rag-mixedbread / artifacts /decomposed_query_results.json
Kushalkhemka's picture
Upload rag_mixedbread scripts and artifacts
c980379 verified
{
"file_function_focus": [
{
"score": 0.25626450777053833,
"text": "CVE ID: CVE-2016-4008 State: PUBLISHED Published: 2016-05-05T18:00:00 Last Updated: 2024-08-06T00:17:30.800Z Vendors: n/a Products: n/a Problem Types: n/a Description: The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate. Additional Analyst Notes: - CVE Program Container: References: - https://security.gentoo.org/glsa/201703-05 - http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html - http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=a6e0a0b58f5cdaf4e9beca5bce69c0980",
"cve_id": "CVE-2016-4008",
"chunk_id": 0,
"metadata": {
"published": "2016-05-05T18:00:00",
"problem_types": "n/a",
"vendors": "n/a",
"products": "n/a",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2016/4xxx/CVE-2016-4008.json",
"last_modified": "2024-08-06T00:17:30.800Z",
"references": "https://security.gentoo.org/glsa/201703-05, http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html, http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625, http://www.ubuntu.com/usn/USN-2957-2, http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html, http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html, https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html, http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=f435825c0f527a8e52e6ffbc3ad0bc60531d537e, http://www.debian.org/security/2016/dsa-3568, http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html, http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html, http://www.ubuntu.com/usn/USN-2957-1, http://www.openwall.com/lists/oss-security/2016/04/11/3"
},
"rerank_score": 0.7202061414718628
},
{
"score": 0.2438894510269165,
"text": "e specific flaw exists within the ASN.1 parser. When parsing ASN.1 strings, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7472. Additional Analyst Notes: - CVE Program Container: References: - https://www.zerodayinitiative.com/advisories/ZDI-19-253/",
"cve_id": "CVE-2019-6740",
"chunk_id": 1,
"metadata": {
"products": "Galaxy S9",
"problem_types": "CWE-122",
"cwe": "CWE-122",
"published": "2019-06-03T18:15:47",
"severity": "CRITICAL",
"last_modified": "2024-08-04T20:31:04.226Z",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2019/6xxx/CVE-2019-6740.json",
"vendors": "Samsung",
"cvss_score": 9.6,
"references": "https://www.zerodayinitiative.com/advisories/ZDI-19-253/",
"cvss_vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"
},
"rerank_score": 0.0643041580915451
},
{
"score": 0.24674034118652344,
"text": "CVE ID: CVE-2009-0590 State: PUBLISHED Published: 2009-03-27T16:00:00 Last Updated: 2024-08-07T04:40:04.972Z Vendors: n/a Products: n/a Problem Types: n/a Description: The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length. Additional Analyst Notes: - CVE Program Container: References: - http://marc.info/?l=bugtraq&m=124464882609472&w=2 - http://www.vupen.com/english/advisories/2009/0850 - http://securitytracker.com/id?1021905 - http://secunia.com/advisories/34896 - http://www.mandriva",
"cve_id": "CVE-2009-0590",
"chunk_id": 0,
"metadata": {
"last_modified": "2024-08-07T04:40:04.972Z",
"products": "n/a",
"references": "http://marc.info/?l=bugtraq&m=124464882609472&w=2, http://www.vupen.com/english/advisories/2009/0850, http://securitytracker.com/id?1021905, http://secunia.com/advisories/34896, http://www.mandriva.com/security/advisories?name=MDVSA-2009:087, http://www.vupen.com/english/advisories/2009/1175, http://secunia.com/advisories/42724, http://www.securityfocus.com/archive/1/502429/100/0/threaded, http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html, http://wiki.rpath.com/Advisories:rPSA-2009-0057, http://www.debian.org/security/2009/dsa-1763, http://secunia.com/advisories/38794, http://lists.vmware.com/pipermail/security-announce/2010/000082.html, http://sourceforge.net/project/shownotes.php?release_id=671059&group_id=116847, http://secunia.com/advisories/34960, http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html, http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0057, http://secunia.com/advisories/34666, http://www.ubuntu.com/usn/usn-750-1, http://security.FreeBSD.org/advisories/FreeBSD-SA-09:08.openssl.asc, http://marc.info/?l=bugtraq&m=124464882609472&w=2, http://www.vupen.com/english/advisories/2009/1020, http://secunia.com/advisories/35729, http://www.redhat.com/support/errata/RHSA-2009-1335.html, http://www.osvdb.org/52864, http://secunia.com/advisories/34561, http://secunia.com/advisories/35380, http://marc.info/?l=bugtraq&m=127678688104458&w=2, http://secunia.com/advisories/42467, http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html, http://secunia.com/advisories/35065, https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html, https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10198, http://secunia.com/advisories/36533, http://www.php.net/archive/2009.php#id2009-04-08-1, http://secunia.com/advisories/34411, ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-008.txt.asc, http://www.securityfocus.com/archive/1/515055/100/0/threaded, http://secunia.com/advisories/34509, https://exchange.xforce.ibmcloud.com/vulnerabilities/49431, http://secunia.com/advisories/35181, http://sunsolve.sun.com/search/document.do?assetkey=1-26-258048-1, http://secunia.com/advisories/38834, http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html, https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6996, https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html, http://www.vupen.com/english/advisories/2010/3126, http://voodoo-circle.sourceforge.net/sa/sa-20090326-01.html, http://support.apple.com/kb/HT3865, http://www.vupen.com/english/advisories/2009/1220, http://www.openssl.org/news/secadv_20090325.txt, http://www.vupen.com/english/advisories/2009/1548, http://secunia.com/advisories/36701, http://support.avaya.com/elmodocs2/security/ASA-2009-172.htm, http://www.vmware.com/security/advisories/VMSA-2010-0019.html, http://marc.info/?l=bugtraq&m=125017764422557&w=2, https://kb.bluecoat.com/index?page=content&id=SA50, http://secunia.com/advisories/34460, http://marc.info/?l=bugtraq&m=125017764422557&w=2, http://www.securityfocus.com/bid/34256, http://secunia.com/advisories/42733, http://www.vupen.com/english/advisories/2010/0528",
"problem_types": "n/a",
"vendors": "n/a",
"published": "2009-03-27T16:00:00",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2009/0xxx/CVE-2009-0590.json"
},
"rerank_score": 0.06226126104593277
},
{
"score": 0.22262418270111084,
"text": "CVE ID: CVE-2012-1165 State: PUBLISHED Published: 2012-03-15T17:00:00 Last Updated: 2024-08-06T18:53:36.063Z Vendors: n/a Products: n/a Problem Types: n/a Description: The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulnerability than CVE-2006-7250. Additional Analyst Notes: - CVE Program Container: References: - http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077666.html - http://rhn.redhat.com/errata/RHSA-2012-0531.html - http://h20000.www2.hp.com/bizsupport/TechSupport/Docum",
