OXDC-ADV-2026-0002

Vulnerability from csaf_ox - Published: 2026-05-05 00:00 - Updated: 2026-05-12 00:00
Summary
OX Dovecot Security Advisory OXDC-ADV-2026-0002
Severity
High
Notes
Terms of Use: This content is licensed under the Creative Commons Attribution-NoDerivatives 4.0 International License (https://creativecommons.org/licenses/by-nd/4.0/). If you distribute this content, you must provide attribution to Open-Xchange GmbH and provide a link to the original. You may not distribute a modified version of this content.

When safe filter is used with variable expansion, all following pipelines on the same string are incorrectly interpreted as safe too, enabling unsafe data to be unescaped.

CWE-235 - Improper Handling of Extra Parameters
Affected products
Product Identifier Version Remediation
OX Dovecot Pro 3.1.5
Open-Xchange GmbH / OX Dovecot Pro
cpe:2.3:a:open-xchange:dovecot:3.1.5:*:*:*:*:*:*:* 3.1.5
OX Dovecot CE 2.4.4
Open-Xchange GmbH / OX Dovecot CE
cpe:2.3:a:open-xchange:dovecot:2.4.4:*:*:*:*:*:*:* 2.4.4
Product Identifier Version Remediation
OX Dovecot Pro 3.1.4
Open-Xchange GmbH / OX Dovecot Pro
cpe:2.3:a:open-xchange:dovecot:3.1.4:*:*:*:*:*:*:* 3.1.4
Vendor Fix
OX Dovecot CE 2.4.3
Open-Xchange GmbH / OX Dovecot CE
cpe:2.3:a:open-xchange:dovecot:2.4.3:*:*:*:*:*:*:* 2.4.3
Vendor Fix
Threats
Impact This can enable SQL / LDAP injection attacks when used in authentication.
Exploit Status No publicly available exploits are known.

Attacker can upload a malicious Sieve script over ManageSieve service (or locally) to bypass configured CPU time limits for Sieve up to 130 times of the configured limit.

CWE-400 - Uncontrolled Resource Consumption
Affected products
Product Identifier Version Remediation
OX Dovecot Pro 3.1.5
Open-Xchange GmbH / OX Dovecot Pro
cpe:2.3:a:open-xchange:dovecot:3.1.5:*:*:*:*:*:*:* 3.1.5
OX Dovecot CE 2.4.4
Open-Xchange GmbH / OX Dovecot CE
cpe:2.3:a:open-xchange:dovecot:2.4.4:*:*:*:*:*:*:* 2.4.4
Product Identifier Version Remediation
OX Dovecot Pro 2.3.0
Open-Xchange GmbH / OX Dovecot Pro
cpe:2.3:a:open-xchange:dovecot:2.3.0:*:*:*:*:*:*:* 2.3.0
Vendor Fix
Threats
Impact Attacker can use this to degrade server performance and bypass configured CPU time limits for Sieve scripts.
Exploit Status No publicly available exploits are known.

Attacker can use a specially crafted base64 exchange between Dovecot and Client to fake SCRAM TLS channel binding. This requires that the attacker is able to position itself between Dovecot and the client connection.

CWE-99 - Improper Control of Resource Identifiers ('Resource Injection')
Affected products
Product Identifier Version Remediation
OX Dovecot Pro 3.1.5
Open-Xchange GmbH / OX Dovecot Pro
cpe:2.3:a:open-xchange:dovecot:3.1.5:*:*:*:*:*:*:* 3.1.5
OX Dovecot CE 2.4.4
Open-Xchange GmbH / OX Dovecot CE
cpe:2.3:a:open-xchange:dovecot:2.4.4:*:*:*:*:*:*:* 2.4.4
Product Identifier Version Remediation
OX Dovecot Pro 3.1.0
Open-Xchange GmbH / OX Dovecot Pro
cpe:2.3:a:open-xchange:dovecot:3.1.0:*:*:*:*:*:*:* 3.1.0
Vendor Fix
OX Dovecot CE 2.4.0
Open-Xchange GmbH / OX Dovecot CE
cpe:2.3:a:open-xchange:dovecot:2.4.0:*:*:*:*:*:*:* 2.4.0
Vendor Fix
Threats
Impact If successful, the attacker can eavesdrop communications between Dovecot and client as MITM proxy.
Exploit Status No publicly available exploits are known.

