": "CVE-2022-49401",
      "chunk_id": 0,
      "metadata": {
        "published": "2025-02-26T02:12:28.603Z",
        "products": "Linux",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2022/49xxx/CVE-2022-49401.json",
        "references": "https://git.kernel.org/stable/c/5cd9900a1ac8b0a4ff3cd97d4d77b7711be435bf, https://git.kernel.org/stable/c/cd8c1fd8cdd14158f2d8bea2d1bfe8015dccfa3a",
        "problem_types": "",
        "last_modified": "2025-05-04T08:36:53.713Z",
        "vendors": "Linux"
      },
      "rerank_score": 0.08080703765153885
    },
    {
      "score": 0.2457108497619629,
      "text": "e for the s_offset key is copied using strcpy to the buffer at $sp+0x2b0. This buffer is 32 bytes large, sending anything longer will cause a buffer overflow. Additional Analyst Notes: - CVE Program Container: References: - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0483",
      "cve_id": "CVE-2017-16337",
      "chunk_id": 1,
      "metadata": {
        "products": "Insteon Hub 2245-222",
        "severity": "HIGH",
        "last_modified": "2024-09-16T18:55:33.214Z",
        "vendors": "Insteon",
        "cvss_vector": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2017/16xxx/CVE-2017-16337.json",
        "cvss_score": 8.5,
        "problem_types": "Stack-based buffer overflow",
        "references": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0483",
        "published": "2018-08-23T15:00:00Z"
      },
      "rerank_score": 0.07241660356521606
    }
  ],
  "component_focus": [
    {
      "score": 0.2445216178894043,
      "text": "CVE ID: CVE-2025-55904 State: PUBLISHED Published: 2025-09-17T00:00:00.000Z Last Updated: 2025-09-17T14:28:46.520Z Vendors: n/a Products: n/a Problem Types: n/a Description: Open5GS v2.7.5, prior to commit 67ba7f92bbd7a378954895d96d9d7b05d5b64615, is vulnerable to a NULL pointer dereference when a multipart/related HTTP POST request with an empty HTTP body is sent to the SBI of either AMF, AUSF, BSF, NRF, NSSF, PCF, SMF, UDM, or UDR, resulting in a denial of service. This occurs in the parse_multipart function in lib/sbi/message.c. Additional Analyst Notes: - CISA ADP Vulnrichment: References: - https://github.com/open5gs/open5gs/commit/67ba7f92bbd7a378954895d96d9d7b05d5b64615 - https://gith",
      "cve_id": "CVE-2025-55904",
      "chunk_id": 0,
      "metadata": {
        "published": "2025-09-17T00:00:00.000Z",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2025/55xxx/CVE-2025-55904.json",
        "last_modified": "2025-09-17T14:28:46.520Z",
        "vendors": "n/a",
        "problem_types": "n/a",
        "references": "https://github.com/open5gs/open5gs/commit/67ba7f92bbd7a378954895d96d9d7b05d5b64615, https://github.com/open5gs/open5gs/issues/3942, https://github.com/tsiamoulis/vuln-research/tree/main/CVE-2025-55904",
        "products": "n/a"
      },
      "rerank_score": 0.9995604157447815
    },
    {
      "score": 0.2402043342590332,
      "text": "CVE ID: CVE-2008-1673 State: PUBLISHED Published: 2008-06-10T00:00:00 Last Updated: 2024-08-07T08:32:01.473Z Vendors: n/a Products: n/a Problem Types: n/a Description: The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6 and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic modules; and (b) the gxsnmp package; does not properly validate length values during decoding of ASN.1 BER data, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a length greater than the working buffer, which can lead to an unspecified overflow; (2) an oid length of zero, which can lead to an off-by-one error; or (3) an indefinite length for ",
      "cve_id": "CVE-2008-1673",
      "chunk_id": 0,
      "metadata": {
        "products": "n/a",
        "published": "2008-06-10T00:00:00",
        "problem_types": "n/a",
        "references": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html, http://secunia.com/advisories/30000, http://secunia.com/advisories/30658, http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0189, http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html, http://www.securityfocus.com/bid/29589, http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ddb2c43594f22843e9f3153da151deaba1a834c5, http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html, http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html, https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00587.html, http://secunia.com/advisories/32104, http://secunia.com/advisories/30982, http://secunia.com/advisories/30580, http://www.securityfocus.com/archive/1/493300/100/0/threaded, https://exchange.xforce.ibmcloud.com/vulnerabilities/42921, http://secunia.com/advisories/30644, http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html, http://secunia.com/advisories/32103, http://www.mandriva.com/security/advisories?name=MDVSA-2008:113, http://www.securitytracker.com/id?1020210, http://www.mandriva.com/security/advisories?name=MDVSA-2008:174, http://secunia.com/advisories/32759, http://www.vupen.com/english/advisories/2008/1770, http://secunia.com/advisories/31107, http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.5, http://secunia.com/advisories/32370, http://secunia.com/advisories/31836, http://www.ubuntu.com/usn/usn-625-1, https://bugzilla.redhat.com/show_bug.cgi?id=443962, http://www.debian.org/security/2008/dsa-1592, http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html, http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html, http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=33afb8403f361919aa5c8fe1d0a4f5ddbfbbea3c, http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.6",
        "vendors": "n/a",
        "last_modified": "2024-08-07T08:32:01.473Z",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2008/1xxx/CVE-2008-1673.json"
      },
      "rerank_score": 0.10628625750541687
    },
    {
      "score": 0.2239304780960083,
      "text": "CVE ID: CVE-2005-1935 State: PUBLISHED Published: 2005-06-09T04:00:00 Last Updated: 2024-08-07T22:06:57.662Z Vendors: n/a Products: n/a Problem Types: n/a Description: Heap-based buffer overflow in the BERDecBitString function in Microsoft ASN.1 library (MSASN1.DLL) allows remote attackers to execute arbitrary code via nested constructed bit strings, which leads to a realloc of a non-null pointer and causes the function to overwrite previously freed memory, as demonstrated using a SPNEGO token with a constructed bit string during HTTP authentication, and a different vulnerability than CVE-2003-0818. NOTE: the researcher has claimed that MS:MS04-007 fixes this issue. Additional Analyst Notes:",
      "cve_id": "CVE-2005-1935",
      "chunk_id": 0,
      "metadata": {
        "vendors": "n/a",
        "last_modified": "2024-08-07T22:06:57.662Z",
        "problem_types": "n/a",
        "products": "n/a",
        "references": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20870, http://www.phreedom.org/solar/exploits/msasn1-bitstring/",
        "published": "2005-06-09T04:00:00",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2005/1xxx/CVE-2005-1935.json"
      },
      "rerank_score": 0.08243680745363235
    },
    {
      "score": 0.2558332681655884,
      "text": "CVE ID: CVE-2012-2131 State: PUBLISHED Published: 2012-04-24T20:00:00 Last Updated: 2024-08-06T19:26:08.465Z Vendors: n/a Products: n/a Problem Types: n/a Description: Multiple integer signedness errors in crypto/buffer/buffer.c in OpenSSL 0.9.8v allow remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-2110. Additional Analyst Notes: - CVE Program Container: References: - http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00014.ht",
      "cve_id": "CVE-2012-2131",
      "chunk_id": 0,
      "metadata": {
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2012/2xxx/CVE-2012-2131.json",
        "references": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00014.html, http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00007.html, http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564, http://www.mandriva.com/security/advisories?name=MDVSA-2012:064, http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673, http://www.ubuntu.com/usn/USN-1428-1, http://cvs.openssl.org/chngview?cn=22479, http://www.openssl.org/news/secadv_20120424.txt, http://www.debian.org/security/2012/dsa-2454, http://support.apple.com/kb/HT5784, http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html, http://secunia.com/advisories/48895, https://exchange.xforce.ibmcloud.com/vulnerabilities/75099, http://secunia.com/advisories/48956, http://www.openwall.com/lists/oss-security/2012/04/24/1, http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00015.html, http://marc.info/?l=bugtraq&m=134039053214295&w=2, http://secunia.com/advisories/57353, http://marc.info/?l=bugtraq&m=133728068926468&w=2, http://marc.info/?l=bugtraq&m=134039053214295&w=2, http://www.securitytracker.com/id?1026957, http://www.securityfocus.com/bid/53212, http://marc.info/?l=bugtraq&m=133728068926468&w=2",
