[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-6350":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-16T20:13:34.037Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":20,"aliases":21,"duplicate_of":9,"upstream":22,"downstream":23,"duplicates":24,"related":25,"reserved_at":9,"published_at":26,"modified_at":27,"state":28,"summary":29,"references_raw":38,"kevs":49,"epss":50,"epss_history":53,"metrics":55,"affected":67},"CVE-2026-6350","MailGates/MailAudit developed by Openfind has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to control the program's execution flow and execute arbitrary code.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-121","Stack-based Buffer Overflow","A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).","weakness","Draft","Variant","High",[],[],[],[],[],[],[],"2026-04-16T02:30:17.942Z","2026-04-16T13:16:52.215Z","Received",{"cisa_kev":30,"cisa_ransomware":30,"cisa_vendor":9,"epss_severity":31,"epss_score":32,"severity":33,"severity_score":34,"severity_version":35,"severity_source":36,"severity_vector":37,"severity_status":28},false,"low",0.00058,"critical",9.8,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[39,45],{"url":40,"sources":41,"tags":43},"https://www.twcert.org.tw/tw/cp-132-10844-1405d-1.html",[36,42],"nvd",[44],"Third Party Advisory",{"url":46,"sources":47,"tags":48},"https://www.twcert.org.tw/en/cp-139-10843-9ff91-2.html",[36,42],[44],[],{"date":51,"score":32,"percentile":52},"2026-04-16",0.18201,[54],{"date":51,"score":32,"percentile":52},[56,63],{"source":36,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":57,"cvss_v4_0":60},{"baseScore":34,"baseSeverity":58,"vectorString":37,"impactScore":34,"exploitabilityScore":59},"CRITICAL",10,{"baseScore":61,"baseSeverity":58,"vectorString":62,"impactScore":9,"exploitabilityScore":9},9.3,"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",{"source":42,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":64,"cvss_v4_0":65},{"baseScore":34,"baseSeverity":58,"vectorString":37,"impactScore":34,"exploitabilityScore":59},{"baseScore":61,"baseSeverity":58,"vectorString":66,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[68,85],{"ecosystem":9,"name":69,"vendor":70,"product":71,"cpe_part":72,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":73},"MailAudit","openfind","mailaudit","a",[74,81],{"version":75,"is_range":76,"range_type":36,"version_start":77,"version_start_type":78,"version_end":79,"version_end_type":80,"fixed_in":9},">= 6.0, \u003C 6.1.10.054",true,"6.0","including","6.1.10.054","excluding",{"version":82,"is_range":76,"range_type":36,"version_start":83,"version_start_type":78,"version_end":84,"version_end_type":80,"fixed_in":9},">= 5.0, \u003C 5.2.10.099","5.0","5.2.10.099",{"ecosystem":9,"name":86,"vendor":70,"product":87,"cpe_part":72,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":88},"MailGates","mailgates",[89,90],{"version":75,"is_range":76,"range_type":36,"version_start":77,"version_start_type":78,"version_end":79,"version_end_type":80,"fixed_in":9},{"version":82,"is_range":76,"range_type":36,"version_start":83,"version_start_type":78,"version_end":84,"version_end_type":80,"fixed_in":9}]