CVE-2026-4760 (GCVE-0-2026-4760)
Vulnerability from cvelistv5 – Published: 2026-03-25 12:29 – Updated: 2026-03-26 08:53
VLAI?
Title
Potential unauthorized access to files on the Web HMI server host
Summary
From Panorama Web HMI, an attacker can gain read access to certain Web HMI server files, if he knows their paths and if these files are accessible to the Servin process execution account.
* Installations based on Panorama Suite 2022-SP1 (22.50.005) are vulnerable unless update PS-2210-02-4079 (or higher) is installed
* Installations based on Panorama Suite 2023 (23.00.004) are vulnerable unless updates PS-2300-03-3078 (or higher) and PS-2300-04-3078 (or higher) and PS-2300-82-3078 (or higher) are installed
* Installations based on Panorama Suite 2025 (25.00.016) are vulnerable unless updates PS-2500-02-1078 (or higher) and PS-2500-04-1078 (or higher) are installed
* Installations based on Panorama Suite 2025 Updated Dec. 25 (25.10.007) are vulnerable unless updates PS-2510-02-1077 (or higher) and PS-2510-04-1077 (or higher) are installed
Please refer to security bulletin BS-035, available on the Panorama CSIRT website: https://my.codra.net/en-gb/csirt .
Severity ?
CWE
- CWE-552 - Files or directories accessible to external parties
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| CODRA | Panorama Suite |
Affected:
Panorama Suite 2022-SP1 , < update PS-2210-02-4079
(custom)
Affected: Panorama Suite 2023 , < update PS-2300-03-3078 AND PS-2300-04-3078 AND PS-2300-82-3078 (custom) Affected: Panorama Suite 2025 , < update PS-2500-02-1078 AND PS-2500-04-1078 (custom) Affected: Panorama Suite 2025 Updated Dec. 25 , < update PS-2510-02-1077 AND PS-2510-04-1077 (custom) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-4760",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-25T13:11:20.361122Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-25T13:11:27.573Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"Panorama HMI Web Server"
],
"platforms": [
"Windows"
],
"product": "Panorama Suite",
"vendor": "CODRA",
"versions": [
{
"lessThan": "update PS-2210-02-4079",
"status": "affected",
"version": "Panorama Suite 2022-SP1",
"versionType": "custom"
},
{
"lessThan": "update PS-2300-03-3078 AND PS-2300-04-3078 AND PS-2300-82-3078",
"status": "affected",
"version": "Panorama Suite 2023",
"versionType": "custom"
},
{
"lessThan": "update PS-2500-02-1078 AND PS-2500-04-1078",
"status": "affected",
"version": "Panorama Suite 2025",
"versionType": "custom"
},
{
"lessThan": "update PS-2510-02-1077 AND PS-2510-04-1077",
"status": "affected",
"version": "Panorama Suite 2025 Updated Dec. 25",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codra:panorama_suite:*:*:windows:*:*:*:*:*",
"versionEndExcluding": "update_ps-2210-02-4079",
"versionStartIncluding": "panorama_suite_2022-sp1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codra:panorama_suite:*:*:windows:*:*:*:*:*",
"versionEndExcluding": "update_ps-2300-03-3078_and_ps-2300-04-3078_and_ps-2300-82-3078",
"versionStartIncluding": "panorama_suite_2023",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codra:panorama_suite:*:*:windows:*:*:*:*:*",
"versionEndExcluding": "update_ps-2500-02-1078_and_ps-2500-04-1078",
"versionStartIncluding": "panorama_suite_2025",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codra:panorama_suite:*:*:windows:*:*:*:*:*",
"versionEndExcluding": "update_ps-2510-02-1077_and_ps-2510-04-1077",
"versionStartIncluding": "panorama_suite_2025_updated_dec._25",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "From Panorama Web HMI, an attacker can gain read access to certain Web HMI server files, if he knows their paths and if these files are accessible to the Servin process execution account.\u003cbr\u003e\u003cul\u003e\u003cli\u003eInstallations based on Panorama Suite 2022-SP1 (22.50.005) are vulnerable unless update PS-2210-02-4079 (or higher) is installed\u003c/li\u003e\u003cli\u003eInstallations based on Panorama Suite 2023 (23.00.004) are vulnerable unless updates PS-2300-03-3078 (or higher) and PS-2300-04-3078 (or higher) and PS-2300-82-3078 (or higher) are installed\u003c/li\u003e\u003cli\u003eInstallations based on Panorama Suite 2025 (25.00.016) are vulnerable unless updates PS-2500-02-1078 (or higher) and PS-2500-04-1078 (or higher) are installed \u003c/li\u003e\u003cli\u003eInstallations based on Panorama Suite 2025 Updated Dec. 25 (25.10.007) are vulnerable unless updates PS-2510-02-1077 (or higher) and PS-2510-04-1077 (or higher) are installed \u003c/li\u003e\u003c/ul\u003ePlease refer to security bulletin BS-035, available on the Panorama CSIRT website: \u003ca href=\"https://my.codra.net/en-gb/csirt\"\u003ehttps://my.codra.net/en-gb/csirt\u003c/a\u003e."
}
],
"value": "From Panorama Web HMI, an attacker can gain read access to certain Web HMI server files, if he knows their paths and if these files are accessible to the Servin process execution account.\n * Installations based on Panorama Suite 2022-SP1 (22.50.005) are vulnerable unless update PS-2210-02-4079 (or higher) is installed\n * Installations based on Panorama Suite 2023 (23.00.004) are vulnerable unless updates PS-2300-03-3078 (or higher) and PS-2300-04-3078 (or higher) and PS-2300-82-3078 (or higher) are installed\n * Installations based on Panorama Suite 2025 (25.00.016) are vulnerable unless updates PS-2500-02-1078 (or higher) and PS-2500-04-1078 (or higher) are installed \n * Installations based on Panorama Suite 2025 Updated Dec. 25 (25.10.007) are vulnerable unless updates PS-2510-02-1077 (or higher) and PS-2510-04-1077 (or higher) are installed \n\n\nPlease refer to security bulletin BS-035, available on the Panorama CSIRT website: https://my.codra.net/en-gb/csirt ."
}
],
"impacts": [
{
"capecId": "CAPEC-36",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-36 Using Unpublished Interfaces or Functionality"
}
]
},
{
"capecId": "CAPEC-6",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-6 Argument Injection"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"exploitMaturity": "UNREPORTED",
"privilegesRequired": "NONE",
"providerUrgency": "RED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:U/U:Red",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-552",
"description": "CWE-552 Files or directories accessible to external parties",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-26T08:53:11.120Z",
"orgId": "30aa36b7-a224-4bc9-b7d3-abea20aa4887",
"shortName": "CODRA"
},
"references": [
{
"url": "https://my.codra.net/api/csirt/download?resourceId=1467\u0026fileType=FichierPDF"
}
],
"source": {
"advisory": "Pano/BS-035",
"discovery": "INTERNAL"
},
"title": "Potential unauthorized access to files on the Web HMI server host",
"x_generator": {
"engine": "Vulnogram 1.0.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "30aa36b7-a224-4bc9-b7d3-abea20aa4887",
"assignerShortName": "CODRA",
"cveId": "CVE-2026-4760",
"datePublished": "2026-03-25T12:29:13.631Z",
"dateReserved": "2026-03-24T09:11:56.554Z",
"dateUpdated": "2026-03-26T08:53:11.120Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-4760",
"date": "2026-04-20",
"epss": "0.00092",
"percentile": "0.25691"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-4760\",\"sourceIdentifier\":\"30aa36b7-a224-4bc9-b7d3-abea20aa4887\",\"published\":\"2026-03-25T13:16:27.990\",\"lastModified\":\"2026-03-26T10:16:26.350\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"From Panorama Web HMI, an attacker can gain read access to certain Web HMI server files, if he knows their paths and if these files are accessible to the Servin process execution account.\\n * Installations based on Panorama Suite 2022-SP1 (22.50.005) are vulnerable unless update PS-2210-02-4079 (or higher) is installed\\n * Installations based on Panorama Suite 2023 (23.00.004) are vulnerable unless updates PS-2300-03-3078 (or higher) and PS-2300-04-3078 (or higher) and PS-2300-82-3078 (or higher) are installed\\n * Installations based on Panorama Suite 2025 (25.00.016) are vulnerable unless updates PS-2500-02-1078 (or higher) and PS-2500-04-1078 (or higher) are installed \\n * Installations based on Panorama Suite 2025 Updated Dec. 25 (25.10.007) are vulnerable unless updates PS-2510-02-1077 (or higher) and PS-2510-04-1077 (or higher) are installed \\n\\n\\nPlease refer to security bulletin BS-035, available on the Panorama CSIRT website: https://my.codra.net/en-gb/csirt .