Attacker can use the IMAP SETACL command to inject the anyone permission to user's dovecot-acl file even if imap_acl_allow_anyone=no. This causes folders to be spammed to all users.

CWE-284 - Improper Access Control
Affected products
Product Identifier Version Remediation
OX Dovecot Pro 3.1.5
Open-Xchange GmbH / OX Dovecot Pro
cpe:2.3:a:open-xchange:dovecot:3.1.5:*:*:*:*:*:*:* 3.1.5
OX Dovecot CE 2.4.4
Open-Xchange GmbH / OX Dovecot CE
cpe:2.3:a:open-xchange:dovecot:2.4.4:*:*:*:*:*:*:* 2.4.4
Product Identifier Version Remediation
OX Dovecot Pro 2.3.0
Open-Xchange GmbH / OX Dovecot Pro
cpe:2.3:a:open-xchange:dovecot:2.3.0:*:*:*:*:*:*:* 2.3.0
Vendor Fix
Threats
Impact The impact is limited to being able to spam folders to other users, no unexpected access is gained.
Exploit Status No publicly available exploits are known.

An attacker can cause uncontrolled memory usage with excessive bracing over IMAP. The fix in CVE-2026-27857 was incomplete, only blocking one way of doing this, so there was still another way left open. In particular, the fix was for closing braces, but you could still use open braces to bypass the limit.

CWE-400 - Uncontrolled Resource Consumption
Affected products
Product Identifier Version Remediation
OX Dovecot Pro 3.1.5
Open-Xchange GmbH / OX Dovecot Pro
cpe:2.3:a:open-xchange:dovecot:3.1.5:*:*:*:*:*:*:* 3.1.5
OX Dovecot CE 2.4.4
Open-Xchange GmbH / OX Dovecot CE
cpe:2.3:a:open-xchange:dovecot:2.4.4:*:*:*:*:*:*:* 2.4.4
Product Identifier Version Remediation
OX Dovecot Pro 3.0.5
Open-Xchange GmbH / OX Dovecot Pro
cpe:2.3:a:open-xchange:dovecot:3.0.5:*:*:*:*:*:*:* 3.0.5
Vendor Fix
OX Dovecot Pro 3.1.4
Open-Xchange GmbH / OX Dovecot Pro
cpe:2.3:a:open-xchange:dovecot:3.1.4:*:*:*:*:*:*:* 3.1.4
Vendor Fix
OX Dovecot CE 2.4.3
Open-Xchange GmbH / OX Dovecot CE
cpe:2.3:a:open-xchange:dovecot:2.4.3:*:*:*:*:*:*:* 2.4.3
Vendor Fix
Threats
Impact Using excessive bracing, attacker can cause memory usage up to configured memory limit.
Exploit Status No publicly available exploits are known.
Acknowledgments
caprinuxx@yeswehack
djvirus@yeswehack
ylwango613@yeswehack
ilhamaf@yeswehack
D4RKCYPH3R@yeswehack