"cve_id": "CVE-2012-1165",
"chunk_id": 0,
"metadata": {
"published": "2012-03-15T17:00:00",
"products": "n/a",
"last_modified": "2024-08-06T18:53:36.063Z",
"references": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077666.html, http://rhn.redhat.com/errata/RHSA-2012-0531.html, http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041, http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html, http://secunia.com/advisories/48899, https://downloads.avaya.com/css/P8/documents/100162507, http://rhn.redhat.com/errata/RHSA-2012-1308.html, http://www.openwall.com/lists/oss-security/2012/03/12/3, http://rhn.redhat.com/errata/RHSA-2012-1307.html, http://www.openwall.com/lists/oss-security/2012/03/12/6, http://rhn.redhat.com/errata/RHSA-2012-0488.html, http://www.debian.org/security/2012/dsa-2454, http://www.ubuntu.com/usn/USN-1424-1, http://secunia.com/advisories/48895, http://secunia.com/advisories/48580, http://rhn.redhat.com/errata/RHSA-2012-1306.html, http://www.securitytracker.com/id?1026787, http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077086.html, http://marc.info/?l=bugtraq&m=134039053214295&w=2, http://rhn.redhat.com/errata/RHSA-2012-0426.html, http://cvs.openssl.org/chngview?cn=22252, http://marc.info/?l=bugtraq&m=133728068926468&w=2, http://marc.info/?l=bugtraq&m=134039053214295&w=2, http://www.securityfocus.com/bid/52764, http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041, http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077221.html, http://www.openwall.com/lists/oss-security/2012/03/13/2, http://www.openwall.com/lists/oss-security/2012/03/12/7, http://marc.info/?l=bugtraq&m=133728068926468&w=2",
"vendors": "n/a",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2012/1xxx/CVE-2012-1165.json",
"problem_types": "n/a"
},
"rerank_score": 0.0578303262591362
},
{
"score": 0.2591143250465393,
"text": "CVE ID: CVE-2005-1935 State: PUBLISHED Published: 2005-06-09T04:00:00 Last Updated: 2024-08-07T22:06:57.662Z Vendors: n/a Products: n/a Problem Types: n/a Description: Heap-based buffer overflow in the BERDecBitString function in Microsoft ASN.1 library (MSASN1.DLL) allows remote attackers to execute arbitrary code via nested constructed bit strings, which leads to a realloc of a non-null pointer and causes the function to overwrite previously freed memory, as demonstrated using a SPNEGO token with a constructed bit string during HTTP authentication, and a different vulnerability than CVE-2003-0818. NOTE: the researcher has claimed that MS:MS04-007 fixes this issue. Additional Analyst Notes:",
"cve_id": "CVE-2005-1935",
"chunk_id": 0,
"metadata": {
"published": "2005-06-09T04:00:00",
"references": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20870, http://www.phreedom.org/solar/exploits/msasn1-bitstring/",
"vendors": "n/a",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2005/1xxx/CVE-2005-1935.json",
"products": "n/a",
"last_modified": "2024-08-07T22:06:57.662Z",
"problem_types": "n/a"
},
"rerank_score": 0.0565408356487751
}
],
"cwe_focus": [
{
"score": 0.2751823663711548,
"text": "CVE ID: CVE-2020-8939 State: PUBLISHED Published: 2020-12-15T14:55:35 Last Updated: 2024-08-04T10:12:11.010Z Severity: MEDIUM (CVSS 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N) Vendors: Google LLC Products: Asylo Problem Types: CWE-125 Description: An out of bounds read on the enc_untrusted_inet_ntop function allows an attack to extend the result size that is used by memcpy() to read memory from within the enclave heap. We recommend upgrading past commit 6ff3b77ffe110a33a2f93848a6333f33616f02c4 Additional Analyst Notes: - CVE Program Container: References: - https://github.com/google/asylo/commit/6ff3b77ffe110a33a2f93848a6333f33616f02c4",
"cve_id": "CVE-2020-8939",
"chunk_id": 0,
"metadata": {
"problem_types": "CWE-125",
"vendors": "Google LLC",
"last_modified": "2024-08-04T10:12:11.010Z",
"references": "https://github.com/google/asylo/commit/6ff3b77ffe110a33a2f93848a6333f33616f02c4",
"severity": "MEDIUM",
"cvss_score": 5.3,
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2020/8xxx/CVE-2020-8939.json",
"cwe": "CWE-125",
"cvss_vector": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N",
"products": "Asylo",
"published": "2020-12-15T14:55:35"
},
"rerank_score": 0.12189315259456635
},
{
"score": 0.26371169090270996,
"text": "CVE ID: CVE-2021-41581 State: PUBLISHED Published: 2021-09-24T02:12:33 Last Updated: 2024-08-04T03:15:29.047Z Vendors: n/a Products: n/a Problem Types: n/a Description: x509_constraints_parse_mailbox in lib/libcrypto/x509/x509_constraints.c in LibreSSL through 3.4.0 has a stack-based buffer over-read. When the input exceeds DOMAIN_PART_MAX_LEN, the buffer lacks '\\0' termination. Additional Analyst Notes: - CVE Program Container: References: - https://github.com/libressl-portable/openbsd/issues/126",
"cve_id": "CVE-2021-41581",
"chunk_id": 0,
"metadata": {
"products": "n/a",
"problem_types": "n/a",
"last_modified": "2024-08-04T03:15:29.047Z",
"references": "https://github.com/libressl-portable/openbsd/issues/126",
"vendors": "n/a",
"published": "2021-09-24T02:12:33",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2021/41xxx/CVE-2021-41581.json"
},
"rerank_score": 0.09560760110616684
},
{
"score": 0.27542662620544434,
"text": "CVE ID: CVE-2019-18840 State: PUBLISHED Published: 2019-11-09T12:58:52 Last Updated: 2024-08-05T02:02:39.610Z Severity: HIGH (CVSS 7.5 CVSS:3.0/AC:L/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N) Vendors: n/a Products: n/a Problem Types: n/a Description: In wolfSSL 4.1.0 through 4.2.0c, there are missing sanity checks of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer overflow inside the DecodedCert structure in GetName in wolfcrypt/src/asn.c because the domain name location index is mishandled. Because a pointer is overwritten, there is an invalid free. Additional Analyst Notes: - CVE Program Container: References: - https://github.c",
"cve_id": "CVE-2019-18840",
"chunk_id": 0,
"metadata": {
"cvss_vector": "CVSS:3.0/AC:L/AV:N/A:H/C:N/I:N/PR:N/S:U/UI:N",
"severity": "HIGH",
"last_modified": "2024-08-05T02:02:39.610Z",
"references": "https://github.com/wolfSSL/wolfssl/issues/2555",
"products": "n/a",
"published": "2019-11-09T12:58:52",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2019/18xxx/CVE-2019-18840.json",
"vendors": "n/a",
"problem_types": "n/a",
"cvss_score": 7.5
},
"rerank_score": 0.0745200663805008
},
{
"score": 0.27149730920791626,
