This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Libreoffice First view 2011-07-21
Product Libreoffice Last view 2023-12-11
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:libreoffice:libreoffice:-:*:*:*:*:*:*:* 55
cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:* 54
cpe:2.3:a:libreoffice:libreoffice:3.3.0.4:*:*:*:*:*:*:* 54
cpe:2.3:a:libreoffice:libreoffice:3.3.0.3:*:*:*:*:*:*:* 54
cpe:2.3:a:libreoffice:libreoffice:3.3.1.1:*:*:*:*:*:*:* 54
cpe:2.3:a:libreoffice:libreoffice:3.2.99.3:*:*:*:*:*:*:* 54
cpe:2.3:a:libreoffice:libreoffice:3.3.0.1:*:*:*:*:*:*:* 54
cpe:2.3:a:libreoffice:libreoffice:3.3.0.2:*:*:*:*:*:*:* 54
cpe:2.3:a:libreoffice:libreoffice:3.2.99.2:*:*:*:*:*:*:* 54
cpe:2.3:a:libreoffice:libreoffice:3.3.1:*:*:*:*:*:*:* 54
cpe:2.3:a:libreoffice:libreoffice:3.3.0:*:*:*:*:*:*:* 54
cpe:2.3:a:libreoffice:libreoffice:3.3.2:*:*:*:*:*:*:* 54
cpe:2.3:a:libreoffice:libreoffice:3.3.202:*:*:*:*:*:*:* 53
cpe:2.3:a:libreoffice:libreoffice:3.4.2:*:*:*:*:*:*:* 53
cpe:2.3:a:libreoffice:libreoffice:3.4.1:*:*:*:*:*:*:* 53
cpe:2.3:a:libreoffice:libreoffice:3.3.99.2:*:*:*:*:*:*:* 53
cpe:2.3:a:libreoffice:libreoffice:3.3.99.1:*:*:*:*:*:*:* 53
cpe:2.3:a:libreoffice:libreoffice:3.3.3.1:*:*:*:*:*:*:* 53
cpe:2.3:a:libreoffice:libreoffice:3.3.99.4:*:*:*:*:*:*:* 53
cpe:2.3:a:libreoffice:libreoffice:3.4.0.2:*:*:*:*:*:*:* 53
cpe:2.3:a:libreoffice:libreoffice:3.4.0.1:*:*:*:*:*:*:* 53
cpe:2.3:a:libreoffice:libreoffice:3.3.3:*:*:*:*:*:*:* 53
cpe:2.3:a:libreoffice:libreoffice:3.3.4.1:*:*:*:*:*:*:* 53
cpe:2.3:a:libreoffice:libreoffice:3.3.99.5:*:*:*:*:*:*:* 53
cpe:2.3:a:libreoffice:libreoffice:3.3.4:*:*:*:*:*:*:* 53
cpe:2.3:a:libreoffice:libreoffice:3.3.99.3:*:*:*:*:*:*:* 53
cpe:2.3:a:libreoffice:libreoffice:3.3.2.1:*:*:*:*:*:*:* 53
cpe:2.3:a:libreoffice:libreoffice:3.4.0:*:*:*:*:*:*:* 53
cpe:2.3:a:libreoffice:libreoffice:3.4.1.1:*:*:*:*:*:*:* 53
cpe:2.3:a:libreoffice:libreoffice:3.4.2.2:*:*:*:*:*:*:* 52
cpe:2.3:a:libreoffice:libreoffice:3.4.2.1:*:*:*:*:*:*:* 52
cpe:2.3:a:libreoffice:libreoffice:3.4.2.3:*:*:*:*:*:*:* 52
cpe:2.3:a:libreoffice:libreoffice:3.4.5:*:*:*:*:*:*:* 52
cpe:2.3:a:libreoffice:libreoffice:3.5.0:*:*:*:*:*:*:* 52
cpe:2.3:a:libreoffice:libreoffice:3.4.99.1:*:*:*:*:*:*:* 51
cpe:2.3:a:libreoffice:libreoffice:3.5.2:*:*:*:*:*:*:* 51
cpe:2.3:a:libreoffice:libreoffice:3.5:*:*:*:*:*:*:* 51
cpe:2.3:a:libreoffice:libreoffice:3.5.1:*:*:*:*:*:*:* 51
cpe:2.3:a:libreoffice:libreoffice:3.5.0.2:*:*:*:*:*:*:* 51
cpe:2.3:a:libreoffice:libreoffice:3.5.0.1:*:*:*:*:*:*:* 51
cpe:2.3:a:libreoffice:libreoffice:3.5.0:rc1:*:*:*:*:*:* 51
cpe:2.3:a:libreoffice:libreoffice:3.5.0:rc2:*:*:*:*:*:* 51
cpe:2.3:a:libreoffice:libreoffice:3.5.1:rc2:*:*:*:*:*:* 51
cpe:2.3:a:libreoffice:libreoffice:3.5.2:rc1:*:*:*:*:*:* 51
cpe:2.3:a:libreoffice:libreoffice:3.4.99.0:*:*:*:*:*:*:* 51
cpe:2.3:a:libreoffice:libreoffice:3.5.2:rc2:*:*:*:*:*:* 51
cpe:2.3:a:libreoffice:libreoffice:3.5.:rc1:*:*:*:*:*:* 51
cpe:2.3:a:libreoffice:libreoffice:3.5.1:rc1:*:*:*:*:*:* 51
cpe:2.3:a:libreoffice:libreoffice:3.5.0:rc3:*:*:*:*:*:* 51
cpe:2.3:a:libreoffice:libreoffice:3.4.99.2:*:*:*:*:*:*:* 51

