logo

Database

Home

Vulnerabilities

Weaknesses

Fixes

Requirements

Architecture

Authentication

Authorization

Certificates

Credentials

Cryptography

Data

Devices

Emails

Files

Legal

Logs

Networks

Privacy

Services

Session

Social

Source

System

Virtualization

Standards

Rules


Documentation

Help

Log in to the platform

Website

Data sources

Home

Vulnerabilities

Weaknesses

Fixes

Requirements

Architecture

Authentication

Authorization

Certificates

Credentials

Cryptography

Data

Devices

Emails

Files

Legal

Logs

Networks

Privacy

Services

Session

Social

Source

System

Virtualization

Standards

Rules


Documentation

Help

Log in to the platform

Website

Data sources

  1. /

  2. Home
  3. /

  4. Requirements
  5. /

  6. Emails

Emails

115. Filter malicious emails118. Inspect attachments116. Disable images of unknown origin121. Guarantee uniqueness of emails117. Do not interpret HTML code