[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-9102":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-20T17:11:50.996Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":95,"aliases":96,"duplicate_of":9,"upstream":97,"downstream":98,"duplicates":99,"related":100,"reserved_at":9,"published_at":101,"modified_at":101,"state":102,"summary":103,"references_raw":110,"kevs":115,"epss":9,"epss_history":116,"metrics":117,"affected":121},"CVE-2026-9102","A path traversal vulnerability exists in the Altium Enterprise Server ComparisonService due to missing filename sanitization in the Gerber file upload APIs. A regular authenticated workspace user can supply a crafted filename in the multipart Content-Disposition header to escape the intended temporary upload directory and write arbitrary files to any location on the server filesystem.\n\n\n\n\nBecause content-controlled files can be written to web-accessible directories, this can be escalated to remote code execution in the context of the service account. It can also be used to overwrite application binaries or configuration files, leading to service takeover or denial of service.",null,[11,40],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-22","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.","weakness","Stable","Base","High",[20,24,28,32,36],{"id":21,"name":22,"techniques":23},"CAPEC-126","Path Traversal",[],{"id":25,"name":26,"techniques":27},"CAPEC-64","Using Slashes and URL Encoding Combined to Bypass Validation Logic",[],{"id":29,"name":30,"techniques":31},"CAPEC-76","Manipulating Web Input to File System Calls",[],{"id":33,"name":34,"techniques":35},"CAPEC-78","Using Escaped Slashes in Alternate Encoding",[],{"id":37,"name":38,"techniques":39},"CAPEC-79","Using Slashes in Alternate Encoding",[],{"_key":41,"id":41,"name":42,"description":43,"type":15,"status":44,"abstraction":17,"likelihood_of_exploit":45,"capec":46},"CWE-434","Unrestricted Upload of File with Dangerous Type","The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.","Draft","Medium",[47],{"id":48,"name":49,"techniques":50},"CAPEC-1","Accessing Functionality Not Properly Constrained by ACLs",[51],{"id":52,"name":53,"tactics":54,"countermeasures":70},"T1574.010","Services File Permissions Weakness",[55,58,61,64,67],{"id":56,"name":57},"TA0110","Persistence",{"id":59,"name":60},"TA0111","Privilege Escalation",{"id":62,"name":63},"TA0030","Defense Evasion",{"id":65,"name":66},"TA0005","Stealth",{"id":68,"name":69},"TA0104","Execution",[71,76,80,85,90],{"id":72,"name":73,"tactic":74},"D3-SWI","Software Inventory",{"name":75},"Model",{"id":77,"name":78,"tactic":79},"D3-AVE","Asset Vulnerability Enumeration",{"name":75},{"id":81,"name":82,"tactic":83},"D3-SBV","Service Binary Verification",{"name":84},"Detect",{"id":86,"name":87,"tactic":88},"D3-SU","Software Update",{"name":89},"Harden",{"id":91,"name":92,"tactic":93},"D3-RS","Restore Software",{"name":94},"Restore",[],[],[],[],[],[],"2026-05-20T17:48:31.798Z","PUBLISHED",{"cisa_kev":104,"cisa_ransomware":104,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":105,"severity_score":106,"severity_version":107,"severity_source":108,"severity_vector":109,"severity_status":102},false,"critical",9.4,"v4.0","cve.org","CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",[111],{"url":112,"sources":113,"tags":114},"https://www.altium.com/platform/security-compliance/security-advisories",[108],[],[],[],[118],{"source":108,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":9,"cvss_v4_0":119},{"baseScore":106,"baseSeverity":120,"vectorString":109,"impactScore":9,"exploitabilityScore":9},"CRITICAL",[122],{"ecosystem":9,"name":123,"vendor":124,"product":125,"cpe_part":126,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":127},"Altium Enterprise Server","altium","altium enterprise server","a",[128],{"version":129,"is_range":130,"range_type":108,"version_start":9,"version_start_type":9,"version_end":131,"version_end_type":132,"fixed_in":9},"\u003C 8.0.4",true,"8.0.4","excluding"]