4 results (0.010 seconds)

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 0

A flaw was found in the Libreoffice package. An attacker can craft an odb containing a "database/script" file with a SCRIPT command where the contents of the file could be written to a new file whose location was determined by the attacker. • http://www.openwall.com/lists/oss-security/2023/12/28/4 http://www.openwall.com/lists/oss-security/2024/01/03/4 https://access.redhat.com/security/cve/CVE-2023-1183 https://bugzilla.redhat.com/show_bug.cgi?id=2208506 https://www.libreoffice.org/about-us/security/advisories/cve-2023-1183 • CWE-20: Improper Input Validation CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

Improper Validation of Array Index vulnerability in the spreadsheet component of The Document Foundation LibreOffice allows an attacker to craft a spreadsheet document that will cause an array index underflow when loaded. In the affected versions of LibreOffice certain malformed spreadsheet formulas, such as AGGREGATE, could be created with less parameters passed to the formula interpreter than it expected, leading to an array index underflow, in which case there is a risk that arbitrary code could be executed. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.6; 7.5 versions prior to 7.5.1. A vulnerability was found in LibreOffice. Improper validation of the array index in the spreadsheet component of The Document Foundation in LibreOffice allows an attacker to craft a spreadsheet document that causes an array index underflow when loaded. • https://lists.debian.org/debian-lts-announce/2023/08/msg00014.html https://security.gentoo.org/glsa/202311-15 https://www.debian.org/security/2023/dsa-5415 https://www.libreoffice.org/about-us/security/advisories/CVE-2023-0950 https://access.redhat.com/security/cve/CVE-2023-0950 https://bugzilla.redhat.com/show_bug.cgi?id=2210186 • CWE-129: Improper Validation of Array Index •

CVSS: 5.3EPSS: 0%CPEs: 3EXPL: 2

Improper access control in editor components of The Document Foundation LibreOffice allowed an attacker to craft a document that would cause external links to be loaded without prompt. In the affected versions of LibreOffice documents that used "floating frames" linked to external files, would load the contents of those frames without prompting the user for permission to do so. This was inconsistent with the treatment of other linked content in LibreOffice. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.7; 7.5 versions prior to 7.5.3. A vulnerability was found in LibreOffice. • https://github.com/elweth-sec/CVE-2023-2255 https://github.com/SaintMichae64/CVE-2023-2255 https://lists.debian.org/debian-lts-announce/2023/08/msg00014.html https://security.gentoo.org/glsa/202311-15 https://www.debian.org/security/2023/dsa-5415 https://www.libreoffice.org/about-us/security/advisories/CVE-2023-2255 https://access.redhat.com/security/cve/CVE-2023-2255 https://bugzilla.redhat.com/show_bug.cgi?id=2210185 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

LibreOffice supports Office URI Schemes to enable browser integration of LibreOffice with MS SharePoint server. An additional scheme 'vnd.libreoffice.command' specific to LibreOffice was added. In the affected versions of LibreOffice links using that scheme could be constructed to call internal macros with arbitrary arguments. Which when clicked on, or activated by document events, could result in arbitrary script execution without warning. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.1; 7.3 versions prior to 7.3.6. • https://lists.debian.org/debian-lts-announce/2023/03/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TORANVTIWWBH3DNJR4UZATAG67KZOH32 https://security.gentoo.org/glsa/202212-04 https://www.debian.org/security/2022/dsa-5252 https://www.libreoffice.org/about-us/security/advisories/CVE-2022-3140 https://access.redhat.com/security/cve/CVE-2022-3140 https://bugzilla.redhat.com/show_bug.cgi?id=2134697 • CWE-20: Improper Input Validation CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •