After the publication of the PoC by the researcher and further analysis, we have determined that this issue does not constitute a valid vulnerability. The technique described is an obfuscation method and does not bypass or impact any implicit or explicit security controls.
Subscriptions
No data.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
No reference.
History
Wed, 18 Mar 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | After the publication of the PoC by the researcher and further analysis, we have determined that this issue does not constitute a valid vulnerability. The technique described is an obfuscation method and does not bypass or impact any implicit or explicit security controls. |
Status: REJECTED
Assigner: certcc
Published: No published date
Updated: 2026-03-18T19:50:41.341Z
Reserved: 2026-01-12T19:26:35.518Z
Link: CVE-2026-0866
No data.
Status : Rejected
Published: 2026-03-18T20:16:19.150
Modified: 2026-03-18T20:16:19.150
Link: CVE-2026-0866
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.