Browse all 3 CVE security advisories affecting foxcpp. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Foxcpp develops security tools focused on fuzzing and vulnerability discovery, primarily targeting web applications and network protocols. Historically, foxcpp's research has uncovered vulnerabilities across multiple classes, including remote code execution, cross-site scripting, and privilege escalations. The security community recognizes foxcpp's contributions through three assigned CVEs, demonstrating impact in real-world systems. While no major public incidents directly tie to foxcpp's tools, the project maintains a reputation for thorough vulnerability research and practical exploit development. The work consistently emphasizes uncovering edge cases and implementation flaws that automated scanners might miss, making it valuable for security researchers and penetration testers seeking to identify complex vulnerabilities in production environments.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-40193 | Maddy Mail Server: LDAP Filter Injection via Unsanitized Username — maddyCWE-90 | 8.2 | High | 2026-04-15 |
| CVE-2023-27582 | Full authentication bypass if SASL authorization username is specified — maddyCWE-287 | 9.1 | Critical | 2023-03-13 |
| CVE-2022-24732 | Maddy Mail Server does not implement account expiry — maddyCWE-613 | 6.3 | Medium | 2022-03-09 |
This page lists every published CVE security advisory associated with foxcpp. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.