Show filters
182 Total Results
Displaying 1-10 of 182
Sort by:
Attacker Value
Unknown

CVE-2024-4367

Disclosure Date: May 14, 2024 (last updated January 23, 2025)
A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context. This vulnerability affects Firefox < 126, Firefox ESR < 115.11, and Thunderbird < 115.11.
Attacker Value
Unknown

CVE-2023-41708

Disclosure Date: February 12, 2024 (last updated October 18, 2024)
References to the "app loader" functionality could contain redirects to unexpected locations. Attackers could forge app references that bypass existing safeguards to inject malicious script code. Please deploy the provided updates and patch releases. References to apps are now controlled more strict to avoid relative references. No publicly available exploits are known.
Attacker Value
Unknown

CVE-2023-41707

Disclosure Date: February 12, 2024 (last updated October 18, 2024)
Processing of user-defined mail search expressions is not limited. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing time of mail search expressions now gets monitored, and the related request is terminated if a resource threshold is reached. No publicly available exploits are known.
Attacker Value
Unknown

CVE-2023-41706

Disclosure Date: February 12, 2024 (last updated October 18, 2024)
Processing time of drive search expressions now gets monitored, and the related request is terminated if a resource threshold is reached. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing of user-defined drive search expressions is not limited No publicly available exploits are known.
Attacker Value
Unknown

CVE-2023-41705

Disclosure Date: February 12, 2024 (last updated October 18, 2024)
Processing of user-defined DAV user-agent strings is not limited. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing time of DAV user-agents now gets monitored, and the related request is terminated if a resource threshold is reached. No publicly available exploits are known.
Attacker Value
Unknown

CVE-2023-41704

Disclosure Date: February 12, 2024 (last updated October 18, 2024)
Processing of CID references at E-Mail can be abused to inject malicious script code that passes the sanitization engine. Malicious script code could be injected to a users sessions when interacting with E-Mails. Please deploy the provided updates and patch releases. CID handing has been improved and resulting content is checked for malicious content. No publicly available exploits are known.
Attacker Value
Unknown

CVE-2023-41703

Disclosure Date: February 12, 2024 (last updated October 18, 2024)
User ID references at mentions in document comments were not correctly sanitized. Script code could be injected to a users session when working with a malicious document. Please deploy the provided updates and patch releases. User-defined content like comments and mentions are now filtered to avoid potentially malicious content. No publicly available exploits are known.
Attacker Value
Unknown

CVE-2023-29047

Disclosure Date: November 02, 2023 (last updated November 10, 2023)
Imageconverter API endpoints provided methods that were not sufficiently validating and sanitizing client input, allowing to inject arbitrary SQL statements. An attacker with access to the adjacent network and potentially API credentials, could read and modify database content which is accessible to the imageconverter SQL user account. None No publicly available exploits are known.
Attacker Value
Unknown

CVE-2023-29046

Disclosure Date: November 02, 2023 (last updated November 10, 2023)
Connections to external data sources, like e-mail autoconfiguration, were not terminated in case they hit a timeout, instead those connections were logged. Some connections use user-controlled endpoints, which could be malicious and attempt to keep the connection open for an extended period of time. As a result users were able to trigger large amount of egress network connections, possibly exhausting network pool resources and lock up legitimate requests. A new mechanism has been introduced to cancel external connections that might access user-controlled endpoints. No publicly available exploits are known.
Attacker Value
Unknown

CVE-2023-29045

Disclosure Date: November 02, 2023 (last updated November 10, 2023)
Documents operations, in this case "drawing", could be manipulated to contain invalid data types, possibly script code. Script code could be injected to an operation that would be executed for users that are actively collaborating on the same document. Operation data exchanged between collaborating parties does now gets checked for validity to avoid code execution. No publicly available exploits are known.