\"},{\"lang\":\"es\",\"value\":\"Desde Panorama Web HMI, un atacante puede obtener acceso de lectura a ciertos archivos del servidor Web HMI, si conoce sus rutas y si estos archivos son accesibles para la cuenta de ejecuci\u00f3n del proceso Servin.\\n\\n* Las instalaciones basadas en Panorama Suite 2022-SP1 (22.50.005) son vulnerables a menos que se instale la actualizaci\u00f3n PS-2210-02-4079 (o superior).\\n* Las instalaciones basadas en Panorama Suite 2023 (23.00.004) son vulnerables a menos que se instalen las actualizaciones PS-2300-03-3078 (o superior) y PS-2300-04-3078 (o superior) y PS-2300-82-3078 (o superior).\\n* Las instalaciones basadas en Panorama Suite 2025 (25.00.016) son vulnerables a menos que se instalen las actualizaciones PS-2500-02-1078 (o superior) y PS-2500-04-1078 (o superior).\\n* Las instalaciones basadas en Panorama Suite 2025 Actualizado Dic. 25 (25.10.007) son vulnerables a menos que se instalen las actualizaciones PS-2510-02-1077 (o superior) y PS-2510-04-1077 (o superior).\\n\\nConsulte el bolet\u00edn de seguridad BS-035, disponible en el sitio web de Panorama CSIRT: https://my.codra.net/en-gb/csirt.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"30aa36b7-a224-4bc9-b7d3-abea20aa4887\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Red\",\"baseScore\":7.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"HIGH\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"UNREPORTED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"RED\"}}]},\"weaknesses\":[{\"source\":\"30aa36b7-a224-4bc9-b7d3-abea20aa4887\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-552\"}]}],\"references\":[{\"url\":\"https://my.codra.net/api/csirt/download?resourceId=1467\u0026fileType=FichierPDF\",\"source\":\"30aa36b7-a224-4bc9-b7d3-abea20aa4887\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-4760\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-25T13:11:20.361122Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-25T13:11:22.796Z\"}}], \"cna\": {\"title\": \"Potential unauthorized access to files on the Web HMI server host\", \"source\": {\"advisory\": \"Pano/BS-035\", \"discovery\": \"INTERNAL\"}, \"impacts\": [{\"capecId\": \"CAPEC-36\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-36 Using Unpublished Interfaces or Functionality\"}]}, {\"capecId\": \"CAPEC-6\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-6 Argument Injection\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 7.7, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:U/U:Red\", \"exploitMaturity\": \"UNREPORTED\", \"providerUrgency\": \"RED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"HIGH\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"CODRA\", \"modules\": [\"Panorama HMI Web Server\"], \"product\": \"Panorama Suite\", \"versions\": [{\"status\": \"affected\", \"version\": \"Panorama Suite 2022-SP1\", \"lessThan\": \"update PS-2210-02-4079\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"Panorama Suite 2023\", \"lessThan\": \"update PS-2300-03-3078 AND PS-2300-04-3078 AND PS-2300-82-3078\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"Panorama Suite 2025\", \"lessThan\": \"update PS-2500-02-1078 AND PS-2500-04-1078\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"Panorama Suite 2025 Updated Dec. 25\", \"lessThan\": \"update PS-2510-02-1077 AND PS-2510-04-1077\", \"versionType\": \"custom\"}], \"platforms\": [\"Windows\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://my.codra.net/api/csirt/download?resourceId=1467\u0026fileType=FichierPDF\"}], \"x_generator\": {\"engine\": \"Vulnogram 1.0.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"From Panorama Web HMI, an attacker can gain read access to certain Web HMI server files, if he knows their paths and if these files are accessible to the Servin process execution account.