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
8.8 2023-12-11 CVE-2023-6186

Insufficient macro permission validation of The Document Foundation LibreOffice allows an attacker to execute built-in macros without warning.

In affected versions LibreOffice supports hyperlinks with macro or similar built-in command targets that can be executed when activated without warning the user.

8.8 2023-12-11 CVE-2023-6185

Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins.

In affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system.

5.5 2023-07-10 CVE-2023-1183

A flaw was found in the Libreoffice package. An attacker can craft an odb containing a "database/script" file with a SCRIPT command where the contents of the file could be written to a new file whose location was determined by the attacker.

5.3 2023-05-25 CVE-2023-2255

Improper access control in editor components of The Document Foundation LibreOffice allowed an attacker to craft a document that would cause external links to be loaded without prompt. In the affected versions of LibreOffice documents that used "floating frames" linked to external files, would load the contents of those frames without prompting the user for permission to do so. This was inconsistent with the treatment of other linked content in LibreOffice. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.7; 7.5 versions prior to 7.5.3.

7.8 2023-05-25 CVE-2023-0950

Improper Validation of Array Index vulnerability in the spreadsheet component of The Document Foundation LibreOffice allows an attacker to craft a spreadsheet document that will cause an array index underflow when loaded. In the affected versions of LibreOffice certain malformed spreadsheet formulas, such as AGGREGATE, could be created with less parameters passed to the formula interpreter than it expected, leading to an array index underflow, in which case there is a risk that arbitrary code could be executed. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.6; 7.5 versions prior to 7.5.1.

6.3 2022-10-11 CVE-2022-3140

LibreOffice supports Office URI Schemes to enable browser integration of LibreOffice with MS SharePoint server. An additional scheme 'vnd.libreoffice.command' specific to LibreOffice was added. In the affected versions of LibreOffice links using that scheme could be constructed to call internal macros with arbitrary arguments. Which when clicked on, or activated by document events, could result in arbitrary script execution without warning. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.1; 7.3 versions prior to 7.3.6.

8.8 2022-07-25 CVE-2022-26307

LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulerable to a brute force attack if an attacker has access to the users stored config. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.3.

7.5 2022-07-25 CVE-2022-26306

LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user's configuration data. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.1.

7.5 2022-07-25 CVE-2022-26305

An Improper Certificate Validation vulnerability in LibreOffice existed where determining if a macro was signed by a trusted author was done by only matching the serial number and issuer string of the used certificate with that of a trusted certificate. This is not sufficient to verify that the macro was actually signed with the certificate. An adversary could therefore create an arbitrary certificate with a serial number and an issuer string identical to a trusted certificate which LibreOffice would present as belonging to the trusted author, potentially leading to the user to execute arbitrary code contained in macros improperly trusted. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.1.

