After the publication of the PoC by the researcher and further analysis, we have determined that this issue does not constitute a valid vulnerability. The technique described is an obfuscation method and does not bypass or impact any implicit or explicit security controls.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References

No reference.

History

Wed, 18 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Description After the publication of the PoC by the researcher and further analysis, we have determined that this issue does not constitute a valid vulnerability. The technique described is an obfuscation method and does not bypass or impact any implicit or explicit security controls.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: REJECTED

Assigner: certcc

Published: No published date

Updated: 2026-03-18T19:50:41.341Z

Reserved: 2026-01-12T19:26:35.518Z

Link: CVE-2026-0866

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Rejected

Published: 2026-03-18T20:16:19.150

Modified: 2026-03-18T20:16:19.150

Link: CVE-2026-0866

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses

No weakness.