Количество 22
Количество 22
SUSE-SU-2023:4984-1
Security update for libreoffice
SUSE-SU-2023:4932-1
Security update for libreoffice
RLSA-2024:3835
Important: libreoffice security update
RLSA-2024:1514
Important: libreoffice security fix update
RLSA-2024:1427
Important: libreoffice security update
ELSA-2024-3835
ELSA-2024-3835: libreoffice security update (IMPORTANT)
ELSA-2024-1514
ELSA-2024-1514: libreoffice security fix update (IMPORTANT)
ELSA-2024-1427
ELSA-2024-1427: libreoffice security update (IMPORTANT)
ROS-20240408-07
Множественные уязвимости libreoffice
CVE-2023-6186
Insufficient macro permission validation of The Document Foundation LibreOffice allows an attacker to execute built-in macros without warning. In affected versions LibreOffice supports hyperlinks with macro or similar built-in command targets that can be executed when activated without warning the user.
CVE-2023-6186
Insufficient macro permission validation of The Document Foundation LibreOffice allows an attacker to execute built-in macros without warning. In affected versions LibreOffice supports hyperlinks with macro or similar built-in command targets that can be executed when activated without warning the user.
CVE-2023-6186
Insufficient macro permission validation of The Document Foundation LibreOffice allows an attacker to execute built-in macros without warning. In affected versions LibreOffice supports hyperlinks with macro or similar built-in command targets that can be executed when activated without warning the user.
CVE-2023-6186
Insufficient macro permission validation of The Document Foundation Li ...
CVE-2023-6185
Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins. In affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system.
CVE-2023-6185
Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins. In affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system.
CVE-2023-6185
Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins. In affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system.
CVE-2023-6185
Improper Input Validation vulnerability in GStreamer integration of Th ...
GHSA-q565-g228-cgg3
Insufficient macro permission validation of The Document Foundation LibreOffice allows an attacker to execute built-in macros without warning. In affected versions LibreOffice supports hyperlinks with macro or similar built-in command targets that can be executed when activated without warning the user.
BDU:2023-08655
Уязвимость пакета офисных программ LibreOffice, связанная с возможностью внедрения кода или данных, позволяющая нарушителю выполнить произвольный код
GHSA-58qf-gq3r-xwgx
Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins. In affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
SUSE-SU-2023:4984-1 Security update for libreoffice | около 2 лет назад | |||
SUSE-SU-2023:4932-1 Security update for libreoffice | около 2 лет назад | |||
RLSA-2024:3835 Important: libreoffice security update | больше 1 года назад | |||
RLSA-2024:1514 Important: libreoffice security fix update | почти 2 года назад | |||
RLSA-2024:1427 Important: libreoffice security update | больше 1 года назад | |||
ELSA-2024-3835 ELSA-2024-3835: libreoffice security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2024-1514 ELSA-2024-1514: libreoffice security fix update (IMPORTANT) | почти 2 года назад | |||
ELSA-2024-1427 ELSA-2024-1427: libreoffice security update (IMPORTANT) | почти 2 года назад | |||
ROS-20240408-07 Множественные уязвимости libreoffice | CVSS3: 8.3 | почти 2 года назад | ||
CVE-2023-6186 Insufficient macro permission validation of The Document Foundation LibreOffice allows an attacker to execute built-in macros without warning. In affected versions LibreOffice supports hyperlinks with macro or similar built-in command targets that can be executed when activated without warning the user. | CVSS3: 8.3 | 1% Низкий | около 2 лет назад | |
CVE-2023-6186 Insufficient macro permission validation of The Document Foundation LibreOffice allows an attacker to execute built-in macros without warning. In affected versions LibreOffice supports hyperlinks with macro or similar built-in command targets that can be executed when activated without warning the user. | CVSS3: 8.3 | 1% Низкий | около 2 лет назад | |
CVE-2023-6186 Insufficient macro permission validation of The Document Foundation LibreOffice allows an attacker to execute built-in macros without warning. In affected versions LibreOffice supports hyperlinks with macro or similar built-in command targets that can be executed when activated without warning the user. | CVSS3: 8.3 | 1% Низкий | около 2 лет назад | |
CVE-2023-6186 Insufficient macro permission validation of The Document Foundation Li ... | CVSS3: 8.3 | 1% Низкий | около 2 лет назад | |
CVE-2023-6185 Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins. In affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system. | CVSS3: 8.3 | 1% Низкий | около 2 лет назад | |
CVE-2023-6185 Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins. In affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system. | CVSS3: 8.3 | 1% Низкий | около 2 лет назад | |
CVE-2023-6185 Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins. In affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system. | CVSS3: 8.3 | 1% Низкий | около 2 лет назад | |
CVE-2023-6185 Improper Input Validation vulnerability in GStreamer integration of Th ... | CVSS3: 8.3 | 1% Низкий | около 2 лет назад | |
GHSA-q565-g228-cgg3 Insufficient macro permission validation of The Document Foundation LibreOffice allows an attacker to execute built-in macros without warning. In affected versions LibreOffice supports hyperlinks with macro or similar built-in command targets that can be executed when activated without warning the user. | CVSS3: 8.3 | 1% Низкий | около 2 лет назад | |
BDU:2023-08655 Уязвимость пакета офисных программ LibreOffice, связанная с возможностью внедрения кода или данных, позволяющая нарушителю выполнить произвольный код | CVSS3: 8.3 | 1% Низкий | около 2 лет назад | |
GHSA-58qf-gq3r-xwgx Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins. In affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system. | CVSS3: 8.3 | 1% Низкий | около 2 лет назад |
Уязвимостей на страницу