7.5 2022-02-24 CVE-2021-25636

LibreOffice supports digital signatures of ODF documents and macros within documents, presenting visual aids that no alteration of the document occurred since the last signing and that the signature is valid. An Improper Certificate Validation vulnerability in LibreOffice allowed an attacker to create a digitally signed ODF document, by manipulating the documentsignatures.xml or macrosignatures.xml stream within the document to contain both "X509Data" and "KeyValue" children of the "KeyInfo" tag, which when opened caused LibreOffice to verify using the "KeyValue" but to report verification with the unrelated "X509Data" value. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.5.

7.5 2021-10-12 CVE-2021-25634

LibreOffice supports digital signatures of ODF documents and macros within documents, presenting visual aids that no alteration of the document occurred since the last signing and that the signature is valid. An Improper Certificate Validation vulnerability in LibreOffice allowed an attacker to modify a digitally signed ODF document to insert an additional signing time timestamp which LibreOffice would incorrectly present as a valid signature signed at the bogus signing time. This issue affects: The Document Foundation LibreOffice 7-0 versions prior to 7.0.6; 7-1 versions prior to 7.1.2.

7.5 2021-10-11 CVE-2021-25633

LibreOffice supports digital signatures of ODF documents and macros within documents, presenting visual aids that no alteration of the document occurred since the last signing and that the signature is valid. An Improper Certificate Validation vulnerability in LibreOffice allowed an attacker to create a digitally signed ODF document, by manipulating the documentsignatures.xml or macrosignatures.xml stream within the document to combine multiple certificate data, which when opened caused LibreOffice to display a validly signed indicator but whose content was unrelated to the signature shown. This issue affects: The Document Foundation LibreOffice 7-0 versions prior to 7.0.6; 7-1 versions prior to 7.1.2.

8.8 2021-05-03 CVE-2021-25631

In the LibreOffice 7-1 series in versions prior to 7.1.2, and in the 7-0 series in versions prior to 7.0.5, the denylist can be circumvented by manipulating the link so it doesn't match the denylist but results in ShellExecute attempting to launch an executable type.

5.3 2021-01-07 CVE-2018-18688

The Portable Document Format (PDF) specification does not provide any information regarding the concrete procedure of how to validate signatures. Consequently, an Incremental Saving vulnerability exists in multiple products. When an attacker uses the Incremental Saving feature to add pages or annotations, Body Updates are displayed to the user without any action by the signature-validation logic. This affects Foxit Reader before 9.4 and PhantomPDF before 8.3.9 and 9.x before 9.4. It also affects LibreOffice, Master PDF Editor, Nitro Pro, Nitro Reader, Nuance Power PDF Standard, PDF Editor 6 Pro, PDFelement6 Pro, PDF Studio Viewer 2018, PDF Studio Pro, Perfect PDF 10 Premium, and Perfect PDF Reader.

6.5 2020-06-08 CVE-2020-12803

ODF documents can contain forms to be filled out by the user. Similar to HTML forms, the contained form data can be submitted to a URI, for example, to an external web server. To create submittable forms, ODF implements the XForms W3C standard, which allows data to be submitted without the need for macros or other active scripting Prior to version 6.4.4 LibreOffice allowed forms to be submitted to any URI, including file: URIs, enabling form submissions to overwrite local files. User-interaction is required to submit the form, but to avoid the possibility of malicious documents engineered to maximize the possibility of inadvertent user submission this feature has now been limited to http[s] URIs, removing the possibility to overwrite local files. This issue affects: The Document Foundation LibreOffice versions prior to 6.4.4.

5.3 2020-06-08 CVE-2020-12802

LibreOffice has a 'stealth mode' in which only documents from locations deemed 'trusted' are allowed to retrieve remote resources. This mode is not the default mode, but can be enabled by users who want to disable LibreOffice's ability to include remote resources within a document. A flaw existed where remote graphic links loaded from docx documents were omitted from this protection prior to version 6.4.4. This issue affects: The Document Foundation LibreOffice versions prior to 6.4.4.

5.3 2020-05-18 CVE-2020-12801

If LibreOffice has an encrypted document open and crashes, that document is auto-saved encrypted. On restart, LibreOffice offers to restore the document and prompts for the password to decrypt it. If the recovery is successful, and if the file format of the recovered document was not LibreOffice's default ODF file format, then affected versions of LibreOffice default that subsequent saves of the document are unencrypted. This may lead to a user accidentally saving a MSOffice file format document unencrypted while believing it to be encrypted. This issue affects: LibreOffice 6-3 series versions prior to 6.3.6; 6-4 series versions prior to 6.4.3.

6.5 2019-12-20 CVE-2012-5639

LibreOffice and OpenOffice automatically open embedded content

7.8 2019-09-27 CVE-2019-9853

LibreOffice documents can contain macros. The execution of those macros is controlled by the document security settings, typically execution of macros are blocked by default. A URL decoding flaw existed in how the urls to the macros within the document were processed and categorized, resulting in the possibility to construct a document where macro execution bypassed the security settings. The documents were correctly detected as containing macros, and prompted the user to their existence within the documents, but macros within the document were subsequently not controlled by the security settings allowing arbitrary macro execution This issue affects: LibreOffice 6.2 series versions prior to 6.2.7; LibreOffice 6.3 series versions prior to 6.3.1.

9.8 2019-09-06 CVE-2019-9855

LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added to block calling LibreLogo from script event handers. However a Windows 8.3 path equivalence handling flaw left LibreOffice vulnerable under Windows that a document could trigger executing LibreLogo via a Windows filename pseudonym. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1.

7.8 2019-09-06 CVE-2019-9854

LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2019-9852, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed by employing a URL encoding attack to defeat the path verification step. However this protection could be bypassed by taking advantage of a flaw in how LibreOffice assembled the final script URL location directly from components of the passed in path as opposed to solely from the sanitized output of the path verification step. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1.

7.8 2019-08-15 CVE-2019-9852

LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2018-16858, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed. However this new protection could be bypassed by a URL encoding attack. In the fixed versions, the parsed url describing the script location is correctly encoded before further processing. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.

9.8 2019-08-15 CVE-2019-9851

LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from document event script handers, e.g. mouse over. However LibreOffice also has a separate feature where documents can specify that pre-installed scripts can be executed on various global script events such as document-open, etc. In the fixed versions, global script event handlers are validated equivalently to document script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.

9.8 2019-08-15 CVE-2019-9850

LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from script event handers. However an insufficient url validation vulnerability in LibreOffice allowed malicious to bypass that protection and again trigger calling LibreLogo from script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.

4.3 2019-07-17 CVE-2019-9849

LibreOffice has a 'stealth mode' in which only documents from locations deemed 'trusted' are allowed to retrieve remote resources. This mode is not the default mode, but can be enabled by users who want to disable LibreOffice's ability to include remote resources within a document. A flaw existed where bullet graphics were omitted from this protection prior to version 6.2.5. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5.

CWE : Common Weakness Enumeration

%idName
15% (8) CWE-787 Out-of-bounds Write
13% (7) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
11% (6) CWE-20 Improper Input Validation
7% (4) CWE-295 Certificate Issues
7% (4) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
5% (3) CWE-200 Information Exposure
5% (3) CWE-189 Numeric Errors
3% (2) CWE-129 Improper Validation of Array Index
1% (1) CWE-668 Exposure of Resource to Wrong Sphere
1% (1) CWE-611 Information Leak Through XML External Entity File Disclosure
1% (1) CWE-417 Channel and Path Errors
1% (1) CWE-416 Use After Free
1% (1) CWE-347 Improper Verification of Cryptographic Signature
1% (1) CWE-330 Use of Insufficiently Random Values
1% (1) CWE-312 Cleartext Storage of Sensitive Information
1% (1) CWE-281 Improper Preservation of Permissions
1% (1) CWE-191 Integer Underflow (Wrap or Wraparound)
1% (1) CWE-125 Out-of-bounds Read
1% (1) CWE-116 Improper Encoding or Escaping of Output
1% (1) CWE-94 Failure to Control Generation of Code ('Code Injection')
1% (1) CWE-88 Argument Injection or Modification
1% (1) CWE-77 Improper Sanitization of Special Elements used in a Command ('Comma...

Oval Markup Language : Definitions

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
OvalID Name
oval:org.mitre.oval:def:14956 DSA-2315-1 openoffice.org -- multiple vulnerabilities
oval:org.mitre.oval:def:21474 RHSA-2012:0411: openoffice.org security update (Important)
oval:org.mitre.oval:def:21328 RHSA-2012:0410: raptor security update (Important)
oval:org.mitre.oval:def:21265 USN-1901-1 -- raptor2 vulnerability
oval:org.mitre.oval:def:16854 USN-1480-1 -- Raptor vulnerability
oval:org.mitre.oval:def:15215 DSA-2438-1 raptor -- programming error
oval:org.mitre.oval:def:23828 ELSA-2012:0410: raptor security update (Important)
oval:org.mitre.oval:def:23158 ELSA-2012:0411: openoffice.org security update (Important)
oval:org.mitre.oval:def:27837 DEPRECATED: ELSA-2012-0410 -- raptor security update (important)
oval:org.mitre.oval:def:21322 RHSA-2012:0705: openoffice.org security update (Important)
oval:org.mitre.oval:def:18515 DSA-2487-1 openoffice.org - buffer overflow
oval:org.mitre.oval:def:17917 USN-1496-1 -- openoffice.org vulnerabilities
oval:org.mitre.oval:def:17416 USN-1495-1 -- libreoffice, libreoffice-l10n vulnerabilities
oval:org.mitre.oval:def:23553 ELSA-2012:0705: openoffice.org security update (Important)
oval:org.mitre.oval:def:22901 DEPRECATED: ELSA-2012:0705: openoffice.org security update (Important)
oval:org.mitre.oval:def:27750 DEPRECATED: ELSA-2012-0705 -- openoffice.org security update (important)
oval:org.mitre.oval:def:18355 DSA-2473-1 openoffice.org - buffer overflow
oval:org.mitre.oval:def:21514 RHSA-2012:1135: libreoffice security update (Important)
oval:org.mitre.oval:def:21348 RHSA-2012:1136: openoffice.org security update (Important)
oval:org.mitre.oval:def:19447 DSA-2520-1 openoffice.org - Multiple heap-based buffer overflows
oval:org.mitre.oval:def:18059 USN-1537-1 -- openoffice.org vulnerability
oval:org.mitre.oval:def:17974 USN-1536-1 -- libreoffice vulnerability
oval:org.mitre.oval:def:23713 ELSA-2012:1135: libreoffice security update (Important)
oval:org.mitre.oval:def:23289 ELSA-2012:1136: openoffice.org security update (Important)
oval:org.mitre.oval:def:27650 DEPRECATED: ELSA-2012-1135 -- libreoffice security update (important)

Open Source Vulnerability Database (OSVDB)

id Description
76178 OpenOffice.org (OOo) Out-of-of Bounds Read DOC FIle Handling Remote DoS
73314 LibreOffice LWP File Handling Overflow