        "problem_types": "n/a",
        "vendors": "n/a",
        "last_modified": "2024-08-06T19:26:08.465Z",
        "products": "n/a",
        "published": "2012-04-24T20:00:00"
      },
      "rerank_score": 0.08150697499513626
    },
    {
      "score": 0.2544565200805664,
      "text": "CVE ID: CVE-2012-2110 State: PUBLISHED Published: 2012-04-19T17:00:00 Last Updated: 2024-08-06T19:26:07.655Z Vendors: n/a Products: n/a Problem Types: n/a Description: The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. Additional Analyst Notes: - CVE Program Container: References: - http://lists.opensuse.org/opensuse-security-announce/2",
      "cve_id": "CVE-2012-2110",
      "chunk_id": 0,
      "metadata": {
        "problem_types": "n/a",
        "vendors": "n/a",
        "last_modified": "2024-08-06T19:26:07.655Z",
        "published": "2012-04-19T17:00:00",
        "products": "n/a",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2012/2xxx/CVE-2012-2110.json",
        "references": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00014.html, http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00007.html, http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564, https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862, http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html, http://secunia.com/advisories/48899, http://archives.neohapsis.com/archives/fulldisclosure/2012-04/0209.html, http://rhn.redhat.com/errata/RHSA-2012-1308.html, http://cvs.openssl.org/chngview?cn=22434, http://www.mandriva.com/security/advisories?name=MDVSA-2012:060, http://rhn.redhat.com/errata/RHSA-2012-1307.html, http://www.exploit-db.com/exploits/18756, http://rhn.redhat.com/errata/RHSA-2012-0518.html, http://www.debian.org/security/2012/dsa-2454, http://support.apple.com/kb/HT5784, http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html, http://www.ubuntu.com/usn/USN-1424-1, http://secunia.com/advisories/48895, http://secunia.com/advisories/48847, http://cvs.openssl.org/chngview?cn=22439, http://rhn.redhat.com/errata/RHSA-2012-1306.html, http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00015.html, http://rhn.redhat.com/errata/RHSA-2012-0522.html, http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079149.html, http://marc.info/?l=bugtraq&m=134039053214295&w=2, http://secunia.com/advisories/57353, http://www.securityfocus.com/bid/53158, http://marc.info/?l=bugtraq&m=133728068926468&w=2, http://marc.info/?l=bugtraq&m=134039053214295&w=2, http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080176.html, http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578, http://marc.info/?l=bugtraq&m=133951357207000&w=2, http://secunia.com/advisories/48942, http://www.openssl.org/news/secadv_20120419.txt, http://cvs.openssl.org/chngview?cn=22431, http://www.securitytracker.com/id?1026957, http://secunia.com/advisories/48999, http://marc.info/?l=bugtraq&m=133951357207000&w=2, http://osvdb.org/81223, https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862, http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079299.html, https://kb.juniper.net/KB27376, http://marc.info/?l=bugtraq&m=133728068926468&w=2"
      },
      "rerank_score": 0.07558979094028473
    }
  ],
  "technical_pattern_focus": [
    {
      "score": 0.29820066690444946,
      "text": "c' in cifs_strndup_to_utf16 and returns NULL early to prevent dereferencing NULL pointer. Found by Linux Verification Center (linuxtesting.org) with SVACE Additional Analyst Notes: - CVE Program Container: References: - https://git.kernel.org/stable/c/65b98a7e65e7a8f3894d8760cd194eaf20504c99 - https://git.kernel.org/stable/c/1cfa5dd05847137f0fb3ce74ced80c0b4858d716 - https://git.kernel.org/stable/c/1f797f062b5cf13a1c2bcc23285361baaa7c9260 - https://git.kernel.org/stable/c/3c26a8d30ed6b53a52a023ec537dc50a6d34a67a - https://git.kernel.org/stable/c/70bccd9855dae56942f2b18a08ba137bb54093a0",
      "cve_id": "CVE-2025-39838",
      "chunk_id": 1,
      "metadata": {
        "references": "https://git.kernel.org/stable/c/65b98a7e65e7a8f3894d8760cd194eaf20504c99, https://git.kernel.org/stable/c/1cfa5dd05847137f0fb3ce74ced80c0b4858d716, https://git.kernel.org/stable/c/1f797f062b5cf13a1c2bcc23285361baaa7c9260, https://git.kernel.org/stable/c/3c26a8d30ed6b53a52a023ec537dc50a6d34a67a, https://git.kernel.org/stable/c/70bccd9855dae56942f2b18a08ba137bb54093a0",
        "published": "2025-09-19T15:26:13.506Z",
        "problem_types": "",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2025/39xxx/CVE-2025-39838.json",
        "vendors": "Linux",
        "products": "Linux",
        "last_modified": "2025-11-03T17:43:52.863Z"
      },
      "rerank_score": 0.6811597347259521
    },
    {
      "score": 0.2855958938598633,
      "text": " buffer is already full but cp, the cursor position, is in the middle of the buffer, then we will write past the end of the supplied buffer. Fix this by replacing the dubious strncpy() calls with memmove()/memcpy() calls plus explicit boundary checks to make sure we have enough space before we start moving characters around. Additional Analyst Notes: - CVE Program Container: - CISA ADP Vulnrichment: References: - https://git.kernel.org/stable/c/fb824a99e148ff272a53d71d84122728b5f00992 - https://git.kernel.org/stable/c/ddd2972d8e2dee3b33e8121669d55def59f0be8a - https://git.kernel.org/stable/c/cfdc2fa4db57503bc6d3817240547c8ddc55fa96 - https://git.kernel.org/stable/c/f636a40834d22e5e3fc748f060",
      "cve_id": "CVE-2024-39480",
      "chunk_id": 1,
      "metadata": {
        "products": "Linux",
        "vendors": "Linux",
        "last_modified": "2025-05-04T09:16:41.644Z",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2024/39xxx/CVE-2024-39480.json",
        "references": "https://git.kernel.org/stable/c/fb824a99e148ff272a53d71d84122728b5f00992, https://git.kernel.org/stable/c/ddd2972d8e2dee3b33e8121669d55def59f0be8a, https://git.kernel.org/stable/c/cfdc2fa4db57503bc6d3817240547c8ddc55fa96, https://git.kernel.org/stable/c/f636a40834d22e5e3fc748f060211879c056cd33, https://git.kernel.org/stable/c/33d9c814652b971461d1e30bead6792851c209e7, https://git.kernel.org/stable/c/107e825cc448b7834b31e8b1b3cf0f57426d46d5, https://git.kernel.org/stable/c/f694da720dcf795dc3eb97bf76d220213f76aaa7, https://git.kernel.org/stable/c/e9730744bf3af04cda23799029342aa3cddbc454",
        "published": "2024-07-05T06:55:09.241Z",
        "problem_types": ""
      },
      "rerank_score": 0.1396441012620926
    },
    {
      "score": 0.25617337226867676,
      "text": " ']', strchr() returns NULL, and a call to g_strdup(start + 1) leads to a null pointer dereference. This vulnerability is fixed in 1.24.10. Additional Analyst Notes: - CISA ADP Vulnrichment: - CVE Program Container: References: - https://securitylab.github.com/advisories/GHSL-2024-263_Gstreamer/ - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8039.patch - https://gstreamer.freedesktop.org/security/sa-2024-0029.html",
      "cve_id": "CVE-2024-47835",
      "chunk_id": 1,
      "metadata": {
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2024/47xxx/CVE-2024-47835.json",
        "references": "https://securitylab.github.com/advisories/GHSL-2024-263_Gstreamer/, https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8039.patch, https://gstreamer.freedesktop.org/security/sa-2024-0029.html",
        "vendors": "gstreamer",
        "published": "2024-12-11T19:17:26.688Z",
        "cwe": "CWE-476",
        "problem_types": "CWE-476",
        "last_modified": "2025-11-03T22:21:51.646Z",
        "products": "gstreamer"
      },
      "rerank_score": 0.1372045874595642
    },
    {
      "score": 0.2788669466972351,
      "text": "CVE ID: CVE-2023-0216 State: PUBLISHED Published: 2023-02-08T19:03:05.652Z Last Updated: 2025-11-04T19:14:34.082Z Vendors: OpenSSL Products: OpenSSL Problem Types: invalid pointer dereference Description: An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions. The result of the dereference is an application crash which could lead to a denial of service attack. The TLS implementation in OpenSSL does not call this function however third party applications might call these functions on untrusted data. Additional Analyst Notes: - CVE Program Container: - CISA ADP Vulnrichment",
      "cve_id": "CVE-2023-0216",
      "chunk_id": 0,
      "metadata": {
        "products": "OpenSSL",
        "last_modified": "2025-11-04T19:14:34.082Z",
        "published": "2023-02-08T19:03:05.652Z",
        "vendors": "OpenSSL",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2023/0xxx/CVE-2023-0216.json",
        "problem_types": "invalid pointer dereference",
        "references": "https://www.openssl.org/news/secadv/20230207.txt, https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=934a04f0e775309cadbef0aa6b9692e1b12a76c6, https://security.gentoo.org/glsa/202402-08"
      },
      "rerank_score": 0.10002315044403076
    },
    {
      "score": 0.29868656396865845,
      "text": "when 0 (from the Content-Length) is passed to the function cfl_sds_len, which in turn tries to cast a NULL pointer into struct cfl_sds. This is related to process_payload_traces_proto_ng() at opentelemetry_prot.c. Additional Analyst Notes: - CISA ADP Vulnrichment: References: - https://fluentbit.io/announcements/ - https://github.com/fluent/fluent-bit/releases - https://www.ebryx.com/blogs/exploring-cve-2024-50608-and-cve-2024-50609",
      "cve_id": "CVE-2024-50609",
      "chunk_id": 1,
      "metadata": {
        "problem_types": "n/a",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2024/50xxx/CVE-2024-50609.json",
        "published": "2025-02-18T00:00:00.000Z",
        "products": "n/a",
        "last_modified": "2025-02-19T14:58:22.328Z",
        "references": "https://fluentbit.io/announcements/, https://github.com/fluent/fluent-bit/releases, https://www.ebryx.com/blogs/exploring-cve-2024-50608-and-cve-2024-50609",
        "vendors": "n/a"
      },
      "rerank_score": 0.09550007432699203
    }
  ],
  "temporal_focus": [
    {
      "score": 0.2402409315109253,
      "text": "CVE ID: CVE-2009-0590 State: PUBLISHED Published: 2009-03-27T16:00:00 Last Updated: 2024-08-07T04:40:04.972Z Vendors: n/a Products: n/a Problem Types: n/a Description: The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length. Additional Analyst Notes: - CVE Program Container: References: - http://marc.info/?l=bugtraq&m=124464882609472&w=2 - http://www.vupen.com/english/advisories/2009/0850 - http://securitytracker.com/id?1021905 - http://secunia.com/advisories/34896 - http://www.mandriva",
      "cve_id": "CVE-2009-0590",
      "chunk_id": 0,
      "metadata": {
        "problem_types": "n/a",
        "last_modified": "2024-08-07T04:40:04.972Z",
        "vendors": "n/a",
        "products": "n/a",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2009/0xxx/CVE-2009-0590.json",
        "references": "http://marc.info/?l=bugtraq&m=124464882609472&w=2, http://www.vupen.com/english/advisories/2009/0850, http://securitytracker.com/id?1021905, http://secunia.com/advisories/34896, http://www.mandriva.com/security/advisories?name=MDVSA-2009:087, http://www.vupen.com/english/advisories/2009/1175, http://secunia.com/advisories/42724, http://www.securityfocus.com/archive/1/502429/100/0/threaded, http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html, http://wiki.rpath.com/Advisories:rPSA-2009-0057, http://www.debian.org/security/2009/dsa-1763, http://secunia.com/advisories/38794, http://lists.vmware.com/pipermail/security-announce/2010/000082.html, http://sourceforge.net/project/shownotes.php?release_id=671059&group_id=116847, http://secunia.com/advisories/34960, http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html, http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0057, http://secunia.com/advisories/34666, http://www.ubuntu.com/usn/usn-750-1, http://security.FreeBSD.org/advisories/FreeBSD-SA-09:08.openssl.asc, http://marc.info/?l=bugtraq&m=124464882609472&w=2, http://www.vupen.com/english/advisories/2009/1020, http://secunia.com/advisories/35729, http://www.redhat.com/support/errata/RHSA-2009-1335.html, http://www.osvdb.org/52864, http://secunia.com/advisories/34561, http://secunia.com/advisories/35380, http://marc.info/?l=bugtraq&m=127678688104458&w=2, http://secunia.com/advisories/42467, http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html, http://secunia.com/advisories/35065, https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html, https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10198, http://secunia.com/advisories/36533, http://www.php.net/archive/2009.php#id2009-04-08-1, http://secunia.com/advisories/34411, ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-008.txt.asc, http://www.securityfocus.com/archive/1/515055/100/0/threaded, http://secunia.com/advisories/34509, https://exchange.xforce.ibmcloud.com/vulnerabilities/49431, http://secunia.com/advisories/35181, http://sunsolve.sun.com/search/document.do?assetkey=1-26-258048-1, http://secunia.com/advisories/38834, http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html, https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6996, https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html, http://www.vupen.com/english/advisories/2010/3126, http://voodoo-circle.sourceforge.net/sa/sa-20090326-01.html, http://support.apple.com/kb/HT3865, http://www.vupen.com/english/advisories/2009/1220, http://www.openssl.org/news/secadv_20090325.txt, http://www.vupen.com/english/advisories/2009/1548, http://secunia.com/advisories/36701, http://support.avaya.com/elmodocs2/security/ASA-2009-172.htm, http://www.vmware.com/security/advisories/VMSA-2010-0019.html, http://marc.info/?l=bugtraq&m=125017764422557&w=2, https://kb.bluecoat.com/index?page=content&id=SA50, http://secunia.com/advisories/34460, http://marc.info/?l=bugtraq&m=125017764422557&w=2, http://www.securityfocus.com/bid/34256, http://secunia.com/advisories/42733, http://www.vupen.com/english/advisories/2010/0528",
        "published": "2009-03-27T16:00:00"
      },
      "rerank_score": 0.9808268547058105
    },
    {
      "score": 0.22816550731658936,
      "text": "CVE ID: CVE-2012-2131 State: PUBLISHED Published: 2012-04-24T20:00:00 Last Updated: 2024-08-06T19:26:08.465Z Vendors: n/a Products: n/a Problem Types: n/a Description: Multiple integer signedness errors in crypto/buffer/buffer.c in OpenSSL 0.9.8v allow remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-2110. Additional Analyst Notes: - CVE Program Container: References: - http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00014.ht",
      "cve_id": "CVE-2012-2131",
      "chunk_id": 0,
      "metadata": {
        "vendors": "n/a",
        "products": "n/a",
        "published": "2012-04-24T20:00:00",
        "problem_types": "n/a",
        "references": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00014.html, http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00007.html, http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564, http://www.mandriva.com/security/advisories?name=MDVSA-2012:064, http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673, http://www.ubuntu.com/usn/USN-1428-1, http://cvs.openssl.org/chngview?cn=22479, http://www.openssl.org/news/secadv_20120424.txt, http://www.debian.org/security/2012/dsa-2454, http://support.apple.com/kb/HT5784, http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html, http://secunia.com/advisories/48895, https://exchange.xforce.ibmcloud.com/vulnerabilities/75099, http://secunia.com/advisories/48956, http://www.openwall.com/lists/oss-security/2012/04/24/1, http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00015.html, http://marc.info/?l=bugtraq&m=134039053214295&w=2, http://secunia.com/advisories/57353, http://marc.info/?l=bugtraq&m=133728068926468&w=2, http://marc.info/?l=bugtraq&m=134039053214295&w=2, http://www.securitytracker.com/id?1026957, http://www.securityfocus.com/bid/53212, http://marc.info/?l=bugtraq&m=133728068926468&w=2",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2012/2xxx/CVE-2012-2131.json",
        "last_modified": "2024-08-06T19:26:08.465Z"
      },
      "rerank_score": 0.09194397181272507
    },
    {
      "score": 0.23902076482772827,
      "text": "CVE ID: CVE-2012-3405 State: PUBLISHED Published: 2014-02-10T17:00:00 Last Updated: 2024-08-06T20:05:12.277Z Vendors: n/a Products: n/a Problem Types: n/a Description: The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (segmentation fault and crash) via a format string with a large number of format specifiers that triggers \"desynchronization within the buffer size handling,\" a different vulnerability than CVE-2012-3404. Additional Analyst Notes: - CVE Progr",
      "cve_id": "CVE-2012-3405",
      "chunk_id": 0,
      "metadata": {
        "references": "http://rhn.redhat.com/errata/RHSA-2012-1200.html, https://bugzilla.redhat.com/show_bug.cgi?id=833704, https://sourceware.org/bugzilla/show_bug.cgi?id=13446, https://security.gentoo.org/glsa/201503-04, http://rhn.redhat.com/errata/RHSA-2012-1098.html, http://www.ubuntu.com/usn/USN-1589-1, http://www.openwall.com/lists/oss-security/2012/07/11/17",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2012/3xxx/CVE-2012-3405.json",
        "problem_types": "n/a",
        "vendors": "n/a",
        "products": "n/a",
        "last_modified": "2024-08-06T20:05:12.277Z",
