Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libreoffice@0?distro=trixie
Typedeb
Namespacedebian
Namelibreoffice
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1:3.3.3-1
Latest_non_vulnerable_version4:26.2.2.2-3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2hqv-dn95-vqd5
vulnerability_id VCID-2hqv-dn95-vqd5
summary libreoffice: heap-based buffer overflow related to the ReadJPEG function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8358.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8358.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8358
reference_id
reference_type
scores
0
value 0.00508
scoring_system epss
scoring_elements 0.66208
published_at 2026-04-01T12:55:00Z
1
value 0.00508
scoring_system epss
scoring_elements 0.66318
published_at 2026-04-21T12:55:00Z
2
value 0.00508
scoring_system epss
scoring_elements 0.66282
published_at 2026-04-13T12:55:00Z
3
value 0.00508
scoring_system epss
scoring_elements 0.66316
published_at 2026-04-16T12:55:00Z
4
value 0.00508
scoring_system epss
scoring_elements 0.66332
published_at 2026-04-18T12:55:00Z
5
value 0.00508
scoring_system epss
scoring_elements 0.66249
published_at 2026-04-02T12:55:00Z
6
value 0.00508
scoring_system epss
scoring_elements 0.66275
published_at 2026-04-04T12:55:00Z
7
value 0.00508
scoring_system epss
scoring_elements 0.66245
published_at 2026-04-07T12:55:00Z
8
value 0.00508
scoring_system epss
scoring_elements 0.66293
published_at 2026-04-08T12:55:00Z
9
value 0.00508
scoring_system epss
scoring_elements 0.66306
published_at 2026-04-09T12:55:00Z
10
value 0.00508
scoring_system epss
scoring_elements 0.66326
published_at 2026-04-11T12:55:00Z
11
value 0.00508
scoring_system epss
scoring_elements 0.66313
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8358
2
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=889
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=889
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/LibreOffice/core/commit/6e6e54f944a5ebb49e9110bdeff844d00a96c56c
reference_id
reference_type
scores
url https://github.com/LibreOffice/core/commit/6e6e54f944a5ebb49e9110bdeff844d00a96c56c
5
reference_url http://www.securityfocus.com/bid/98395
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/98395
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1447279
reference_id 1447279
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1447279
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8358
reference_id CVE-2017-8358
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8358
fixed_packages
0
url pkg:deb/debian/libreoffice@0?distro=trixie
purl pkg:deb/debian/libreoffice@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@0%3Fdistro=trixie
1
url pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
purl pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10%3Fdistro=trixie
2
url pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
purl pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:7.4.7-1%252Bdeb12u10%3Fdistro=trixie
3
url pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
purl pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:25.2.3-2%252Bdeb13u3%3Fdistro=trixie
4
url pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
purl pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:26.2.2.2-3%3Fdistro=trixie
aliases CVE-2017-8358
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2hqv-dn95-vqd5
1
url VCID-4kzn-nb3d-e3c8
vulnerability_id VCID-4kzn-nb3d-e3c8
summary
Improper Certificate Validation vulnerability in LibreOffice "LibreOfficeKit" mode disables TLS certification verification

LibreOfficeKit can be used for accessing LibreOffice functionality 
through C/C++. Typically this is used by third party components to reuse
 LibreOffice as a library to convert, view or otherwise interact with 
documents.

LibreOffice internally makes use of "curl" to fetch remote resources such as images hosted on webservers.

In
 affected versions of LibreOffice, when used in LibreOfficeKit mode 
only, then curl's TLS certification verification was disabled 
(CURLOPT_SSL_VERIFYPEER of false)

In the fixed versions curl operates in LibreOfficeKit mode the same as in standard mode with CURLOPT_SSL_VERIFYPEER of true.

