alsa-2026:5930
Vulnerability from osv_almalinux
Published
2026-03-26 00:00
Modified
2026-03-30 11:00
Summary
Important: firefox security update
Details

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

Security Fix(es):

  • firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-4701)
  • firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4721)
  • firefox: thunderbird: Privilege escalation in the Netmonitor component (CVE-2026-4717)
  • firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component (CVE-2026-4688)
  • firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4706)
  • firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component (CVE-2026-4695)
  • firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component (CVE-2026-4689)
  • firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-4698)
  • firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component (CVE-2026-4716)
  • firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component (CVE-2026-4684)
  • firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4705)
  • firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component (CVE-2026-4715)
  • firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4685)
  • firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4714)
  • firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-4709)
  • firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4710)
  • firefox: thunderbird: Information disclosure in the Widget: Cocoa component (CVE-2026-4712)
  • firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component (CVE-2026-4697)
  • firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4713)
  • firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component (CVE-2026-4690)
  • firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-4711)
  • firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4686)
  • firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4708)
  • firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component (CVE-2026-4691)
  • firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component (CVE-2026-4699)
  • firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component (CVE-2026-4696)
  • firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component (CVE-2026-4693)
  • firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4718)
  • firefox: thunderbird: JIT miscompilation in the JavaScript Engine component (CVE-2026-4702)
  • firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component (CVE-2026-4719)
  • firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component (CVE-2026-4694)
  • firefox: thunderbird: Sandbox escape in the Responsive Design Mode component (CVE-2026-4692)
  • firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4720)
  • firefox: thunderbird: Mitigation bypass in the Networking: HTTP component (CVE-2026-4700)
  • firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4707)
  • firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component (CVE-2026-4704)
  • firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component (CVE-2026-4687)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
https://access.redhat.com/errata/RHSA-2026:5930 ADVISORY
https://access.redhat.com/security/cve/CVE-2026-4684 REPORT
https://access.redhat.com/security/cve/CVE-2026-4685 REPORT
https://access.redhat.com/security/cve/CVE-2026-4686 REPORT
https://access.redhat.com/security/cve/CVE-2026-4687 REPORT
https://access.redhat.com/security/cve/CVE-2026-4688 REPORT
https://access.redhat.com/security/cve/CVE-2026-4689 REPORT
https://access.redhat.com/security/cve/CVE-2026-4690 REPORT
https://access.redhat.com/security/cve/CVE-2026-4691 REPORT
https://access.redhat.com/security/cve/CVE-2026-4692 REPORT
https://access.redhat.com/security/cve/CVE-2026-4693 REPORT
https://access.redhat.com/security/cve/CVE-2026-4694 REPORT
https://access.redhat.com/security/cve/CVE-2026-4695 REPORT
https://access.redhat.com/security/cve/CVE-2026-4696 REPORT
https://access.redhat.com/security/cve/CVE-2026-4697 REPORT
https://access.redhat.com/security/cve/CVE-2026-4698 REPORT
https://access.redhat.com/security/cve/CVE-2026-4699 REPORT
https://access.redhat.com/security/cve/CVE-2026-4700 REPORT
https://access.redhat.com/security/cve/CVE-2026-4701 REPORT
https://access.redhat.com/security/cve/CVE-2026-4702 REPORT
https://access.redhat.com/security/cve/CVE-2026-4704 REPORT
https://access.redhat.com/security/cve/CVE-2026-4705 REPORT
https://access.redhat.com/security/cve/CVE-2026-4706 REPORT
https://access.redhat.com/security/cve/CVE-2026-4707 REPORT
https://access.redhat.com/security/cve/CVE-2026-4708 REPORT
https://access.redhat.com/security/cve/CVE-2026-4709 REPORT
https://access.redhat.com/security/cve/CVE-2026-4710 REPORT
https://access.redhat.com/security/cve/CVE-2026-4711 REPORT
https://access.redhat.com/security/cve/CVE-2026-4712 REPORT
https://access.redhat.com/security/cve/CVE-2026-4713 REPORT
https://access.redhat.com/security/cve/CVE-2026-4714 REPORT
https://access.redhat.com/security/cve/CVE-2026-4715 REPORT
https://access.redhat.com/security/cve/CVE-2026-4716 REPORT
https://access.redhat.com/security/cve/CVE-2026-4717 REPORT
https://access.redhat.com/security/cve/CVE-2026-4718 REPORT
https://access.redhat.com/security/cve/CVE-2026-4719 REPORT
https://access.redhat.com/security/cve/CVE-2026-4720 REPORT
https://access.redhat.com/security/cve/CVE-2026-4721 REPORT
https://bugzilla.redhat.com/2450710 REPORT
https://bugzilla.redhat.com/2450711 REPORT
https://bugzilla.redhat.com/2450712 REPORT
https://bugzilla.redhat.com/2450713 REPORT
https://bugzilla.redhat.com/2450714 REPORT
https://bugzilla.redhat.com/2450715 REPORT
https://bugzilla.redhat.com/2450718 REPORT
https://bugzilla.redhat.com/2450719 REPORT
https://bugzilla.redhat.com/2450720 REPORT
https://bugzilla.redhat.com/2450721 REPORT
https://bugzilla.redhat.com/2450722 REPORT
https://bugzilla.redhat.com/2450723 REPORT
https://bugzilla.redhat.com/2450724 REPORT
https://bugzilla.redhat.com/2450725 REPORT
https://bugzilla.redhat.com/2450726 REPORT
https://bugzilla.redhat.com/2450727 REPORT
https://bugzilla.redhat.com/2450728 REPORT
https://bugzilla.redhat.com/2450729 REPORT
https://bugzilla.redhat.com/2450730 REPORT
https://bugzilla.redhat.com/2450732 REPORT
https://bugzilla.redhat.com/2450733 REPORT
https://bugzilla.redhat.com/2450734 REPORT
https://bugzilla.redhat.com/2450735 REPORT
https://bugzilla.redhat.com/2450738 REPORT
https://bugzilla.redhat.com/2450739 REPORT
https://bugzilla.redhat.com/2450740 REPORT
https://bugzilla.redhat.com/2450741 REPORT
https://bugzilla.redhat.com/2450742 REPORT
https://bugzilla.redhat.com/2450744 REPORT
https://bugzilla.redhat.com/2450746 REPORT
https://bugzilla.redhat.com/2450747 REPORT
https://bugzilla.redhat.com/2450748 REPORT
https://bugzilla.redhat.com/2450751 REPORT
https://bugzilla.redhat.com/2450752 REPORT
https://bugzilla.redhat.com/2450755 REPORT
https://bugzilla.redhat.com/2450756 REPORT
https://bugzilla.redhat.com/2450757 REPORT
https://errata.almalinux.org/9/ALSA-2026-5930.html ADVISORY

{
  "affected": [
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "firefox"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "140.9.0-1.el9_7.alma.1"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "ecosystem": "AlmaLinux:9",
        "name": "firefox-x11"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "140.9.0-1.el9_7.alma.1"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "details": "Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.  \n\nSecurity Fix(es):  \n\n  * firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-4701)\n  * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4721)\n  * firefox: thunderbird: Privilege escalation in the Netmonitor component (CVE-2026-4717)\n  * firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component (CVE-2026-4688)\n  * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4706)\n  * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component (CVE-2026-4695)\n  * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component (CVE-2026-4689)\n  * firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-4698)\n  * firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component (CVE-2026-4716)\n  * firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component (CVE-2026-4684)\n  * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4705)\n  * firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component (CVE-2026-4715)\n  * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4685)\n  * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4714)\n  * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-4709)\n  * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4710)\n  * firefox: thunderbird: Information disclosure in the Widget: Cocoa component (CVE-2026-4712)\n  * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component (CVE-2026-4697)\n  * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4713)\n  * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component (CVE-2026-4690)\n  * firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-4711)\n  * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4686)\n  * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4708)\n  * firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component (CVE-2026-4691)\n  * firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component (CVE-2026-4699)\n  * firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component (CVE-2026-4696)\n  * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component (CVE-2026-4693)\n  * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4718)\n  * firefox: thunderbird: JIT miscompilation in the JavaScript Engine component (CVE-2026-4702)\n  * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component (CVE-2026-4719)\n  * firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component (CVE-2026-4694)\n  * firefox: thunderbird: Sandbox escape in the Responsive Design Mode component (CVE-2026-4692)\n  * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4720)\n  * firefox: thunderbird: Mitigation bypass in the Networking: HTTP component (CVE-2026-4700)\n  * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4707)\n  * firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component (CVE-2026-4704)\n  * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component (CVE-2026-4687)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
  "id": "ALSA-2026:5930",
  "modified": "2026-03-30T11:00:48Z",
  "published": "2026-03-26T00:00:00Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://access.redhat.com/errata/RHSA-2026:5930"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4684"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4685"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4686"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4687"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4688"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4689"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4690"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4691"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4692"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4693"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4694"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4695"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4696"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4697"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4698"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4699"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4700"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4701"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4702"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4704"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4705"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4706"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4707"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4708"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4709"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4710"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4711"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4712"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4713"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4714"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4715"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4716"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4717"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4718"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4719"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4720"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-4721"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450710"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450711"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450712"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450713"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450714"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450715"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450718"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450719"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450720"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450721"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450722"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450723"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450724"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450725"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450726"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450727"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450728"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450729"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450730"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450732"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450733"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450734"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450735"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450738"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450739"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450740"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450741"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450742"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450744"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450746"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450747"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450748"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450751"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450752"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450755"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450756"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/2450757"
    },
    {
      "type": "ADVISORY",
      "url": "https://errata.almalinux.org/9/ALSA-2026-5930.html"
    }
  ],
  "related": [
    "CVE-2026-4701",
    "CVE-2026-4721",
    "CVE-2026-4717",
    "CVE-2026-4688",
    "CVE-2026-4706",
    "CVE-2026-4695",
    "CVE-2026-4689",
    "CVE-2026-4698",
    "CVE-2026-4716",
    "CVE-2026-4684",
    "CVE-2026-4705",
    "CVE-2026-4715",
    "CVE-2026-4685",
    "CVE-2026-4714",
    "CVE-2026-4709",
    "CVE-2026-4710",
    "CVE-2026-4712",
    "CVE-2026-4697",
    "CVE-2026-4713",
    "CVE-2026-4690",
    "CVE-2026-4711",
    "CVE-2026-4686",
    "CVE-2026-4708",
    "CVE-2026-4691",
    "CVE-2026-4699",
    "CVE-2026-4696",
    "CVE-2026-4693",
    "CVE-2026-4718",
    "CVE-2026-4702",
    "CVE-2026-4719",
    "CVE-2026-4694",
    "CVE-2026-4692",
    "CVE-2026-4720",
    "CVE-2026-4700",
    "CVE-2026-4707",
    "CVE-2026-4704",
    "CVE-2026-4687"
  ],
  "summary": "Important: firefox security update"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…