        "published": "2014-02-10T17:00:00"
      },
      "rerank_score": 0.09069297462701797
    },
    {
      "score": 0.22998183965682983,
      "text": "CVE ID: CVE-2014-0160 State: PUBLISHED Published: 2014-04-07T00:00:00.000Z Last Updated: 2025-10-22T00:05:38.217Z Vendors: n/a Products: n/a Problem Types: n/a Description: The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug. Additional Analyst Notes: - CVE Program Container: - CISA ADP Vulnrichment: References: - https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36",
      "cve_id": "CVE-2014-0160",
      "chunk_id": 0,
      "metadata": {
        "products": "n/a",
        "problem_types": "n/a",
        "references": "https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217, http://www.securitytracker.com/id/1030077, http://seclists.org/fulldisclosure/2014/Apr/90, http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/, http://www.debian.org/security/2014/dsa-2896, http://marc.info/?l=bugtraq&m=139774054614965&w=2, http://marc.info/?l=bugtraq&m=139889113431619&w=2, http://rhn.redhat.com/errata/RHSA-2014-0396.html, http://marc.info/?l=bugtraq&m=139835815211508&w=2, http://marc.info/?l=bugtraq&m=141287864628122&w=2, http://www.kb.cert.org/vuls/id/720951, http://www.splunk.com/view/SP-CAAAMB3, http://marc.info/?l=bugtraq&m=139905295427946&w=2, http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0, http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf, http://marc.info/?l=bugtraq&m=139833395230364&w=2, http://www-01.ibm.com/support/docview.wss?uid=swg21670161, http://www.vmware.com/security/advisories/VMSA-2014-0012.html, http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html, http://marc.info/?l=bugtraq&m=142660345230545&w=2, http://seclists.org/fulldisclosure/2014/Apr/109, http://marc.info/?l=bugtraq&m=140724451518351&w=2, http://www.securitytracker.com/id/1030080, http://secunia.com/advisories/57836, http://www-01.ibm.com/support/docview.wss?uid=isg400001843, http://marc.info/?l=bugtraq&m=139808058921905&w=2, http://marc.info/?l=bugtraq&m=139758572430452&w=2, http://www.securityfocus.com/bid/66690, http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf, https://filezilla-project.org/versions.php?type=server, http://marc.info/?l=bugtraq&m=139843768401936&w=2, http://secunia.com/advisories/57483, http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed, http://www.kerio.com/support/kerio-control/release-history, http://advisories.mageia.org/MGASA-2014-0165.html, http://www.blackberry.com/btsc/KB35882, http://marc.info/?l=bugtraq&m=142660345230545&w=2, http://marc.info/?l=bugtraq&m=140075368411126&w=2, http://marc.info/?l=bugtraq&m=139905351928096&w=2, http://www.securitytracker.com/id/1030081, http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.html, http://www.securityfocus.com/archive/1/534161/100/0/threaded, http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.html, https://bugzilla.redhat.com/show_bug.cgi?id=1084875, http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html, http://www-01.ibm.com/support/docview.wss?uid=isg400001841, http://marc.info/?l=bugtraq&m=139824993005633&w=2, http://www.securitytracker.com/id/1030079, http://rhn.redhat.com/errata/RHSA-2014-0377.html, http://marc.info/?l=bugtraq&m=139722163017074&w=2, http://marc.info/?l=bugtraq&m=139889295732144&w=2, https://code.google.com/p/mod-spdy/issues/detail?id=85, http://marc.info/?l=bugtraq&m=139765756720506&w=2, http://marc.info/?l=bugtraq&m=139774703817488&w=2, http://marc.info/?l=bugtraq&m=139905202427693&w=2, http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/, http://heartbleed.com/, http://marc.info/?l=bugtraq&m=139817782017443&w=2, http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01, http://marc.info/?l=bugtraq&m=140015787404650&w=2, http://cogentdatahub.com/ReleaseNotes.html, http://marc.info/?l=bugtraq&m=139869720529462&w=2, http://marc.info/?l=bugtraq&m=139842151128341&w=2, http://marc.info/?l=bugtraq&m=139905243827825&w=2, http://marc.info/?l=bugtraq&m=139905458328378&w=2, http://www.f-secure.com/en/web/labs_global/fsc-2014-1, http://www.us-cert.gov/ncas/alerts/TA14-098A, http://secunia.com/advisories/57347, https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.html, http://seclists.org/fulldisclosure/2014/Apr/173, https://blog.torproject.org/blog/openssl-bug-cve-2014-0160, http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