This issue affects LibreOffice before version 24.2.4.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-5261
reference_id
reference_type
scores
0
value 0.00532
scoring_system epss
scoring_elements 0.67335
published_at 2026-04-21T12:55:00Z
1
value 0.00532
scoring_system epss
scoring_elements 0.67345
published_at 2026-04-16T12:55:00Z
2
value 0.00532
scoring_system epss
scoring_elements 0.6731
published_at 2026-04-13T12:55:00Z
3
value 0.00532
scoring_system epss
scoring_elements 0.67357
published_at 2026-04-18T12:55:00Z
4
value 0.00532
scoring_system epss
scoring_elements 0.67272
published_at 2026-04-02T12:55:00Z
5
value 0.00532
scoring_system epss
scoring_elements 0.67295
published_at 2026-04-04T12:55:00Z
6
value 0.00532
scoring_system epss
scoring_elements 0.67273
published_at 2026-04-07T12:55:00Z
7
value 0.00532
scoring_system epss
scoring_elements 0.67324
published_at 2026-04-08T12:55:00Z
8
value 0.00532
scoring_system epss
scoring_elements 0.67337
published_at 2026-04-09T12:55:00Z
9
value 0.00532
scoring_system epss
scoring_elements 0.67358
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-5261
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://www.libreoffice.org/about-us/security/advisories/cve-2024-5261
reference_id cve-2024-5261
reference_type
scores
0
value 10
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-06-25T13:27:12Z/
url https://www.libreoffice.org/about-us/security/advisories/cve-2024-5261
3
reference_url https://usn.ubuntu.com/6877-1/
reference_id USN-6877-1
reference_type
scores
url https://usn.ubuntu.com/6877-1/
fixed_packages
0
url pkg:deb/debian/libreoffice@0?distro=trixie
purl pkg:deb/debian/libreoffice@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@0%3Fdistro=trixie
1
url pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
purl pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10%3Fdistro=trixie
2
url pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
purl pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:7.4.7-1%252Bdeb12u10%3Fdistro=trixie
3
url pkg:deb/debian/libreoffice@4:24.2.4-1?distro=trixie
purl pkg:deb/debian/libreoffice@4:24.2.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:24.2.4-1%3Fdistro=trixie
4
url pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
purl pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:25.2.3-2%252Bdeb13u3%3Fdistro=trixie
5
url pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
purl pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:26.2.2.2-3%3Fdistro=trixie
aliases CVE-2024-5261
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4kzn-nb3d-e3c8
2
url VCID-6zer-5gyz-d7aa
vulnerability_id VCID-6zer-5gyz-d7aa
summary libreoffice: Heap-buffer-overflow in HWPFile::TagsRead
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7882.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7882.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7882
reference_id
reference_type
scores
0
value 0.01219
scoring_system epss
scoring_elements 0.79011
published_at 2026-04-01T12:55:00Z
1
value 0.01219
scoring_system epss
scoring_elements 0.79082
published_at 2026-04-21T12:55:00Z
2
value 0.01219
scoring_system epss
scoring_elements 0.79059
published_at 2026-04-13T12:55:00Z
3
value 0.01219
scoring_system epss
scoring_elements 0.79084
published_at 2026-04-18T12:55:00Z
4
value 0.01219
scoring_system epss
scoring_elements 0.79069
published_at 2026-04-12T12:55:00Z
5
value 0.01219
scoring_system epss
scoring_elements 0.79087
published_at 2026-04-16T12:55:00Z
6
value 0.01219
scoring_system epss
scoring_elements 0.79017
published_at 2026-04-02T12:55:00Z
7
value 0.01219
scoring_system epss
scoring_elements 0.79044
published_at 2026-04-04T12:55:00Z
8
value 0.01219
scoring_system epss
scoring_elements 0.79028
published_at 2026-04-07T12:55:00Z
9
value 0.01219
scoring_system epss
scoring_elements 0.79053
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7882
2
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=860
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=860
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/LibreOffice/core/commit/65dcd1d8195069c8c8acb3a188b8e5616c51029c
reference_id
reference_type
scores
url https://github.com/LibreOffice/core/commit/65dcd1d8195069c8c8acb3a188b8e5616c51029c
5
reference_url http://www.libreoffice.org/about-us/security/advisories/cve-2017-7882/
reference_id
reference_type
scores
url http://www.libreoffice.org/about-us/security/advisories/cve-2017-7882/
6
reference_url http://www.securityfocus.com/bid/97684
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97684
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1444056
reference_id 1444056
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1444056
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7882
reference_id CVE-2017-7882
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7882
fixed_packages
0
url pkg:deb/debian/libreoffice@0?distro=trixie
purl pkg:deb/debian/libreoffice@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@0%3Fdistro=trixie
1
url pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
purl pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10%3Fdistro=trixie
2
url pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
purl pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:7.4.7-1%252Bdeb12u10%3Fdistro=trixie
3
url pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
purl pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:25.2.3-2%252Bdeb13u3%3Fdistro=trixie
4
url pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
purl pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:26.2.2.2-3%3Fdistro=trixie
aliases CVE-2017-7882
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6zer-5gyz-d7aa
3
url VCID-8yqv-n1gc-tqaz
vulnerability_id VCID-8yqv-n1gc-tqaz
summary LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added to block calling LibreLogo from script event handers. However a Windows 8.3 path equivalence handling flaw left LibreOffice vulnerable under Windows that a document could trigger executing LibreLogo via a Windows filename pseudonym. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9855
reference_id
reference_type
scores
0
value 0.00437
scoring_system epss
scoring_elements 0.63087
published_at 2026-04-18T12:55:00Z
1
value 0.00437
scoring_system epss
scoring_elements 0.63044
published_at 2026-04-13T12:55:00Z
2
value 0.00437
scoring_system epss
scoring_elements 0.62944
published_at 2026-04-01T12:55:00Z
3
value 0.00437
scoring_system epss
scoring_elements 0.63003
published_at 2026-04-02T12:55:00Z
4
value 0.00437
scoring_system epss
scoring_elements 0.63031
published_at 2026-04-04T12:55:00Z
5
value 0.00437
scoring_system epss
scoring_elements 0.62996
published_at 2026-04-07T12:55:00Z
6
value 0.00437
scoring_system epss
scoring_elements 0.63047
published_at 2026-04-08T12:55:00Z
7
value 0.00437
scoring_system epss
scoring_elements 0.63062
published_at 2026-04-09T12:55:00Z
8
value 0.00437
scoring_system epss
scoring_elements 0.6308
published_at 2026-04-16T12:55:00Z
9
value 0.00437
scoring_system epss
scoring_elements 0.63066
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9855
3
reference_url https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9855/
reference_id
reference_type
scores
url https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9855/
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9855
reference_id CVE-2019-9855
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9855
fixed_packages
0
url pkg:deb/debian/libreoffice@0?distro=trixie
purl pkg:deb/debian/libreoffice@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@0%3Fdistro=trixie
1
url pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
purl pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10%3Fdistro=trixie
2
url pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
purl pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:7.4.7-1%252Bdeb12u10%3Fdistro=trixie
3
url pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
purl pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:25.2.3-2%252Bdeb13u3%3Fdistro=trixie
4
url pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
purl pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:26.2.2.2-3%3Fdistro=trixie
aliases CVE-2019-9855
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8yqv-n1gc-tqaz
4
url VCID-c44v-29b9-tyd8
vulnerability_id VCID-c44v-29b9-tyd8
summary LibreOffice: LibreOffice: Authentication Bypass leading to privilege escalation via bundled interpreter execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14714.json
reference_id
reference_type
scores
0
value 3.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14714.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14714
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08421
published_at 2026-04-02T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08484
published_at 2026-04-09T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08394
published_at 2026-04-07T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08465
published_at 2026-04-08T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08478
published_at 2026-04-11T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08458
published_at 2026-04-12T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08443
published_at 2026-04-13T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08474
published_at 2026-04-04T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.10027
published_at 2026-04-16T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.10004
published_at 2026-04-18T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.10133
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14714
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2422247
reference_id 2422247
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2422247
3
reference_url https://www.libreoffice.org/about-us/security/advisories/cve-2025-14714
reference_id cve-2025-14714
reference_type
scores
0
value 0.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:U
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-15T13:13:04Z/
url https://www.libreoffice.org/about-us/security/advisories/cve-2025-14714
fixed_packages
0
url pkg:deb/debian/libreoffice@0?distro=trixie
purl pkg:deb/debian/libreoffice@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@0%3Fdistro=trixie
1
url pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
purl pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10%3Fdistro=trixie
2
url pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
purl pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:7.4.7-1%252Bdeb12u10%3Fdistro=trixie
3
url pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
purl pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:25.2.3-2%252Bdeb13u3%3Fdistro=trixie
4
url pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
purl pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:26.2.2.2-3%3Fdistro=trixie
aliases CVE-2025-14714
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c44v-29b9-tyd8