"text": "CVE ID: CVE-2025-11680 State: PUBLISHED Published: 2025-10-20T14:04:06.854Z Last Updated: 2025-10-20T14:34:57.848Z Vendors: warmcat Products: libwebsockets Problem Types: CWE-787 Description: Out-of-bounds Write in unfilter_scanline in warmcat libwebsockets allows, when the LWS_WITH_UPNG flag is enabled during compilation and the HTML display stack is used, to write past a heap allocated buffer possibly causing a crash, when the user visits an attacker controlled website that contains a crafted PNG file with a big width value that causes an integer overflow which value is used for determining the size of a heap allocation. Additional Analyst Notes: - CISA ADP Vulnrichment: References: - http",
"cve_id": "CVE-2025-11680",
"chunk_id": 0,
"metadata": {
"last_modified": "2025-10-20T14:34:57.848Z",
"vendors": "warmcat",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2025/11xxx/CVE-2025-11680.json",
"published": "2025-10-20T14:04:06.854Z",
"references": "https://libwebsockets.org/git/libwebsockets/commit?id=2b715249f39291c86443b969a1088d59b6a89b78, https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-11680",
"products": "libwebsockets",
"cwe": "CWE-787",
"problem_types": "CWE-787"
},
"rerank_score": 0.07184864580631256
},
{
"score": 0.2666282653808594,
"text": "CVE ID: CVE-2023-1380 State: PUBLISHED Published: 2023-03-27T00:00:00 Last Updated: 2024-08-02T05:49:10.358Z Vendors: n/a Products: Kernel Problem Types: CWE-125 Description: A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service. Additional Analyst Notes: - CVE Program Container: References: - https://bugzilla.redhat.com/show_bug.cgi?id=2177883 - https://lore.kernel.org/linux-wireless/20230309104457.22628-1-jisoo.jang%40yonsei.ac.kr/T/#u - https://",
"cve_id": "CVE-2023-1380",
"chunk_id": 0,
"metadata": {
"references": "https://bugzilla.redhat.com/show_bug.cgi?id=2177883, https://lore.kernel.org/linux-wireless/20230309104457.22628-1-jisoo.jang%40yonsei.ac.kr/T/#u, https://www.openwall.com/lists/oss-security/2023/03/14/1, https://security.netapp.com/advisory/ntap-20230511-0001/, http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html, http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html, https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html, https://www.debian.org/security/2023/dsa-5480, https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
"products": "Kernel",
"problem_types": "CWE-125",
"published": "2023-03-27T00:00:00",
"last_modified": "2024-08-02T05:49:10.358Z",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2023/1xxx/CVE-2023-1380.json",
"cwe": "CWE-125",
"vendors": "n/a"
},
"rerank_score": 0.0640094131231308
}
],
"root_cause_focus": [
{
"score": 0.22617650032043457,
"text": "y assumes that the source string is always null terminated. This causes a read outside of the source string triggering the buffer overflow detection. detected buffer overflow in strlen ------------[ cut here ]------------ kernel BUG at lib/string.c:1149! invalid opcode: 0000 [#1] SMP PTI CPU: 1 PID: 910 Comm: mount.ocfs2 Not tainted 5.14.0-1-amd64 #1 Debian 5.14.6-2 RIP: 0010:fortify_panic+0xf/0x11 ... Call Trace: ocfs2_initialize_super.isra.0.cold+0xc/0x18 [ocfs2] ocfs2_fill_super+0x359/0x19b0 [ocfs2] mount_bdev+0x185/0x1b0 legacy_get_tree+0x27/0x40 vfs_get_tree+0x25/0xb0 path_mount+0x454/0xa20 __x64_sys_mount+0x103/0x140 do_syscall_64+0x3b/0xc0 entry_SYSCALL_64_after_hwframe+0x44/0xae Addi",
"cve_id": "CVE-2021-47458",
"chunk_id": 1,
"metadata": {
"products": "Linux",
"references": "https://git.kernel.org/stable/c/ac011cb3ff7a76b3e0e6e77158ee4ba2f929e1fb, https://git.kernel.org/stable/c/4b74ddcc22ee6455946e80a9c4808801f8f8561e, https://git.kernel.org/stable/c/232ed9752510de4436468b653d145565669c8498, https://git.kernel.org/stable/c/7623b1035ca2d17bde0f6a086ad6844a34648df1, https://git.kernel.org/stable/c/d3a83576378b4c904f711598dde2c5e881c4295c, https://git.kernel.org/stable/c/93be0eeea14cf39235e585c8f56df3b3859deaad, https://git.kernel.org/stable/c/0e677ea5b7396f715a76b6b0ef441430e4c4b57f, https://git.kernel.org/stable/c/b15fa9224e6e1239414525d8d556d824701849fc",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2021/47xxx/CVE-2021-47458.json",
"last_modified": "2025-05-04T07:11:21.260Z",
"published": "2024-05-22T06:19:46.675Z",
"vendors": "Linux",
"problem_types": ""
},
"rerank_score": 0.3580714464187622
},
{
"score": 0.25088775157928467,
"text": "CVE ID: CVE-2012-3480 State: PUBLISHED Published: 2012-08-25T10:00:00 Last Updated: 2024-08-06T20:05:12.639Z Vendors: n/a Products: n/a Problem Types: n/a Description: Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified \"related functions\" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow. Additional Analyst Notes: - CVE Program Container: References: - http://www.openwall.com/lists/oss-security/2012/08/13/4 - http://lists.fedoraproject.org/pipermail/package-announce/201",
"cve_id": "CVE-2012-3480",
"chunk_id": 0,
"metadata": {
"vendors": "n/a",
"references": "http://www.openwall.com/lists/oss-security/2012/08/13/4, http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html, http://osvdb.org/84710, http://www.securityfocus.com/bid/54982, http://www.openwall.com/lists/oss-security/2012/08/13/6, http://rhn.redhat.com/errata/RHSA-2012-1325.html, http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html, http://sourceware.org/bugzilla/show_bug.cgi?id=14459, http://rhn.redhat.com/errata/RHSA-2012-1262.html, https://security.gentoo.org/glsa/201503-04, http://rhn.redhat.com/errata/RHSA-2012-1207.html, http://www.securitytracker.com/id?1027374, http://www.ubuntu.com/usn/USN-1589-1, http://secunia.com/advisories/50201, http://secunia.com/advisories/50422, http://rhn.redhat.com/errata/RHSA-2012-1208.html",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2012/3xxx/CVE-2012-3480.json",
"last_modified": "2024-08-06T20:05:12.639Z",
"problem_types": "n/a",
"products": "n/a",
"published": "2012-08-25T10:00:00"
},
"rerank_score": 0.1205206885933876
},
{
"score": 0.22298675775527954,
"text": "sized buffer data is memcpy\u2018d into, but after the memcpy a null byte is written to what is assumed to be the end of the buffer to terminate the char*, but without length checks, this null write occurs at an arbitrary offset from the buffer. An attacker can provide malicious input to trigger this vulnerability. Additional Analyst Notes: - CVE Program Container: References: - https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280",
"cve_id": "CVE-2021-21814",
"chunk_id": 1,
"metadata": {
"problem_types": "stack-based buffer overflow",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2021/21xxx/CVE-2021-21814.json",
"last_modified": "2024-08-03T18:23:29.664Z",
"vendors": "n/a",
"cvss_score": 7.8,
"cvss_vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"published": "2021-08-13T22:39:59",
"severity": "HIGH",
"references": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1280",
"products": "AT&T"
},
"rerank_score": 0.08900631964206696
},
{
"score": 0.22700989246368408,
