Vendor Verbiage

Software vendors make it extremely difficult (by design) to understand when a vulnerability affecting their product is either publicly known (proof of concept) or exploited in the wild (possibly as a zero-day). Everyone's language is different from each other. I have compiled a list of messages (sorted by vendor name) from official security advisories that either imply or explicitly state proof of concept or evidence of exploitation. I have included a link and date for reference, in case these vendors change their verbiage in the future.

Feedback: Please direct message any comments, concerns, corrections or questions to https://infosec.exchange/@screaminggoat

A

Adobe:

Apple:

Arm:

Atlassian:

B

Barracuda:

C

Check Point:

Cisco:

Citrix:

D

D-Link:

E

F

F5:

Fortinet:

G

Google (Android):

Google (Chrome):

H

I

Ivanti:

J

JetBrains:

Juniper:

K

L

M

Microsoft:

Mozilla Foundation:

N

O

Oracle:

P

Palo Alto Networks:

PaperCut:

Progress Software (MOVEit):

Q

Qlik:

QNAP:

Qualcomm:

R

S

SolarWinds:

SonicWall:

Sophos:

SysAid:

T

TP-Link:

Trend Micro:

U

V

Veritas:

Versa:

VMware (Broadcom):

W

X

Y

Z

Zimbra:

Zoho (ManageEngine):

Zyxel: