VYPR

rpm package

suse/libreoffice&distro=SUSE Linux Enterprise Software Development Kit 12 SP4

pkg:rpm/suse/libreoffice&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP4

Vulnerabilities (11)

  • CVE-2020-12801May 18, 2020
    affected < 6.4.4.2-43.65.5fixed 6.4.4.2-43.65.5

    If LibreOffice has an encrypted document open and crashes, that document is auto-saved encrypted. On restart, LibreOffice offers to restore the document and prompts for the password to decrypt it. If the recovery is successful, and if the file format of the recovered document was

  • CVE-2019-9853Sep 27, 2019
    affected < 6.3.3.2-43.59.5fixed 6.3.3.2-43.59.5

    LibreOffice documents can contain macros. The execution of those macros is controlled by the document security settings, typically execution of macros are blocked by default. A URL decoding flaw existed in how the urls to the macros within the document were processed and categori

  • CVE-2019-9855Sep 6, 2019
    affected < 6.2.7.1-43.56.3fixed 6.2.7.1-43.56.3

    LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be

  • CVE-2019-9854Sep 6, 2019
    affected < 6.2.7.1-43.56.3fixed 6.2.7.1-43.56.3

    LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of th

  • CVE-2019-9852Aug 15, 2019
    affected < 6.2.7.1-43.56.3fixed 6.2.7.1-43.56.3

    LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of th

  • CVE-2019-9851Aug 15, 2019
    affected < 6.2.7.1-43.56.3fixed 6.2.7.1-43.56.3

    LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from document eve

  • CVE-2019-9850Aug 15, 2019
    affected < 6.2.7.1-43.56.3fixed 6.2.7.1-43.56.3

    LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be

  • CVE-2019-9849Jul 17, 2019
    affected < 6.2.7.1-43.56.3fixed 6.2.7.1-43.56.3

    LibreOffice has a 'stealth mode' in which only documents from locations deemed 'trusted' are allowed to retrieve remote resources. This mode is not the default mode, but can be enabled by users who want to disable LibreOffice's ability to include remote resources within a documen

  • CVE-2019-9848Jul 17, 2019
    affected < 6.2.7.1-43.56.3fixed 6.2.7.1-43.56.3

    LibreOffice has a feature where documents can specify that pre-installed scripts can be executed on various document events such as mouse-over, etc. LibreOffice is typically also bundled with LibreLogo, a programmable turtle vector graphics script, which can be manipulated into e

  • CVE-2018-16858Mar 25, 2019
    affected < 6.2.3.2-43.49.1fixed 6.2.3.2-43.49.1

    It was found that libreoffice before versions 6.0.7 and 6.1.3 was vulnerable to a directory traversal attack which could be used to execute arbitrary macros bundled with a document. An attacker could craft a document, which when opened by LibreOffice, would execute a Python metho

  • CVE-2018-10583May 1, 2018
    affected < 6.0.5.2-43.38.5fixed 6.0.5.2-43.38.5

    An information disclosure vulnerability occurs when LibreOffice 6.0.3 and Apache OpenOffice Writer 4.1.5 automatically process and initiate an SMB connection embedded in a malicious file, as demonstrated by xlink:href=file://192.168.0.2/test.jpg within an office:document-content