html, http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html, https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html, http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9f379b0c154650d6c108e9a3, https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04260637-4%257CdocLocale%253Den_US%257CcalledBy%253DSearch_Result&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken, http://seclists.org/fulldisclosure/2014/Dec/23, http://marc.info/?l=bugtraq&m=139905653828999&w=2, http://www.ubuntu.com/usn/USN-2165-1, http://rhn.redhat.com/errata/RHSA-2014-0378.html, http://marc.info/?l=bugtraq&m=139757919027752&w=2, http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html, http://www.exploit-db.com/exploits/32764, http://marc.info/?l=bugtraq&m=139757726426985&w=2, http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00, http://marc.info/?l=bugtraq&m=139869891830365&w=2, http://marc.info/?l=bugtraq&m=139905868529690&w=2, http://marc.info/?l=bugtraq&m=139817685517037&w=2, http://marc.info/?l=bugtraq&m=140752315422991&w=2, http://seclists.org/fulldisclosure/2014/Apr/91, http://www.securitytracker.com/id/1030078, http://secunia.com/advisories/59243, http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661, http://marc.info/?l=bugtraq&m=139836085512508&w=2, http://marc.info/?l=bugtraq&m=139824923705461&w=2, http://rhn.redhat.com/errata/RHSA-2014-0376.html, http://marc.info/?l=bugtraq&m=139835844111589&w=2, http://www.mandriva.com/security/advisories?name=MDVSA-2015:062, https://www.cert.fi/en/reports/2014/vulnerability788210.html, http://secunia.com/advisories/57721, http://secunia.com/advisories/57968, http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/, http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3, http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html, http://marc.info/?l=bugtraq&m=139905405728262&w=2, http://www.securitytracker.com/id/1030082, http://marc.info/?l=bugtraq&m=139757819327350&w=2, http://www.exploit-db.com/exploits/32745, http://seclists.org/fulldisclosure/2014/Apr/190, http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/, http://marc.info/?l=bugtraq&m=139817727317190&w=2, https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008, http://www.openssl.org/news/secadv_20140407.txt, https://gist.github.com/chapmajs/10473815, http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=1, http://www.securitytracker.com/id/1030074, http://support.citrix.com/article/CTX140605, http://secunia.com/advisories/59139, http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/, http://secunia.com/advisories/57966, http://www.securitytracker.com/id/1030026, http://secunia.com/advisories/59347, https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E, https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E, https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html, https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E, https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf, https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E, https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd",
        "published": "2014-04-07T00:00:00.000Z",
        "last_modified": "2025-10-22T00:05:38.217Z",
        "vendors": "n/a",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2014/0xxx/CVE-2014-0160.json"
      },
      "rerank_score": 0.08813377469778061
    },
    {
      "score": 0.22405391931533813,
      "text": "CVE ID: CVE-2019-16748 State: PUBLISHED Published: 2019-09-24T12:12:38 Last Updated: 2024-08-05T01:24:47.098Z Vendors: n/a Products: n/a Problem Types: n/a Description: In wolfSSL through 4.1.0, there is a missing sanity check of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer over-read in CheckCertSignature_ex in wolfcrypt/src/asn.c. Additional Analyst Notes: - CVE Program Container: References: - https://github.com/wolfSSL/wolfssl/issues/2459",
      "cve_id": "CVE-2019-16748",
      "chunk_id": 0,
      "metadata": {
        "last_modified": "2024-08-05T01:24:47.098Z",
        "published": "2019-09-24T12:12:38",
        "products": "n/a",
        "problem_types": "n/a",
        "source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2019/16xxx/CVE-2019-16748.json",
        "vendors": "n/a",
        "references": "https://github.com/wolfSSL/wolfssl/issues/2459"
      },
      "rerank_score": 0.06333654373884201
    }
  ]
}