\\n * Installations based on Panorama Suite 2022-SP1 (22.50.005) are vulnerable unless update PS-2210-02-4079 (or higher) is installed\\n * Installations based on Panorama Suite 2023 (23.00.004) are vulnerable unless updates PS-2300-03-3078 (or higher) and PS-2300-04-3078 (or higher) and PS-2300-82-3078 (or higher) are installed\\n * Installations based on Panorama Suite 2025 (25.00.016) are vulnerable unless updates PS-2500-02-1078 (or higher) and PS-2500-04-1078 (or higher) are installed \\n * Installations based on Panorama Suite 2025 Updated Dec. 25 (25.10.007) are vulnerable unless updates PS-2510-02-1077 (or higher) and PS-2510-04-1077 (or higher) are installed \\n\\n\\nPlease refer to security bulletin BS-035, available on the Panorama CSIRT website: https://my.codra.net/en-gb/csirt .\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"From Panorama Web HMI, an attacker can gain read access to certain Web HMI server files, if he knows their paths and if these files are accessible to the Servin process execution account.\u003cbr\u003e\u003cul\u003e\u003cli\u003eInstallations based on Panorama Suite 2022-SP1 (22.50.005) are vulnerable unless update PS-2210-02-4079 (or higher) is installed\u003c/li\u003e\u003cli\u003eInstallations based on Panorama Suite 2023 (23.00.004) are vulnerable unless updates PS-2300-03-3078 (or higher) and PS-2300-04-3078 (or higher) and PS-2300-82-3078 (or higher) are installed\u003c/li\u003e\u003cli\u003eInstallations based on Panorama Suite 2025 (25.00.016) are vulnerable unless updates PS-2500-02-1078 (or higher) and PS-2500-04-1078 (or higher) are installed \u003c/li\u003e\u003cli\u003eInstallations based on Panorama Suite 2025 Updated Dec. 25 (25.10.007) are vulnerable unless updates PS-2510-02-1077 (or higher) and PS-2510-04-1077 (or higher) are installed \u003c/li\u003e\u003c/ul\u003ePlease refer to security bulletin BS-035, available on the Panorama CSIRT website: \u003ca href=\\\"https://my.codra.net/en-gb/csirt\\\"\u003ehttps://my.codra.net/en-gb/csirt\u003c/a\u003e.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-552\", \"description\": \"CWE-552 Files or directories accessible to external parties\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:codra:panorama_suite:*:*:windows:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"update_ps-2210-02-4079\", \"versionStartIncluding\": \"panorama_suite_2022-sp1\"}, {\"criteria\": \"cpe:2.3:a:codra:panorama_suite:*:*:windows:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"update_ps-2300-03-3078_and_ps-2300-04-3078_and_ps-2300-82-3078\", \"versionStartIncluding\": \"panorama_suite_2023\"}, {\"criteria\": \"cpe:2.3:a:codra:panorama_suite:*:*:windows:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"update_ps-2500-02-1078_and_ps-2500-04-1078\", \"versionStartIncluding\": \"panorama_suite_2025\"}, {\"criteria\": \"cpe:2.3:a:codra:panorama_suite:*:*:windows:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"update_ps-2510-02-1077_and_ps-2510-04-1077\", \"versionStartIncluding\": \"panorama_suite_2025_updated_dec._25\"}], \"operator\": \"OR\"}], \"operator\": \"OR\"}], \"providerMetadata\": {\"orgId\": \"30aa36b7-a224-4bc9-b7d3-abea20aa4887\", \"shortName\": \"CODRA\", \"dateUpdated\": \"2026-03-26T08:53:11.120Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-4760\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-26T08:53:11.120Z\", \"dateReserved\": \"2026-03-24T09:11:56.554Z\", \"assignerOrgId\": \"30aa36b7-a224-4bc9-b7d3-abea20aa4887\", \"datePublished\": \"2026-03-25T12:29:13.631Z\", \"assignerShortName\": \"CODRA\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…