"text": "CVE ID: CVE-2022-49401 State: PUBLISHED Published: 2025-02-26T02:12:28.603Z Last Updated: 2025-05-04T08:36:53.713Z Vendors: Linux Products: Linux Description: In the Linux kernel, the following vulnerability has been resolved: mm/page_owner: use strscpy() instead of strlcpy() current->comm[] is not a string (no guarantee for a zero byte in it). strlcpy(s1, s2, l) is calling strlen(s2), potentially causing out-of-bound access, as reported by syzbot: detected buffer overflow in __fortify_strlen ------------[ cut here ]------------ kernel BUG at lib/string_helpers.c:980! invalid opcode: 0000 [#1] PREEMPT SMP KASAN CPU: 0 PID: 4087 Comm: dhcpcd-run-hooks Not tainted 5.18.0-rc3-syzkaller-01537-g2",
"cve_id": "CVE-2022-49401",
"chunk_id": 0,
"metadata": {
"published": "2025-02-26T02:12:28.603Z",
"products": "Linux",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2022/49xxx/CVE-2022-49401.json",
"references": "https://git.kernel.org/stable/c/5cd9900a1ac8b0a4ff3cd97d4d77b7711be435bf, https://git.kernel.org/stable/c/cd8c1fd8cdd14158f2d8bea2d1bfe8015dccfa3a",
"problem_types": "",
"last_modified": "2025-05-04T08:36:53.713Z",
"vendors": "Linux"
},
"rerank_score": 0.08080703765153885
},
{
"score": 0.2457108497619629,
"text": "e for the s_offset key is copied using strcpy to the buffer at $sp+0x2b0. This buffer is 32 bytes large, sending anything longer will cause a buffer overflow. Additional Analyst Notes: - CVE Program Container: References: - https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0483",
"cve_id": "CVE-2017-16337",
"chunk_id": 1,
"metadata": {
"products": "Insteon Hub 2245-222",
"severity": "HIGH",
"last_modified": "2024-09-16T18:55:33.214Z",
"vendors": "Insteon",
"cvss_vector": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2017/16xxx/CVE-2017-16337.json",
"cvss_score": 8.5,
"problem_types": "Stack-based buffer overflow",
"references": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0483",
"published": "2018-08-23T15:00:00Z"
},
"rerank_score": 0.07241660356521606
}
],
"component_focus": [
{
"score": 0.2445216178894043,
"text": "CVE ID: CVE-2025-55904 State: PUBLISHED Published: 2025-09-17T00:00:00.000Z Last Updated: 2025-09-17T14:28:46.520Z Vendors: n/a Products: n/a Problem Types: n/a Description: Open5GS v2.7.5, prior to commit 67ba7f92bbd7a378954895d96d9d7b05d5b64615, is vulnerable to a NULL pointer dereference when a multipart/related HTTP POST request with an empty HTTP body is sent to the SBI of either AMF, AUSF, BSF, NRF, NSSF, PCF, SMF, UDM, or UDR, resulting in a denial of service. This occurs in the parse_multipart function in lib/sbi/message.c. Additional Analyst Notes: - CISA ADP Vulnrichment: References: - https://github.com/open5gs/open5gs/commit/67ba7f92bbd7a378954895d96d9d7b05d5b64615 - https://gith",
"cve_id": "CVE-2025-55904",
"chunk_id": 0,
"metadata": {
"published": "2025-09-17T00:00:00.000Z",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2025/55xxx/CVE-2025-55904.json",
"last_modified": "2025-09-17T14:28:46.520Z",
"vendors": "n/a",
"problem_types": "n/a",
"references": "https://github.com/open5gs/open5gs/commit/67ba7f92bbd7a378954895d96d9d7b05d5b64615, https://github.com/open5gs/open5gs/issues/3942, https://github.com/tsiamoulis/vuln-research/tree/main/CVE-2025-55904",
"products": "n/a"
},
"rerank_score": 0.9995604157447815
},
{
"score": 0.2402043342590332,
"text": "CVE ID: CVE-2008-1673 State: PUBLISHED Published: 2008-06-10T00:00:00 Last Updated: 2024-08-07T08:32:01.473Z Vendors: n/a Products: n/a Problem Types: n/a Description: The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6 and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic modules; and (b) the gxsnmp package; does not properly validate length values during decoding of ASN.1 BER data, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a length greater than the working buffer, which can lead to an unspecified overflow; (2) an oid length of zero, which can lead to an off-by-one error; or (3) an indefinite length for ",
"cve_id": "CVE-2008-1673",
"chunk_id": 0,
"metadata": {
"products": "n/a",
"published": "2008-06-10T00:00:00",
"problem_types": "n/a",
"references": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html, http://secunia.com/advisories/30000, http://secunia.com/advisories/30658, http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0189, http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00012.html, http://www.securityfocus.com/bid/29589, http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ddb2c43594f22843e9f3153da151deaba1a834c5, http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00007.html, http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html, https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00587.html, http://secunia.com/advisories/32104, http://secunia.com/advisories/30982, http://secunia.com/advisories/30580, http://www.securityfocus.com/archive/1/493300/100/0/threaded, https://exchange.xforce.ibmcloud.com/vulnerabilities/42921, http://secunia.com/advisories/30644, http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html, http://secunia.com/advisories/32103, http://www.mandriva.com/security/advisories?name=MDVSA-2008:113, http://www.securitytracker.com/id?1020210, http://www.mandriva.com/security/advisories?name=MDVSA-2008:174, http://secunia.com/advisories/32759, http://www.vupen.com/english/advisories/2008/1770, http://secunia.com/advisories/31107, http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.5, http://secunia.com/advisories/32370, http://secunia.com/advisories/31836, http://www.ubuntu.com/usn/usn-625-1, https://bugzilla.redhat.com/show_bug.cgi?id=443962, http://www.debian.org/security/2008/dsa-1592, http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html, http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html, http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=33afb8403f361919aa5c8fe1d0a4f5ddbfbbea3c, http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.36.6",
"vendors": "n/a",
"last_modified": "2024-08-07T08:32:01.473Z",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2008/1xxx/CVE-2008-1673.json"
},
"rerank_score": 0.10628625750541687
},
{
"score": 0.2239304780960083,
"text": "CVE ID: CVE-2005-1935 State: PUBLISHED Published: 2005-06-09T04:00:00 Last Updated: 2024-08-07T22:06:57.662Z Vendors: n/a Products: n/a Problem Types: n/a Description: Heap-based buffer overflow in the BERDecBitString function in Microsoft ASN.1 library (MSASN1.DLL) allows remote attackers to execute arbitrary code via nested constructed bit strings, which leads to a realloc of a non-null pointer and causes the function to overwrite previously freed memory, as demonstrated using a SPNEGO token with a constructed bit string during HTTP authentication, and a different vulnerability than CVE-2003-0818. NOTE: the researcher has claimed that MS:MS04-007 fixes this issue. Additional Analyst Notes:",
"cve_id": "CVE-2005-1935",
"chunk_id": 0,
"metadata": {
"vendors": "n/a",
"last_modified": "2024-08-07T22:06:57.662Z",
"problem_types": "n/a",
"products": "n/a",