5
url VCID-ghfh-sgdt-yybw
vulnerability_id VCID-ghfh-sgdt-yybw
summary libreoffice: Content Manipulation with Certificate Validation Attack
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25635.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25635.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-25635
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15678
published_at 2026-04-01T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15716
published_at 2026-04-02T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15533
published_at 2026-04-18T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15596
published_at 2026-04-13T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15524
published_at 2026-04-16T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.1578
published_at 2026-04-04T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15584
published_at 2026-04-21T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.1567
published_at 2026-04-08T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15729
published_at 2026-04-09T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15696
published_at 2026-04-11T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15661
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-25635
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2013152
reference_id 2013152
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2013152
3
reference_url https://www.libreoffice.org/about-us/security/advisories/cve-2021-25635/
reference_id cve-2021-25635
reference_type
scores
0
value 5.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:H/SI:H/SA:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-21T15:13:07Z/
url https://www.libreoffice.org/about-us/security/advisories/cve-2021-25635/
4
reference_url https://access.redhat.com/errata/RHSA-2022:1766
reference_id RHSA-2022:1766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1766
fixed_packages
0
url pkg:deb/debian/libreoffice@0?distro=trixie
purl pkg:deb/debian/libreoffice@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@0%3Fdistro=trixie
1
url pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
purl pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10%3Fdistro=trixie
2
url pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
purl pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:7.4.7-1%252Bdeb12u10%3Fdistro=trixie
3
url pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
purl pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:25.2.3-2%252Bdeb13u3%3Fdistro=trixie
4
url pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
purl pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:26.2.2.2-3%3Fdistro=trixie
aliases CVE-2021-25635
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ghfh-sgdt-yybw
6
url VCID-jst3-88yh-mbh7
vulnerability_id VCID-jst3-88yh-mbh7
summary libreoffice: Heap-buffer-overflow in SVMConverter::ImplConvertFromSVM1
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7856.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7856.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7856
reference_id
reference_type
scores
0
value 0.01783
scoring_system epss
scoring_elements 0.82656
published_at 2026-04-01T12:55:00Z
1
value 0.01783
scoring_system epss
scoring_elements 0.82766
published_at 2026-04-21T12:55:00Z
2
value 0.01783
scoring_system epss
scoring_elements 0.82723
published_at 2026-04-13T12:55:00Z
3
value 0.01783
scoring_system epss
scoring_elements 0.82761
published_at 2026-04-16T12:55:00Z
4
value 0.01783
scoring_system epss
scoring_elements 0.82762
published_at 2026-04-18T12:55:00Z
5
value 0.01783
scoring_system epss
scoring_elements 0.82672
published_at 2026-04-02T12:55:00Z
6
value 0.01783
scoring_system epss
scoring_elements 0.82687
published_at 2026-04-04T12:55:00Z
7
value 0.01783
scoring_system epss
scoring_elements 0.82683
published_at 2026-04-07T12:55:00Z
8
value 0.01783
scoring_system epss
scoring_elements 0.82709
published_at 2026-04-08T12:55:00Z
9
value 0.01783
scoring_system epss
scoring_elements 0.82715
published_at 2026-04-09T12:55:00Z
10
value 0.01783
scoring_system epss
scoring_elements 0.82733
published_at 2026-04-11T12:55:00Z
11
value 0.01783
scoring_system epss
scoring_elements 0.82727
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7856
2
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=817
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=817
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/LibreOffice/core/commit/28e61b634353110445e334ccaa415d7fb6629d62
reference_id
reference_type
scores
url https://github.com/LibreOffice/core/commit/28e61b634353110445e334ccaa415d7fb6629d62
5
reference_url http://www.libreoffice.org/about-us/security/advisories/cve-2017-7856/
reference_id
reference_type
scores
url http://www.libreoffice.org/about-us/security/advisories/cve-2017-7856/
6
reference_url http://www.securityfocus.com/bid/97667
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97667
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1444054
reference_id 1444054
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1444054
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7856
reference_id CVE-2017-7856
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7856
fixed_packages
0
url pkg:deb/debian/libreoffice@0?distro=trixie
purl pkg:deb/debian/libreoffice@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@0%3Fdistro=trixie
1
url pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