OpenVAS Exploits

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2012-12-24 Name : OpenOffice Multiple Buffer Overflow Vulnerabilities - Dec12 (Windows)
File : nvt/gb_openoffice_mult_bof_vuln_dec12_win.nasl
2012-12-24 Name : LibreOffice Graphic Object Loading Buffer Overflow Vulnerability (Windows)
File : nvt/gb_libreoffice_graphic_object_bof_vuln_win.nasl
2012-12-24 Name : LibreOffice Graphic Object Loading Buffer Overflow Vulnerability (Mac OS X)
File : nvt/gb_libreoffice_graphic_object_bof_vuln_macosx.nasl
2012-12-24 Name : LibreOffice XML Manifest Handling Buffer Overflow Vulnerabilities (Mac OS X)
File : nvt/gb_libreoffice_xml_manifest_bof_vuln_macosx.nasl
2012-12-24 Name : LibreOffice XML Manifest Handling Buffer Overflow Vulnerabilities (Windows)
File : nvt/gb_libreoffice_xml_manifest_bof_vuln_win.nasl
2012-11-26 Name : LibreOffice Import Files Denial of Service Vulnerabilities (Mac OS X)
File : nvt/gb_libreoffice_mult_files_dos_vuln_macosx.nasl
2012-11-26 Name : LibreOffice Import Files Denial of Service Vulnerabilities (Windows)
File : nvt/gb_libreoffice_mult_files_dos_vuln_win.nasl
2012-11-16 Name : Debian Security Advisory DSA 2570-1 (openoffice.org)
File : nvt/deb_2570_1.nasl
2012-09-26 Name : Gentoo Security Advisory GLSA 201209-05 (libreoffice)
File : nvt/glsa_201209_05.nasl
2012-08-30 Name : Debian Security Advisory DSA 2487-1 (openoffice.org)
File : nvt/deb_2487_1.nasl
2012-08-30 Name : Fedora Update for raptor2 FEDORA-2012-4629
File : nvt/gb_fedora_2012_4629_raptor2_fc17.nasl
2012-08-30 Name : Fedora Update for raptor FEDORA-2012-10591
File : nvt/gb_fedora_2012_10591_raptor_fc17.nasl
2012-08-14 Name : Ubuntu Update for libreoffice USN-1536-1
File : nvt/gb_ubuntu_USN_1536_1.nasl
2012-08-14 Name : Fedora Update for libreoffice FEDORA-2012-11402
File : nvt/gb_fedora_2012_11402_libreoffice_fc16.nasl
2012-08-14 Name : Ubuntu Update for openoffice.org USN-1537-1
File : nvt/gb_ubuntu_USN_1537_1.nasl
2012-08-10 Name : Debian Security Advisory DSA 2520-1 (openoffice.org)
File : nvt/deb_2520_1.nasl
2012-08-03 Name : RedHat Update for libreoffice RHSA-2012:1135-01
File : nvt/gb_RHSA-2012_1135-01_libreoffice.nasl
2012-08-03 Name : Mandriva Update for libreoffice MDVSA-2012:063 (libreoffice)
File : nvt/gb_mandriva_MDVSA_2012_063.nasl
2012-08-03 Name : Fedora Update for raptor FEDORA-2012-10590
File : nvt/gb_fedora_2012_10590_raptor_fc16.nasl
2012-08-03 Name : Mandriva Update for raptor MDVSA-2012:061 (raptor)
File : nvt/gb_mandriva_MDVSA_2012_061.nasl
2012-08-03 Name : CentOS Update for openoffice.org-base CESA-2012:1136 centos5
File : nvt/gb_CESA-2012_1136_openoffice.org-base_centos5.nasl
2012-08-03 Name : CentOS Update for autocorr-af CESA-2012:1135 centos6
File : nvt/gb_CESA-2012_1135_autocorr-af_centos6.nasl
2012-08-03 Name : Mandriva Update for libreoffice MDVSA-2012:091 (libreoffice)
File : nvt/gb_mandriva_MDVSA_2012_091.nasl
2012-07-30 Name : CentOS Update for openoffice.org-base CESA-2012:0411 centos5
File : nvt/gb_CESA-2012_0411_openoffice.org-base_centos5.nasl
2012-07-30 Name : CentOS Update for openoffice.org-base CESA-2012:0705 centos5
File : nvt/gb_CESA-2012_0705_openoffice.org-base_centos5.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2014-B-0117 Multiple Vulnerabilities in Apache OpenOffice
Severity: Category II - VMSKEY: V0054059

Snort® IPS/IDS

Date Description
2019-11-26 LibreOffice office document arbitrary script execution attempt
RuleID : 52000 - Type : FILE-OTHER - Revision : 1
2019-11-26 LibreOffice office document arbitrary script execution attempt
RuleID : 51999 - Type : FILE-OTHER - Revision : 1
2019-09-19 LibreOffice macro remote code execution attempt
RuleID : 51101 - Type : FILE-OTHER - Revision : 1
2019-09-19 LibreOffice macro remote code execution attempt
RuleID : 51100 - Type : FILE-OTHER - Revision : 1
2019-09-19 LibreOffice macro remote code execution attempt
RuleID : 51099 - Type : FILE-OTHER - Revision : 1
2019-09-19 LibreOffice macro remote code execution attempt
RuleID : 51098 - Type : FILE-OTHER - Revision : 1
2018-09-18 LibreOffice WEBSERVICE arbitrary file disclosure attempt
RuleID : 47566 - Type : FILE-OFFICE - Revision : 1
2018-09-18 LibreOffice WEBSERVICE arbitrary file disclosure attempt
RuleID : 47565 - Type : FILE-OFFICE - Revision : 1
2016-06-07 Document Foundation LibreOffice RTF stylesheet use after free attempt
RuleID : 39149 - Type : FILE-OFFICE - Revision : 4
2016-06-07 Document Foundation LibreOffice RTF stylesheet use after free attempt
RuleID : 39148 - Type : FILE-OFFICE - Revision : 4
2015-08-18 LibreOffice Impress socket manager Use After Free attempt
RuleID : 35253 - Type : SERVER-OTHER - Revision : 3

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2019-01-18 Name: A PDF toolkit installed on the remote Windows host is affected by multiple vu...
File: foxit_phantom_8_3_9.nasl - Type: ACT_GATHER_INFO
2019-01-09 Name: A PDF toolkit installed on the remote Windows host is affected by a multiple ...
File: foxit_phantom_9_4.nasl - Type: ACT_GATHER_INFO
2019-01-09 Name: A PDF viewer installed on the remote Windows host is affected by multiple vul...
File: foxit_reader_9_4.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-8d3f4d7b28.nasl - Type: ACT_GATHER_INFO
2018-05-14 Name: The remote Fedora host is missing a security update.
File: fedora_2018-490f30ffa0.nasl - Type: ACT_GATHER_INFO
2018-04-30 Name: The remote Fedora host is missing a security update.
File: fedora_2018-e87eb1ae68.nasl - Type: ACT_GATHER_INFO
2018-04-23 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4178.nasl - Type: ACT_GATHER_INFO
2018-04-20 Name: The remote Debian host is missing a security update.
File: debian_DLA-1356.nasl - Type: ACT_GATHER_INFO
2018-03-15 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-0517.nasl - Type: ACT_GATHER_INFO
2018-03-12 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2018-0418.nasl - Type: ACT_GATHER_INFO
2018-02-26 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_289269f10def11e899b0d017c2987f9a.nasl - Type: ACT_GATHER_INFO
2018-02-20 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201802-06.nasl - Type: ACT_GATHER_INFO
2018-02-15 Name: The remote Fedora host is missing a security update.
File: fedora_2018-3eb4d8e4c4.nasl - Type: ACT_GATHER_INFO
2018-02-12 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4111.nasl - Type: ACT_GATHER_INFO
2018-01-15 Name: The remote Fedora host is missing a security update.
File: fedora_2017-5128c8cfe2.nasl - Type: ACT_GATHER_INFO
2017-11-07 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-1247.nasl - Type: ACT_GATHER_INFO
2017-11-07 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2017-2931-1.nasl - Type: ACT_GATHER_INFO
2017-11-02 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2017-1274.nasl - Type: ACT_GATHER_INFO
2017-11-02 Name: The remote EulerOS host is missing a security update.
File: EulerOS_SA-2017-1275.nasl - Type: ACT_GATHER_INFO
2017-09-20 Name: The remote Fedora host is missing a security update.
File: fedora_2017-63ff51c0dc.nasl - Type: ACT_GATHER_INFO
2017-09-18 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-1048.nasl - Type: ACT_GATHER_INFO
2017-09-01 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2017-2315-1.nasl - Type: ACT_GATHER_INFO
2017-08-25 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2017-1975.nasl - Type: ACT_GATHER_INFO
2017-08-22 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20170801_libreoffice_on_SL7_x.nasl - Type: ACT_GATHER_INFO
2017-08-09 Name: The remote Oracle Linux host is missing one or more security updates.
File: oraclelinux_ELSA-2017-1975.nasl - Type: ACT_GATHER_INFO