"references": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20870, http://www.phreedom.org/solar/exploits/msasn1-bitstring/",
"published": "2005-06-09T04:00:00",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2005/1xxx/CVE-2005-1935.json"
},
"rerank_score": 0.08243680745363235
},
{
"score": 0.2558332681655884,
"text": "CVE ID: CVE-2012-2131 State: PUBLISHED Published: 2012-04-24T20:00:00 Last Updated: 2024-08-06T19:26:08.465Z Vendors: n/a Products: n/a Problem Types: n/a Description: Multiple integer signedness errors in crypto/buffer/buffer.c in OpenSSL 0.9.8v allow remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-2110. Additional Analyst Notes: - CVE Program Container: References: - http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00014.ht",
"cve_id": "CVE-2012-2131",
"chunk_id": 0,
"metadata": {
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2012/2xxx/CVE-2012-2131.json",
"references": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00014.html, http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00007.html, http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564, http://www.mandriva.com/security/advisories?name=MDVSA-2012:064, http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673, http://www.ubuntu.com/usn/USN-1428-1, http://cvs.openssl.org/chngview?cn=22479, http://www.openssl.org/news/secadv_20120424.txt, http://www.debian.org/security/2012/dsa-2454, http://support.apple.com/kb/HT5784, http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html, http://secunia.com/advisories/48895, https://exchange.xforce.ibmcloud.com/vulnerabilities/75099, http://secunia.com/advisories/48956, http://www.openwall.com/lists/oss-security/2012/04/24/1, http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00015.html, http://marc.info/?l=bugtraq&m=134039053214295&w=2, http://secunia.com/advisories/57353, http://marc.info/?l=bugtraq&m=133728068926468&w=2, http://marc.info/?l=bugtraq&m=134039053214295&w=2, http://www.securitytracker.com/id?1026957, http://www.securityfocus.com/bid/53212, http://marc.info/?l=bugtraq&m=133728068926468&w=2",
"problem_types": "n/a",
"vendors": "n/a",
"last_modified": "2024-08-06T19:26:08.465Z",
"products": "n/a",
"published": "2012-04-24T20:00:00"
},
"rerank_score": 0.08150697499513626
},
{
"score": 0.2544565200805664,
"text": "CVE ID: CVE-2012-2110 State: PUBLISHED Published: 2012-04-19T17:00:00 Last Updated: 2024-08-06T19:26:07.655Z Vendors: n/a Products: n/a Problem Types: n/a Description: The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. Additional Analyst Notes: - CVE Program Container: References: - http://lists.opensuse.org/opensuse-security-announce/2",
"cve_id": "CVE-2012-2110",
"chunk_id": 0,
"metadata": {
"problem_types": "n/a",
"vendors": "n/a",
"last_modified": "2024-08-06T19:26:07.655Z",
"published": "2012-04-19T17:00:00",
"products": "n/a",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2012/2xxx/CVE-2012-2110.json",
"references": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00014.html, http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00007.html, http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564, https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862, http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092905.html, http://secunia.com/advisories/48899, http://archives.neohapsis.com/archives/fulldisclosure/2012-04/0209.html, http://rhn.redhat.com/errata/RHSA-2012-1308.html, http://cvs.openssl.org/chngview?cn=22434, http://www.mandriva.com/security/advisories?name=MDVSA-2012:060, http://rhn.redhat.com/errata/RHSA-2012-1307.html, http://www.exploit-db.com/exploits/18756, http://rhn.redhat.com/errata/RHSA-2012-0518.html, http://www.debian.org/security/2012/dsa-2454, http://support.apple.com/kb/HT5784, http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html, http://www.ubuntu.com/usn/USN-1424-1, http://secunia.com/advisories/48895, http://secunia.com/advisories/48847, http://cvs.openssl.org/chngview?cn=22439, http://rhn.redhat.com/errata/RHSA-2012-1306.html, http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00015.html, http://rhn.redhat.com/errata/RHSA-2012-0522.html, http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079149.html, http://marc.info/?l=bugtraq&m=134039053214295&w=2, http://secunia.com/advisories/57353, http://www.securityfocus.com/bid/53158, http://marc.info/?l=bugtraq&m=133728068926468&w=2, http://marc.info/?l=bugtraq&m=134039053214295&w=2, http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080176.html, http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578, http://marc.info/?l=bugtraq&m=133951357207000&w=2, http://secunia.com/advisories/48942, http://www.openssl.org/news/secadv_20120419.txt, http://cvs.openssl.org/chngview?cn=22431, http://www.securitytracker.com/id?1026957, http://secunia.com/advisories/48999, http://marc.info/?l=bugtraq&m=133951357207000&w=2, http://osvdb.org/81223, https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03839862, http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079299.html, https://kb.juniper.net/KB27376, http://marc.info/?l=bugtraq&m=133728068926468&w=2"
},
"rerank_score": 0.07558979094028473
}
],
"technical_pattern_focus": [
{
"score": 0.29820066690444946,
"text": "c' in cifs_strndup_to_utf16 and returns NULL early to prevent dereferencing NULL pointer. Found by Linux Verification Center (linuxtesting.org) with SVACE Additional Analyst Notes: - CVE Program Container: References: - https://git.kernel.org/stable/c/65b98a7e65e7a8f3894d8760cd194eaf20504c99 - https://git.kernel.org/stable/c/1cfa5dd05847137f0fb3ce74ced80c0b4858d716 - https://git.kernel.org/stable/c/1f797f062b5cf13a1c2bcc23285361baaa7c9260 - https://git.kernel.org/stable/c/3c26a8d30ed6b53a52a023ec537dc50a6d34a67a - https://git.kernel.org/stable/c/70bccd9855dae56942f2b18a08ba137bb54093a0",
"cve_id": "CVE-2025-39838",
"chunk_id": 1,
"metadata": {
"references": "https://git.kernel.org/stable/c/65b98a7e65e7a8f3894d8760cd194eaf20504c99, https://git.kernel.org/stable/c/1cfa5dd05847137f0fb3ce74ced80c0b4858d716, https://git.kernel.org/stable/c/1f797f062b5cf13a1c2bcc23285361baaa7c9260, https://git.kernel.org/stable/c/3c26a8d30ed6b53a52a023ec537dc50a6d34a67a, https://git.kernel.org/stable/c/70bccd9855dae56942f2b18a08ba137bb54093a0",
"published": "2025-09-19T15:26:13.506Z",
"problem_types": "",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2025/39xxx/CVE-2025-39838.json",
"vendors": "Linux",
"products": "Linux",
"last_modified": "2025-11-03T17:43:52.863Z"
},
"rerank_score": 0.6811597347259521
},
{
"score": 0.2855958938598633,
"text": " buffer is already full but cp, the cursor position, is in the middle of the buffer, then we will write past the end of the supplied buffer. Fix this by replacing the dubious strncpy() calls with memmove()/memcpy() calls plus explicit boundary checks to make sure we have enough space before we start moving characters around. Additional Analyst Notes: - CVE Program Container: - CISA ADP Vulnrichment: References: - https://git.kernel.org/stable/c/fb824a99e148ff272a53d71d84122728b5f00992 - https://git.kernel.org/stable/c/ddd2972d8e2dee3b33e8121669d55def59f0be8a - https://git.kernel.org/stable/c/cfdc2fa4db57503bc6d3817240547c8ddc55fa96 - https://git.kernel.org/stable/c/f636a40834d22e5e3fc748f060",