purl pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10%3Fdistro=trixie
2
url pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
purl pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:7.4.7-1%252Bdeb12u10%3Fdistro=trixie
3
url pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
purl pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:25.2.3-2%252Bdeb13u3%3Fdistro=trixie
4
url pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
purl pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:26.2.2.2-3%3Fdistro=trixie
aliases CVE-2017-7856
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jst3-88yh-mbh7
7
url VCID-nffq-52a8-3yg9
vulnerability_id VCID-nffq-52a8-3yg9
summary In the LibreOffice 7-1 series in versions prior to 7.1.2, and in the 7-0 series in versions prior to 7.0.5, the denylist can be circumvented by manipulating the link so it doesn't match the denylist but results in ShellExecute attempting to launch an executable type.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-25631
reference_id
reference_type
scores
0
value 0.01704
scoring_system epss
scoring_elements 0.82342
published_at 2026-04-21T12:55:00Z
1
value 0.01704
scoring_system epss
scoring_elements 0.82238
published_at 2026-04-01T12:55:00Z
2
value 0.01704
scoring_system epss
scoring_elements 0.82251
published_at 2026-04-02T12:55:00Z
3
value 0.01704
scoring_system epss
scoring_elements 0.8227
published_at 2026-04-04T12:55:00Z
4
value 0.01704
scoring_system epss
scoring_elements 0.82265
published_at 2026-04-07T12:55:00Z
5
value 0.01704
scoring_system epss
scoring_elements 0.82291
published_at 2026-04-08T12:55:00Z
6
value 0.01704
scoring_system epss
scoring_elements 0.82298
published_at 2026-04-09T12:55:00Z
7
value 0.01704
scoring_system epss
scoring_elements 0.82318
published_at 2026-04-11T12:55:00Z
8
value 0.01704
scoring_system epss
scoring_elements 0.82312
published_at 2026-04-12T12:55:00Z
9
value 0.01704
scoring_system epss
scoring_elements 0.82306
published_at 2026-04-13T12:55:00Z
10
value 0.01704
scoring_system epss
scoring_elements 0.8234
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-25631
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/libreoffice@0?distro=trixie
purl pkg:deb/debian/libreoffice@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@0%3Fdistro=trixie
1
url pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
purl pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10%3Fdistro=trixie
2
url pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
purl pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:7.4.7-1%252Bdeb12u10%3Fdistro=trixie
3
url pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
purl pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:25.2.3-2%252Bdeb13u3%3Fdistro=trixie
4
url pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
purl pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:26.2.2.2-3%3Fdistro=trixie
aliases CVE-2021-25631
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nffq-52a8-3yg9
8
url VCID-r9rr-pmtt-5ycm
vulnerability_id VCID-r9rr-pmtt-5ycm
summary libreoffice: Executable hyperlink Windows path targets executed unconditionally on activation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0514.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0514.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0514
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.14294
published_at 2026-04-04T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.14235
published_at 2026-04-02T12:55:00Z
2
value 0.00198
scoring_system epss
scoring_elements 0.41854
published_at 2026-04-21T12:55:00Z
3
value 0.00198
scoring_system epss
scoring_elements 0.41902
published_at 2026-04-13T12:55:00Z
4
value 0.00198
scoring_system epss
scoring_elements 0.41952
published_at 2026-04-16T12:55:00Z
5
value 0.00198
scoring_system epss
scoring_elements 0.41925
published_at 2026-04-18T12:55:00Z
6
value 0.00241
scoring_system epss
scoring_elements 0.4732
published_at 2026-04-07T12:55:00Z
7
value 0.00241
scoring_system epss
scoring_elements 0.47396
published_at 2026-04-11T12:55:00Z
8
value 0.00241
scoring_system epss
scoring_elements 0.47371
published_at 2026-04-12T12:55:00Z
9
value 0.00241
scoring_system epss
scoring_elements 0.47372
published_at 2026-04-09T12:55:00Z
10
value 0.00241
scoring_system epss
scoring_elements 0.47375
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0514
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2347608
reference_id 2347608
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2347608
3
reference_url https://www.libreoffice.org/about-us/security/advisories/cve-2025-0514
reference_id cve-2025-0514
reference_type
scores
0
value 7.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:L/VA:H/SC:H/SI:H/SA:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-25T21:28:20Z/
url https://www.libreoffice.org/about-us/security/advisories/cve-2025-0514
fixed_packages
0
url pkg:deb/debian/libreoffice@0?distro=trixie
purl pkg:deb/debian/libreoffice@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@0%3Fdistro=trixie
1
url pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
purl pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10%3Fdistro=trixie
2
url pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
purl pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:7.4.7-1%252Bdeb12u10%3Fdistro=trixie
3
url pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
purl pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:25.2.3-2%252Bdeb13u3%3Fdistro=trixie
