[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-9054":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-22T16:08:08.064Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":23,"aliases":24,"duplicate_of":9,"upstream":25,"downstream":26,"duplicates":27,"related":28,"reserved_at":9,"published_at":29,"modified_at":30,"state":31,"summary":32,"references_raw":41,"kevs":56,"epss":57,"epss_history":60,"metrics":62,"affected":69},"CVE-2026-9054","An attacker sending tcp, il, rudp, rudp, or gre packets with a length less than the header size would trigger a kernel panic.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":9,"capec":18},"CWE-130","Improper Handling of Length Parameter Inconsistency","The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.","weakness","Incomplete","Base",[19],{"id":20,"name":21,"techniques":22},"CAPEC-47","Buffer Overflow via Parameter Expansion",[],[],[],[],[],[],[],"2026-05-22T03:21:49.646Z","2026-05-22T16:12:40.142Z","Received",{"cisa_kev":33,"cisa_ransomware":33,"cisa_vendor":9,"epss_severity":34,"epss_score":35,"severity":36,"severity_score":37,"severity_version":38,"severity_source":39,"severity_vector":40,"severity_status":31},false,"low",0.0004,"critical",9.2,"v4.0","cve.org","CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:A/AU:Y/R:A",[42,48,52],{"url":43,"sources":44,"tags":46},"https://git.9front.org/plan9front/9front/7838d68969549f938cc8e80c0c2b4218cb12805c/commit.html",[39,45],"nvd",[47],"Mitigation",{"url":49,"sources":50,"tags":51},"https://git.9front.org/plan9front/9front/f86917b75e9562f90545b7e484dbdcd748236952/commit.html",[39,45],[47],{"url":53,"sources":54,"tags":55},"https://git.9front.org/plan9front/9front/70c97c334171c715df82774d1a47638abaca2db4/commit.html",[39,45],[47],[],{"date":58,"score":35,"percentile":59},"2026-05-22",0.12205,[61],{"date":58,"score":35,"percentile":59},[63,66],{"source":39,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":9,"cvss_v4_0":64},{"baseScore":37,"baseSeverity":65,"vectorString":40,"impactScore":9,"exploitabilityScore":9},"CRITICAL",{"source":45,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":9,"cvss_v4_0":67},{"baseScore":37,"baseSeverity":65,"vectorString":68,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:A/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:X/RE:X/U:X",[70],{"ecosystem":9,"name":71,"vendor":71,"product":71,"cpe_part":72,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":73},"9front","a",[74],{"version":75,"is_range":76,"range_type":39,"version_start":77,"version_start_type":78,"version_end":79,"version_end_type":80,"fixed_in":9},">= Plan 9 4e, \u003C 70c97c334171c715df82774d1a47638abaca2db4",true,"Plan 9 4e","including","70c97c334171c715df82774d1a47638abaca2db4","excluding"]