"cve_id": "CVE-2024-39480",
"chunk_id": 1,
"metadata": {
"products": "Linux",
"vendors": "Linux",
"last_modified": "2025-05-04T09:16:41.644Z",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2024/39xxx/CVE-2024-39480.json",
"references": "https://git.kernel.org/stable/c/fb824a99e148ff272a53d71d84122728b5f00992, https://git.kernel.org/stable/c/ddd2972d8e2dee3b33e8121669d55def59f0be8a, https://git.kernel.org/stable/c/cfdc2fa4db57503bc6d3817240547c8ddc55fa96, https://git.kernel.org/stable/c/f636a40834d22e5e3fc748f060211879c056cd33, https://git.kernel.org/stable/c/33d9c814652b971461d1e30bead6792851c209e7, https://git.kernel.org/stable/c/107e825cc448b7834b31e8b1b3cf0f57426d46d5, https://git.kernel.org/stable/c/f694da720dcf795dc3eb97bf76d220213f76aaa7, https://git.kernel.org/stable/c/e9730744bf3af04cda23799029342aa3cddbc454",
"published": "2024-07-05T06:55:09.241Z",
"problem_types": ""
},
"rerank_score": 0.1396441012620926
},
{
"score": 0.25617337226867676,
"text": " ']', strchr() returns NULL, and a call to g_strdup(start + 1) leads to a null pointer dereference. This vulnerability is fixed in 1.24.10. Additional Analyst Notes: - CISA ADP Vulnrichment: - CVE Program Container: References: - https://securitylab.github.com/advisories/GHSL-2024-263_Gstreamer/ - https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8039.patch - https://gstreamer.freedesktop.org/security/sa-2024-0029.html",
"cve_id": "CVE-2024-47835",
"chunk_id": 1,
"metadata": {
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2024/47xxx/CVE-2024-47835.json",
"references": "https://securitylab.github.com/advisories/GHSL-2024-263_Gstreamer/, https://gitlab.freedesktop.org/gstreamer/gstreamer/-/merge_requests/8039.patch, https://gstreamer.freedesktop.org/security/sa-2024-0029.html",
"vendors": "gstreamer",
"published": "2024-12-11T19:17:26.688Z",
"cwe": "CWE-476",
"problem_types": "CWE-476",
"last_modified": "2025-11-03T22:21:51.646Z",
"products": "gstreamer"
},
"rerank_score": 0.1372045874595642
},
{
"score": 0.2788669466972351,
"text": "CVE ID: CVE-2023-0216 State: PUBLISHED Published: 2023-02-08T19:03:05.652Z Last Updated: 2025-11-04T19:14:34.082Z Vendors: OpenSSL Products: OpenSSL Problem Types: invalid pointer dereference Description: An invalid pointer dereference on read can be triggered when an application tries to load malformed PKCS7 data with the d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions. The result of the dereference is an application crash which could lead to a denial of service attack. The TLS implementation in OpenSSL does not call this function however third party applications might call these functions on untrusted data. Additional Analyst Notes: - CVE Program Container: - CISA ADP Vulnrichment",
"cve_id": "CVE-2023-0216",
"chunk_id": 0,
"metadata": {
"products": "OpenSSL",
"last_modified": "2025-11-04T19:14:34.082Z",
"published": "2023-02-08T19:03:05.652Z",
"vendors": "OpenSSL",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2023/0xxx/CVE-2023-0216.json",
"problem_types": "invalid pointer dereference",
"references": "https://www.openssl.org/news/secadv/20230207.txt, https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=934a04f0e775309cadbef0aa6b9692e1b12a76c6, https://security.gentoo.org/glsa/202402-08"
},
"rerank_score": 0.10002315044403076
},
{
"score": 0.29868656396865845,
"text": "when 0 (from the Content-Length) is passed to the function cfl_sds_len, which in turn tries to cast a NULL pointer into struct cfl_sds. This is related to process_payload_traces_proto_ng() at opentelemetry_prot.c. Additional Analyst Notes: - CISA ADP Vulnrichment: References: - https://fluentbit.io/announcements/ - https://github.com/fluent/fluent-bit/releases - https://www.ebryx.com/blogs/exploring-cve-2024-50608-and-cve-2024-50609",
"cve_id": "CVE-2024-50609",
"chunk_id": 1,
"metadata": {
"problem_types": "n/a",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2024/50xxx/CVE-2024-50609.json",
"published": "2025-02-18T00:00:00.000Z",
"products": "n/a",
"last_modified": "2025-02-19T14:58:22.328Z",
"references": "https://fluentbit.io/announcements/, https://github.com/fluent/fluent-bit/releases, https://www.ebryx.com/blogs/exploring-cve-2024-50608-and-cve-2024-50609",
"vendors": "n/a"
},
"rerank_score": 0.09550007432699203
}
],
"temporal_focus": [
{
"score": 0.2402409315109253,
"text": "CVE ID: CVE-2009-0590 State: PUBLISHED Published: 2009-03-27T16:00:00 Last Updated: 2024-08-07T04:40:04.972Z Vendors: n/a Products: n/a Problem Types: n/a Description: The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length. Additional Analyst Notes: - CVE Program Container: References: - http://marc.info/?l=bugtraq&m=124464882609472&w=2 - http://www.vupen.com/english/advisories/2009/0850 - http://securitytracker.com/id?1021905 - http://secunia.com/advisories/34896 - http://www.mandriva",
"cve_id": "CVE-2009-0590",
"chunk_id": 0,
"metadata": {
"problem_types": "n/a",
"last_modified": "2024-08-07T04:40:04.972Z",
"vendors": "n/a",
"products": "n/a",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2009/0xxx/CVE-2009-0590.json",
"references": "http://marc.info/?l=bugtraq&m=124464882609472&w=2, http://www.vupen.com/english/advisories/2009/0850, http://securitytracker.com/id?1021905, http://secunia.com/advisories/34896, http://www.mandriva.com/security/advisories?name=MDVSA-2009:087, http://www.vupen.com/english/advisories/2009/1175, http://secunia.com/advisories/42724, http://www.securityfocus.com/archive/1/502429/100/0/threaded, http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html, http://wiki.rpath.com/Advisories:rPSA-2009-0057, http://www.debian.org/security/2009/dsa-1763, http://secunia.com/advisories/38794, http://lists.vmware.com/pipermail/security-announce/2010/000082.html, http://sourceforge.net/project/shownotes.php?release_id=671059&group_id=116847, http://secunia.com/advisories/34960, http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html, http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0057, http://secunia.com/advisories/34666, http://www.ubuntu.com/usn/usn-750-1, http://security.FreeBSD.org/advisories/FreeBSD-SA-09:08.openssl.asc, http://marc.info/?l=bugtraq&m=124464882609472&w=2, http://www.vupen.com/english/advisories/2009/1020, http://secunia.com/advisories/35729, http://www.redhat.com/support/errata/RHSA-2009-1335.html, http://www.osvdb.org/52864, http://secunia.com/advisories/34561, http://secunia.com/advisories/35380, http://marc.info/?l=bugtraq&m=127678688104458&w=2, http://secunia.com/advisories/42467, http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html, http://secunia.com/advisories/35065, https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html, https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10198, http://secunia.com/advisories/36533, http://www.php.net/archive/2009.php#id2009-04-08-1, http://secunia.com/advisories/34411, ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-008.txt.asc, http://www.securityfocus.com/archive/1/515055/100/0/threaded, http://secunia.com/advisories/34509, https://exchange.xforce.ibmcloud.com/vulnerabilities/49431, http://secunia.com/advisories/35181, http://sunsolve.sun.com/search/document.do?assetkey=1-26-258048-1, http://secunia.com/advisories/38834, http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html, https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6996, https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html, http://www.vupen.com/english/advisories/2010/3126, http://voodoo-circle.sourceforge.net/sa/sa-20090326-01.html, http://support.apple.com/kb/HT3865, http://www.vupen.com/english/advisories/2009/1220, http://www.openssl.org/news/secadv_20090325.txt, http://www.vupen.com/english/advisories/2009/1548, http://secunia.com/advisories/36701, http://support.avaya.com/elmodocs2/security/ASA-2009-172.htm, http://www.vmware.com/security/advisories/VMSA-2010-0019.html, http://marc.info/?l=bugtraq&m=125017764422557&w=2, https://kb.bluecoat.com/index?page=content&id=SA50, http://secunia.com/advisories/34460, http://marc.info/?l=bugtraq&m=125017764422557&w=2, http://www.securityfocus.com/bid/34256, http://secunia.com/advisories/42733, http://www.vupen.com/english/advisories/2010/0528",
"published": "2009-03-27T16:00:00"
},
"rerank_score": 0.9808268547058105
},
{
"score": 0.22816550731658936,
"text": "CVE ID: CVE-2012-2131 State: PUBLISHED Published: 2012-04-24T20:00:00 Last Updated: 2024-08-06T19:26:08.465Z Vendors: n/a Products: n/a Problem Types: n/a Description: Multiple integer signedness errors in crypto/buffer/buffer.c in OpenSSL 0.9.8v allow remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-2110. Additional Analyst Notes: - CVE Program Container: References: - http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00014.ht",
"cve_id": "CVE-2012-2131",
"chunk_id": 0,
"metadata": {
"vendors": "n/a",
"products": "n/a",
"published": "2012-04-24T20:00:00",
"problem_types": "n/a",
"references": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00014.html, http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00007.html, http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004564, http://www.mandriva.com/security/advisories?name=MDVSA-2012:064, http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673, http://www.ubuntu.com/usn/USN-1428-1, http://cvs.openssl.org/chngview?cn=22479, http://www.openssl.org/news/secadv_20120424.txt, http://www.debian.org/security/2012/dsa-2454, http://support.apple.com/kb/HT5784, http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html, http://secunia.com/advisories/48895, https://exchange.xforce.ibmcloud.com/vulnerabilities/75099, http://secunia.com/advisories/48956, http://www.openwall.com/lists/oss-security/2012/04/24/1, http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00015.html, http://marc.info/?l=bugtraq&m=134039053214295&w=2, http://secunia.com/advisories/57353, http://marc.info/?l=bugtraq&m=133728068926468&w=2, http://marc.info/?l=bugtraq&m=134039053214295&w=2, http://www.securitytracker.com/id?1026957, http://www.securityfocus.com/bid/53212, http://marc.info/?l=bugtraq&m=133728068926468&w=2",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2012/2xxx/CVE-2012-2131.json",
"last_modified": "2024-08-06T19:26:08.465Z"
},
"rerank_score": 0.09194397181272507
},
{
"score": 0.23902076482772827,
"text": "CVE ID: CVE-2012-3405 State: PUBLISHED Published: 2014-02-10T17:00:00 Last Updated: 2024-08-06T20:05:12.277Z Vendors: n/a Products: n/a Problem Types: n/a Description: The vfprintf function in stdio-common/vfprintf.c in libc in GNU C Library (aka glibc) 2.14 and other versions does not properly calculate a buffer length, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (segmentation fault and crash) via a format string with a large number of format specifiers that triggers \"desynchronization within the buffer size handling,\" a different vulnerability than CVE-2012-3404. Additional Analyst Notes: - CVE Progr",
"cve_id": "CVE-2012-3405",
"chunk_id": 0,
"metadata": {
"references": "http://rhn.redhat.com/errata/RHSA-2012-1200.html, https://bugzilla.redhat.com/show_bug.cgi?id=833704, https://sourceware.org/bugzilla/show_bug.cgi?id=13446, https://security.gentoo.org/glsa/201503-04, http://rhn.redhat.com/errata/RHSA-2012-1098.html, http://www.ubuntu.com/usn/USN-1589-1, http://www.openwall.com/lists/oss-security/2012/07/11/17",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2012/3xxx/CVE-2012-3405.json",
"problem_types": "n/a",
"vendors": "n/a",
"products": "n/a",
"last_modified": "2024-08-06T20:05:12.277Z",
"published": "2014-02-10T17:00:00"
},
"rerank_score": 0.09069297462701797
},
{
"score": 0.22998183965682983,
"text": "CVE ID: CVE-2014-0160 State: PUBLISHED Published: 2014-04-07T00:00:00.000Z Last Updated: 2025-10-22T00:05:38.217Z Vendors: n/a Products: n/a Problem Types: n/a Description: The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug. Additional Analyst Notes: - CVE Program Container: - CISA ADP Vulnrichment: References: - https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36",
"cve_id": "CVE-2014-0160",
"chunk_id": 0,
"metadata": {
"products": "n/a",
"problem_types": "n/a",
"references": "https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html?sr=36517217, http://www.securitytracker.com/id/1030077, http://seclists.org/fulldisclosure/2014/Apr/90, http://www.getchef.com/blog/2014/04/09/chef-server-heartbleed-cve-2014-0160-releases/, http://www.debian.org/security/2014/dsa-2896, http://marc.info/?l=bugtraq&m=139774054614965&w=2, http://marc.info/?l=bugtraq&m=139889113431619&w=2, http://rhn.redhat.com/errata/RHSA-2014-0396.html, http://marc.info/?l=bugtraq&m=139835815211508&w=2, http://marc.info/?l=bugtraq&m=141287864628122&w=2, http://www.kb.cert.org/vuls/id/720951, http://www.splunk.com/view/SP-CAAAMB3, http://marc.info/?l=bugtraq&m=139905295427946&w=2, http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0, http://www.apcmedia.com/salestools/SJHN-7RKGNM/SJHN-7RKGNM_R4_EN.pdf, http://marc.info/?l=bugtraq&m=139833395230364&w=2, http://www-01.ibm.com/support/docview.wss?uid=swg21670161, http://www.vmware.com/security/advisories/VMSA-2014-0012.html, http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00004.html, http://marc.info/?l=bugtraq&m=142660345230545&w=2, http://seclists.org/fulldisclosure/2014/Apr/109, http://marc.info/?l=bugtraq&m=140724451518351&w=2, http://www.securitytracker.com/id/1030080, http://secunia.com/advisories/57836, http://www-01.ibm.com/support/docview.wss?uid=isg400001843, http://marc.info/?l=bugtraq&m=139808