4
url pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
purl pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:26.2.2.2-3%3Fdistro=trixie
aliases CVE-2025-0514
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r9rr-pmtt-5ycm
9
url VCID-rg7y-m6nm-m7df
vulnerability_id VCID-rg7y-m6nm-m7df
summary libreoffice: Use of realpath() in desktop/unx/source/start.c:get_app_path() allows for potential buffer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14939.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14939.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14939
reference_id
reference_type
scores
0
value 0.00506
scoring_system epss
scoring_elements 0.66145
published_at 2026-04-01T12:55:00Z
1
value 0.00506
scoring_system epss
scoring_elements 0.66187
published_at 2026-04-02T12:55:00Z
2
value 0.00506
scoring_system epss
scoring_elements 0.66214
published_at 2026-04-04T12:55:00Z
3
value 0.00506
scoring_system epss
scoring_elements 0.66183
published_at 2026-04-07T12:55:00Z
4
value 0.00506
scoring_system epss
scoring_elements 0.66231
published_at 2026-04-08T12:55:00Z
5
value 0.00506
scoring_system epss
scoring_elements 0.66244
published_at 2026-04-09T12:55:00Z
6
value 0.00506
scoring_system epss
scoring_elements 0.66264
published_at 2026-04-11T12:55:00Z
7
value 0.00506
scoring_system epss
scoring_elements 0.66251
published_at 2026-04-12T12:55:00Z
8
value 0.00506
scoring_system epss
scoring_elements 0.6622
published_at 2026-04-13T12:55:00Z
9
value 0.00506
scoring_system epss
scoring_elements 0.66255
published_at 2026-04-21T12:55:00Z
10
value 0.00506
scoring_system epss
scoring_elements 0.6627
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14939
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1614165
reference_id 1614165
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1614165
fixed_packages
0
url pkg:deb/debian/libreoffice@0?distro=trixie
purl pkg:deb/debian/libreoffice@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@0%3Fdistro=trixie
1
url pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
purl pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10%3Fdistro=trixie
2
url pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
purl pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:7.4.7-1%252Bdeb12u10%3Fdistro=trixie
3
url pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
purl pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:25.2.3-2%252Bdeb13u3%3Fdistro=trixie
4
url pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
purl pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:26.2.2.2-3%3Fdistro=trixie
aliases CVE-2018-14939
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rg7y-m6nm-m7df
10
url VCID-z8wr-nnv1-euhx
vulnerability_id VCID-z8wr-nnv1-euhx
summary A vulnerability in LibreOffice hyperlink processing allows an attacker to construct documents containing hyperlinks pointing to the location of an executable on the target users file system. If the hyperlink is activated by the victim the executable target is unconditionally launched. Under Windows and macOS when processing a hyperlink target explicitly activated by the user there was no judgment made on whether the target was an executable file, so such executable targets were launched unconditionally. This issue affects: All LibreOffice Windows and macOS versions prior to 6.1.6; LibreOffice Windows and macOS versions in the 6.2 series prior to 6.2.3.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9847
reference_id
reference_type
scores
0
value 0.00237
scoring_system epss
scoring_elements 0.46753
published_at 2026-04-01T12:55:00Z
1
value 0.00237
scoring_system epss
scoring_elements 0.46793
published_at 2026-04-02T12:55:00Z
2
value 0.00237
scoring_system epss
scoring_elements 0.46812
published_at 2026-04-04T12:55:00Z
3
value 0.00237
scoring_system epss
scoring_elements 0.46761
published_at 2026-04-07T12:55:00Z
4
value 0.00237
scoring_system epss
scoring_elements 0.46816
published_at 2026-04-09T12:55:00Z
5
value 0.00237
scoring_system epss
scoring_elements 0.46839
published_at 2026-04-11T12:55:00Z
6
value 0.00237
scoring_system epss
scoring_elements 0.4681
published_at 2026-04-12T12:55:00Z
7
value 0.00237
scoring_system epss
scoring_elements 0.46818
published_at 2026-04-21T12:55:00Z
8
value 0.00237
scoring_system epss
scoring_elements 0.46873
published_at 2026-04-16T12:55:00Z
9
value 0.00237
scoring_system epss
scoring_elements 0.4687
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9847
fixed_packages
0
url pkg:deb/debian/libreoffice@0?distro=trixie
purl pkg:deb/debian/libreoffice@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@0%3Fdistro=trixie
1
url pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
purl pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10%3Fdistro=trixie
2
url pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
purl pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:7.4.7-1%252Bdeb12u10%3Fdistro=trixie
3
url pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
purl pkg:deb/debian/libreoffice@4:25.2.3-2%2Bdeb13u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:25.2.3-2%252Bdeb13u3%3Fdistro=trixie
4
url pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
purl pkg:deb/debian/libreoffice@4:26.2.2.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:26.2.2.2-3%3Fdistro=trixie
aliases CVE-2019-9847
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z8wr-nnv1-euhx
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@0%3Fdistro=trixie