3 results (0.346 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

Certificate Validation user interface in LibreOffice allows potential vulnerability. Signed macros are scripts that have been digitally signed by the developer using a cryptographic signature. When a document with a signed macro is opened a warning is displayed by LibreOffice before the macro is executed. Previously if verification failed the user could fail to understand the failure and choose to enable the macros anyway. This issue affects LibreOffice: from 24.2 before 24.2.5. A vulnerability was found in versions of LibreOffice from 24.2 to before 24.2.5. When a document containing a signed macro fails verification, LibreOffice will display a warning which the user can choose to ignore the failure and enable the macro anyways. • https://www.libreoffice.org/about-us/security/advisories/CVE-2024-6472 https://access.redhat.com/security/cve/CVE-2024-6472 https://bugzilla.redhat.com/show_bug.cgi?id=2302866 • CWE-295: Improper Certificate Validation •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Improper Certificate Validation vulnerability in LibreOffice "LibreOfficeKit" mode disables TLS certification verification LibreOfficeKit can be used for accessing LibreOffice functionality through C/C++. Typically this is used by third party components to reuse LibreOffice as a library to convert, view or otherwise interact with documents. LibreOffice internally makes use of "curl" to fetch remote resources such as images hosted on webservers. In affected versions of LibreOffice, when used in LibreOfficeKit mode only, then curl's TLS certification verification was disabled (CURLOPT_SSL_VERIFYPEER of false) In the fixed versions curl operates in LibreOfficeKit mode the same as in standard mode with CURLOPT_SSL_VERIFYPEER of true. This issue affects LibreOffice before version 24.2.4. • https://www.libreoffice.org/about-us/security/advisories/cve-2024-5261 • CWE-295: Improper Certificate Validation •

CVSS: 7.3EPSS: 0%CPEs: 2EXPL: 0

Unchecked script execution in Graphic on-click binding in affected LibreOffice versions allows an attacker to create a document which without prompt will execute scripts built-into LibreOffice on clicking a graphic. Such scripts were previously deemed trusted but are now deemed untrusted. La ejecución de script sin marcar en el enlace gráfico al hacer clic en las versiones afectadas de LibreOffice permite a un atacante crear un documento que, sin aviso, ejecutará script integradas en LibreOffice al hacer clic en un gráfico. Anteriormente, estos scripts se consideraban confiables, pero ahora se consideran no confiables. A flaw was found in LibreOffice. • https://lists.debian.org/debian-lts-announce/2024/05/msg00016.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TU3TYDXICKPYHMCNL7ARYYBXACEAYJ4 https://www.libreoffice.org/about-us/security/advisories/CVE-2024-3044 https://access.redhat.com/security/cve/CVE-2024-3044 https://bugzilla.redhat.com/show_bug.cgi?id=2280542 • CWE-20: Improper Input Validation CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-356: Product UI does not Warn User of Unsafe Actions •