058921905&w=2, http://marc.info/?l=bugtraq&m=139758572430452&w=2, http://www.securityfocus.com/bid/66690, http://www.innominate.com/data/downloads/manuals/mdm_1.5.2.1_Release_Notes.pdf, https://filezilla-project.org/versions.php?type=server, http://marc.info/?l=bugtraq&m=139843768401936&w=2, http://secunia.com/advisories/57483, http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed, http://www.kerio.com/support/kerio-control/release-history, http://advisories.mageia.org/MGASA-2014-0165.html, http://www.blackberry.com/btsc/KB35882, http://marc.info/?l=bugtraq&m=142660345230545&w=2, http://marc.info/?l=bugtraq&m=140075368411126&w=2, http://marc.info/?l=bugtraq&m=139905351928096&w=2, http://www.securitytracker.com/id/1030081, http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131221.html, http://www.securityfocus.com/archive/1/534161/100/0/threaded, http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131291.html, https://bugzilla.redhat.com/show_bug.cgi?id=1084875, http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136473.html, http://www-01.ibm.com/support/docview.wss?uid=isg400001841, http://marc.info/?l=bugtraq&m=139824993005633&w=2, http://www.securitytracker.com/id/1030079, http://rhn.redhat.com/errata/RHSA-2014-0377.html, http://marc.info/?l=bugtraq&m=139722163017074&w=2, http://marc.info/?l=bugtraq&m=139889295732144&w=2, https://code.google.com/p/mod-spdy/issues/detail?id=85, http://marc.info/?l=bugtraq&m=139765756720506&w=2, http://marc.info/?l=bugtraq&m=139774703817488&w=2, http://marc.info/?l=bugtraq&m=139905202427693&w=2, http://www.getchef.com/blog/2014/04/09/chef-server-11-0-12-release/, http://heartbleed.com/, http://marc.info/?l=bugtraq&m=139817782017443&w=2, http://download.schneider-electric.com/files?p_Doc_Ref=SEVD%202014-119-01, http://marc.info/?l=bugtraq&m=140015787404650&w=2, http://cogentdatahub.com/ReleaseNotes.html, http://marc.info/?l=bugtraq&m=139869720529462&w=2, http://marc.info/?l=bugtraq&m=139842151128341&w=2, http://marc.info/?l=bugtraq&m=139905243827825&w=2, http://marc.info/?l=bugtraq&m=139905458328378&w=2, http://www.f-secure.com/en/web/labs_global/fsc-2014-1, http://www.us-cert.gov/ncas/alerts/TA14-098A, http://secunia.com/advisories/57347, https://lists.balabit.hu/pipermail/syslog-ng-announce/2014-April/000184.html, http://seclists.org/fulldisclosure/2014/Apr/173, https://blog.torproject.org/blog/openssl-bug-cve-2014-0160, http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html, http://www.oracle.com/technetwork/topics/security/opensslheartbleedcve-2014-0160-2188454.html, https://support.f5.com/kb/en-us/solutions/public/15000/100/sol15159.html, http://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=96db9023b881d7cd9f379b0c154650d6c108e9a3, https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c04260637-4%257CdocLocale%253Den_US%257CcalledBy%253DSearch_Result&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken, http://seclists.org/fulldisclosure/2014/Dec/23, http://marc.info/?l=bugtraq&m=139905653828999&w=2, http://www.ubuntu.com/usn/USN-2165-1, http://rhn.redhat.com/errata/RHSA-2014-0378.html, http://marc.info/?l=bugtraq&m=139757919027752&w=2, http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00005.html, http://www.exploit-db.com/exploits/32764, http://marc.info/?l=bugtraq&m=139757726426985&w=2, http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160512_00, http://marc.info/?l=bugtraq&m=139869891830365&w=2, http://marc.info/?l=bugtraq&m=139905868529690&w=2, http://marc.info/?l=bugtraq&m=139817685517037&w=2, http://marc.info/?l=bugtraq&m=140752315422991&w=2, http://seclists.org/fulldisclosure/2014/Apr/91, http://www.securitytracker.com/id/1030078, http://secunia.com/advisories/59243, http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004661, http://marc.info/?l=bugtraq&m=139836085512508&w=2, http://marc.info/?l=bugtraq&m=139824923705461&w=2, http://rhn.redhat.com/errata/RHSA-2014-0376.html, http://marc.info/?l=bugtraq&m=139835844111589&w=2, http://www.mandriva.com/security/advisories?name=MDVSA-2015:062, https://www.cert.fi/en/reports/2014/vulnerability788210.html, http://secunia.com/advisories/57721, http://secunia.com/advisories/57968, http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/, http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=3, http://lists.opensuse.org/opensuse-updates/2014-04/msg00061.html, http://marc.info/?l=bugtraq&m=139905405728262&w=2, http://www.securitytracker.com/id/1030082, http://marc.info/?l=bugtraq&m=139757819327350&w=2, http://www.exploit-db.com/exploits/32745, http://seclists.org/fulldisclosure/2014/Apr/190, http://www.getchef.com/blog/2014/04/09/enterprise-chef-11-1-3-release/, http://marc.info/?l=bugtraq&m=139817727317190&w=2, https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008, http://www.openssl.org/news/secadv_20140407.txt, https://gist.github.com/chapmajs/10473815, http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=1, http://www.securitytracker.com/id/1030074, http://support.citrix.com/article/CTX140605, http://secunia.com/advisories/59139, http://www.getchef.com/blog/2014/04/09/enterprise-chef-1-4-9-release/, http://secunia.com/advisories/57966, http://www.securitytracker.com/id/1030026, http://secunia.com/advisories/59347, https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E, https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E, https://sku11army.blogspot.com/2020/01/heartbleed-hearts-continue-to-bleed.html, https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E, https://cert-portal.siemens.com/productcert/pdf/ssa-635659.pdf, https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E, https://yunus-shn.medium.com/ricon-industrial-cellular-router-heartbleed-attack-2634221c02bd",
"published": "2014-04-07T00:00:00.000Z",
"last_modified": "2025-10-22T00:05:38.217Z",
"vendors": "n/a",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2014/0xxx/CVE-2014-0160.json"
},
"rerank_score": 0.08813377469778061
},
{
"score": 0.22405391931533813,
"text": "CVE ID: CVE-2019-16748 State: PUBLISHED Published: 2019-09-24T12:12:38 Last Updated: 2024-08-05T01:24:47.098Z Vendors: n/a Products: n/a Problem Types: n/a Description: In wolfSSL through 4.1.0, there is a missing sanity check of memory accesses in parsing ASN.1 certificate data while handshaking. Specifically, there is a one-byte heap-based buffer over-read in CheckCertSignature_ex in wolfcrypt/src/asn.c. Additional Analyst Notes: - CVE Program Container: References: - https://github.com/wolfSSL/wolfssl/issues/2459",
"cve_id": "CVE-2019-16748",
"chunk_id": 0,
"metadata": {
"last_modified": "2024-08-05T01:24:47.098Z",
"published": "2019-09-24T12:12:38",
"products": "n/a",
"problem_types": "n/a",
"source_file": "/teamspace/studios/this_studio/cvelistV5-main/cves/2019/16xxx/CVE-2019-16748.json",
"vendors": "n/a",
"references": "https://github.com/wolfSSL/wolfssl/issues/2459"
},
"rerank_score": 0.06333654373884201
}
]
}