![]() Authenticated to an Extensible Messaging and Presence Protocol (XMPP) server that the affected software is using.To exploit the vulnerabilities, an attacker must be: In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities. Exploitation of one of the vulnerabilities is not required to exploit another vulnerability. ![]() The vulnerabilities are not dependent on one another. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |