Kategori: NIST-Təhlükəsizlik Zəiflikləri

CVE-2023-26429

Control characters were not removed when exporting user feedback content. This allowed attackers to include unexpected content via user feedback and potentially break the exported…

Devamını oku

CVE-2023-26432

When adding an external mail account, processing of SMTP “capabilities” responses are not limited to plausible sizes. Attacker with access to a rogue SMTP service…

Devamını oku

CVE-2023-26433

When adding an external mail account, processing of IMAP “capabilities” responses are not limited to plausible sizes. Attacker with access to a rogue IMAP service…

Devamını oku

CVE-2023-26434

When adding an external mail account, processing of POP3 “capabilities” responses are not limited to plausible sizes. Attacker with access to a rogue POP3 service…

Devamını oku

CVE-2023-26435

It was possible to call filesystem and network references using the local LibreOffice instance using manipulated ODT documents. Attackers could discover restricted network topology and…

Devamını oku

CVE-2023-26436

Attackers with access to the “documentconverterws” API were able to inject serialized Java objects, that were not properly checked during deserialization. Access to this API…

Devamını oku

CVE-2022-48486

Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. Zafiyet ile ilgili Genel Bilgi, Etki ve Çözümleri için Devamını Oku…

Devamını oku

CVE-2022-48487

Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. Zafiyet ile ilgili Genel Bilgi, Etki ve Çözümleri için Devamını Oku…

Devamını oku

CVE-2022-48488

Vulnerability of bypassing the default desktop security controls.Successful exploitation of this vulnerability may cause unauthorized modifications to the desktop. Zafiyet ile ilgili Genel Bilgi, Etki…

Devamını oku