Kategori: Təhlükəsizlik Zəiflikləri

CVE-2023-26433

When adding an external mail account, processing of IMAP “capabilities” responses are not limited to plausible sizes. Attacker with access to a rogue IMAP service…

Devamını oku

CVE-2023-26434

When adding an external mail account, processing of POP3 “capabilities” responses are not limited to plausible sizes. Attacker with access to a rogue POP3 service…

Devamını oku

CVE-2023-26435

It was possible to call filesystem and network references using the local LibreOffice instance using manipulated ODT documents. Attackers could discover restricted network topology and…

Devamını oku

CVE-2023-26436

Attackers with access to the “documentconverterws” API were able to inject serialized Java objects, that were not properly checked during deserialization. Access to this API…

Devamını oku

CVE-2022-48486

Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. Zafiyet ile ilgili Genel Bilgi, Etki ve Çözümleri için Devamını Oku…

Devamını oku

CVE-2022-48487

Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. Zafiyet ile ilgili Genel Bilgi, Etki ve Çözümleri için Devamını Oku…

Devamını oku