CVE-2023-26432
When adding an external mail account, processing of SMTP “capabilities” responses are not limited to plausible sizes. Attacker with access to a rogue SMTP service…
When adding an external mail account, processing of SMTP “capabilities” responses are not limited to plausible sizes. Attacker with access to a rogue SMTP service…
When adding an external mail account, processing of IMAP “capabilities” responses are not limited to plausible sizes. Attacker with access to a rogue IMAP service…
When adding an external mail account, processing of POP3 “capabilities” responses are not limited to plausible sizes. Attacker with access to a rogue POP3 service…
It was possible to call filesystem and network references using the local LibreOffice instance using manipulated ODT documents. Attackers could discover restricted network topology and…
Attackers with access to the “documentconverterws” API were able to inject serialized Java objects, that were not properly checked during deserialization. Access to this API…
Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. Zafiyet ile ilgili Genel Bilgi, Etki ve Çözümleri için Devamını Oku…
Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. Zafiyet ile ilgili Genel Bilgi, Etki ve Çözümleri için Devamını Oku…
Vulnerability of bypassing the default desktop security controls.Successful exploitation of this vulnerability may cause unauthorized modifications to the desktop. Zafiyet ile ilgili Genel Bilgi, Etki…
Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. Zafiyet ile ilgili Genel Bilgi, Etki ve Çözümleri için Devamını Oku…
Configuration defects in the secure OS module.Successful exploitation of this vulnerability will affect availability. Zafiyet ile ilgili Genel Bilgi, Etki ve Çözümleri için Devamını Oku…