{
  "document": {
    "aggregate_severity": {
      "text": "HIGH"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Open-Xchange GmbH. All rights reserved.",
      "tlp": {
        "label": "GREEN",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution-NoDerivatives 4.0 International License (https://creativecommons.org/licenses/by-nd/4.0/). If you distribute this content, you must provide attribution to Open-Xchange GmbH and provide a link to the original. You may not distribute a modified version of this content.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "name": "Open-Xchange GmbH",
      "namespace": "https://open-xchange.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical CSAF document",
        "url": "https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2026/oxdc-adv-2026-0002.json"
      },
      {
        "category": "self",
        "summary": "Markdown representation",
        "url": "https://documentation.open-xchange.com/dovecot/security/advisories/md/2026/oxdc-adv-2026-0002.md"
      },
      {
        "category": "self",
        "summary": "HTML representation",
        "url": "https://documentation.open-xchange.com/dovecot/security/advisories/html/2026/oxdc-adv-2026-0002.html"
      },
      {
        "category": "self",
        "summary": "Plain-text representation",
        "url": "https://documentation.open-xchange.com/dovecot/security/advisories/txt/2026/oxdc-adv-2026-0002.txt"
      }
    ],
    "title": "OX Dovecot Security Advisory OXDC-ADV-2026-0002",
    "tracking": {
      "current_release_date": "2026-05-12T00:00:00+00:00",
      "generator": {
        "date": "2026-05-12T13:38:55+00:00",
        "engine": {
          "name": "OX CSAF",
          "version": "1.0.0"
        }
      },
      "id": "OXDC-ADV-2026-0002",
      "initial_release_date": "2026-05-05T00:00:00+00:00",
      "revision_history": [
        {
          "date": "2026-05-05T00:00:00+00:00",
          "number": "1",
          "summary": "Initial release"
        },
        {
          "date": "2026-05-12T00:00:00+00:00",
          "number": "2",
          "summary": "Public release"
        },
        {
          "date": "2026-05-12T00:00:00+00:00",
          "number": "3",
          "summary": "Public release"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "3.1.4",
                "product": {
                  "name": "OX Dovecot Pro 3.1.4",
                  "product_id": "OXDC-PRO_3.1.4",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:open-xchange:dovecot:3.1.4:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "3.1.5",
                "product": {
                  "name": "OX Dovecot Pro 3.1.5",
                  "product_id": "OXDC-PRO_3.1.5",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:open-xchange:dovecot:3.1.5:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "2.3.0",
                "product": {
                  "name": "OX Dovecot Pro 2.3.0",
                  "product_id": "OXDC-PRO_2.3.0",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:open-xchange:dovecot:2.3.0:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "3.1.0",
                "product": {
                  "name": "OX Dovecot Pro 3.1.0",
                  "product_id": "OXDC-PRO_3.1.0",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:open-xchange:dovecot:3.1.0:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "3.0.5",
                "product": {
                  "name": "OX Dovecot Pro 3.0.5",
                  "product_id": "OXDC-PRO_3.0.5",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:open-xchange:dovecot:3.0.5:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "OX Dovecot Pro"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "2.4.3",
                "product": {
                  "name": "OX Dovecot CE 2.4.3",
                  "product_id": "OXDC-CE_2.4.3",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:open-xchange:dovecot:2.4.3:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "2.4.4",
                "product": {
                  "name": "OX Dovecot CE 2.4.4",
                  "product_id": "OXDC-CE_2.4.4",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:open-xchange:dovecot:2.4.4:*:*:*:*:*:*:*"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "2.4.0",
                "product": {
                  "name": "OX Dovecot CE 2.4.0",
                  "product_id": "OXDC-CE_2.4.0",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:a:open-xchange:dovecot:2.4.0:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "OX Dovecot CE"
          }
        ],
        "category": "vendor",
        "name": "Open-Xchange GmbH"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "names": [
            "caprinuxx@yeswehack"
          ]
        }
      ],
      "cve": "CVE-2026-27851",
      "cwe": {
        "id": "CWE-235",
        "name": "Improper Handling of Extra Parameters"
      },
      "discovery_date": "2026-03-29T16:37:17+00:00",
      "ids": [
        {
          "system_name": "JIRA OX Bug",
          "text": "DOV-8967"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "When safe filter is used with variable expansion, all following pipelines on the same string are incorrectly interpreted as safe too, enabling unsafe data to be unescaped."
        }
      ],
      "product_status": {
        "first_fixed": [
          "OXDC-PRO_3.1.5",
          "OXDC-CE_2.4.4"
        ],
        "last_affected": [
          "OXDC-PRO_3.1.4",
          "OXDC-CE_2.4.3"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-05T00:00:00+00:00",
          "details": "Avoid using safe filter until on fixed version.",
          "product_ids": [
            "OXDC-PRO_3.1.4",
            "OXDC-CE_2.4.3"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "OXDC-PRO_3.1.4",
            "OXDC-CE_2.4.3"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "This can enable SQL / LDAP injection attacks when used in authentication."
        },
        {
          "category": "exploit_status",
          "details": "No publicly available exploits are known."
        }
      ],
      "title": "lib-var-expand: Safe filter leaks to all following pipelines"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "djvirus@yeswehack"
          ]
        }
      ],
      "cve": "CVE-2026-40016",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2026-03-24T13:00:23+00:00",
      "ids": [
        {
          "system_name": "JIRA OX Bug",
          "text": "DOV-8948"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Attacker can upload a malicious Sieve script over ManageSieve service (or locally) to bypass configured CPU time limits for Sieve up to 130 times of the configured limit."
        }
      ],
      "product_status": {
        "first_fixed": [
          "OXDC-PRO_3.1.5",
          "OXDC-CE_2.4.4"
        ],
        "last_affected": [
          "OXDC-PRO_2.3.0"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-05T00:00:00+00:00",
          "details": "Install fixed version, or alternatively prevent direct access to Sieve scripts via ManageSieve or local access.",
          "product_ids": [
            "OXDC-PRO_2.3.0"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "OXDC-PRO_2.3.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Attacker can use this to degrade server performance and bypass configured CPU time limits for Sieve scripts."
        },
        {
          "category": "exploit_status",
          "details": "No publicly available exploits are known."
        }
      ],
      "title": "Sieve :contains/:matches O(N\u00d7M) Substring Match Bypasses sieve_max_cpu_time Limit (130\u00d7 Overrun)"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "ylwango613@yeswehack"
          ]
        }
      ],
      "cve": "CVE-2026-33603",
      "cwe": {
        "id": "CWE-99",
        "name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
      },
      "discovery_date": "2026-04-08T06:10:32+00:00",
      "ids": [
        {
          "system_name": "JIRA OX Bug",
          "text": "DOV-9030"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Attacker can use a specially crafted base64 exchange between Dovecot and Client to fake SCRAM TLS channel binding. This requires that the attacker is able to position itself between Dovecot and the client connection."
        }
      ],
      "product_status": {
        "first_fixed": [
          "OXDC-PRO_3.1.5",
          "OXDC-CE_2.4.4"
        ],
        "last_affected": [
          "OXDC-PRO_3.1.0",
          "OXDC-CE_2.4.0"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-05T00:00:00+00:00",
          "details": "Install fixed version.",
          "product_ids": [
            "OXDC-PRO_3.1.0",
            "OXDC-CE_2.4.0"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "OXDC-PRO_3.1.0",
            "OXDC-CE_2.4.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "If successful, the attacker can eavesdrop communications between Dovecot and client as MITM proxy."
        },
        {
          "category": "exploit_status",
          "details": "No publicly available exploits are known."
        }
      ],
      "title": "login: Base64 input can contain tabs that bypass IPC protection"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "ilhamaf@yeswehack"
          ]
        }
      ],
      "cve": "CVE-2026-40020",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "discovery_date": "2026-04-08T09:42:22+00:00",
      "ids": [
        {
          "system_name": "JIRA OX Bug",
          "text": "DOV-9040"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Attacker can use the IMAP SETACL command to inject the anyone permission to user\u0027s dovecot-acl file even if imap_acl_allow_anyone=no. This causes folders to be spammed to all users."
        }
      ],
      "product_status": {
        "first_fixed": [
          "OXDC-PRO_3.1.5",
          "OXDC-CE_2.4.4"
        ],
        "last_affected": [
          "OXDC-PRO_2.3.0"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-05T00:00:00+00:00",
          "details": "Install to fixed version.",
          "product_ids": [
            "OXDC-PRO_2.3.0"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "OXDC-PRO_2.3.0"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "The impact is limited to being able to spam folders to other users, no unexpected access is gained."
        },
        {
          "category": "exploit_status",
          "details": "No publicly available exploits are known."
        }
      ],
      "title": "IMAP folders can be shared-spammed to everyone"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "D4RKCYPH3R@yeswehack"
          ]
        }
      ],
      "cve": "CVE-2026-42006",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2026-04-27T14:38:12+00:00",
      "ids": [
        {
          "system_name": "JIRA OX Bug",
          "text": "DOV-9138"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An attacker can cause uncontrolled memory usage with excessive bracing over IMAP. The fix in CVE-2026-27857 was incomplete, only blocking one way of doing this, so there was still another way left open. In particular, the fix was for closing braces, but you could still use open braces to bypass the limit."
        }
      ],
      "product_status": {
        "first_fixed": [
          "OXDC-PRO_3.1.5",
          "OXDC-CE_2.4.4"
        ],
        "last_affected": [
          "OXDC-PRO_3.0.5",
          "OXDC-PRO_3.1.4",
          "OXDC-CE_2.4.3"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-05-05T00:00:00+00:00",
          "details": "Install fixed version, or configure vsz_limit for imap process to low value.",
          "product_ids": [
            "OXDC-PRO_3.0.5",
            "OXDC-PRO_3.1.4",
            "OXDC-CE_2.4.3"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "OXDC-PRO_3.0.5",
            "OXDC-PRO_3.1.4",
            "OXDC-CE_2.4.3"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Using excessive bracing, attacker can cause memory usage up to configured memory limit."
        },
        {
          "category": "exploit_status",
          "details": "No publicly available exploits are known."
        }
      ],
      "title": "imap-login: Excessive memory usage DoS - Try 2"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…