libreoffice-sdk-doc vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libreoffice-sdk-doc package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Improper Verification of Cryptographic Signature

*
  • H
Improper Input Validation

<1:6.4.7.2-18.el8_8
  • H
Improper Input Validation

<1:6.4.7.2-18.el8_8
  • H
Improper Input Validation

<1:6.4.7.2-18.el8_8
  • H
Improper Input Validation

<1:6.4.7.2-18.el8_8
  • H
Improper Input Validation

<1:6.4.7.2-19.el8_10
  • M
Improper Verification of Cryptographic Signature

*
  • M
Improper Certificate Validation

<1:6.4.7.2-17.el8_8
  • M
Improper Certificate Validation

<1:6.4.7.2-17.el8_8
  • M
Improper Certificate Validation

<1:6.4.7.2-17.el8_8
  • M
Improper Certificate Validation

<1:6.4.7.2-17.el8_8
  • M
Improper Certificate Validation

<1:6.4.7.2-18.el8_10
  • M
Improper Input Validation

<1:6.4.7.2-17.el8_10
  • H
Execution with Unnecessary Privileges

<1:6.4.7.2-16.el8_8
  • H
Execution with Unnecessary Privileges

<1:6.4.7.2-16.el8_8
  • H
Execution with Unnecessary Privileges

<1:6.4.7.2-16.el8_8
  • H
Execution with Unnecessary Privileges

<1:6.4.7.2-16.el8_8
  • H
Execution with Unnecessary Privileges

<1:6.4.7.2-16.el8_8
  • H
Execution with Unnecessary Privileges

<1:6.4.7.2-16.el8_8
  • H
Execution with Unnecessary Privileges

<1:6.4.7.2-16.el8_8
  • H
Execution with Unnecessary Privileges

<1:6.4.7.2-16.el8_8
  • H
Execution with Unnecessary Privileges

<1:6.4.7.2-16.el8_6
  • H
Execution with Unnecessary Privileges

<1:6.4.7.2-16.el8_6
  • H
Execution with Unnecessary Privileges

<1:6.4.7.2-16.el8_6
  • H
Execution with Unnecessary Privileges

<1:6.4.7.2-16.el8_6
  • H
Execution with Unnecessary Privileges

<1:6.4.7.2-16.el8_6
  • H
Execution with Unnecessary Privileges

<1:6.4.7.2-16.el8_6
  • H
Execution with Unnecessary Privileges

<1:6.4.7.2-16.el8_6
  • H
Execution with Unnecessary Privileges

<1:6.4.7.2-16.el8_6
  • H
Execution with Unnecessary Privileges

<1:6.4.7.2-16.el8_9
  • H
Execution with Unnecessary Privileges

<1:6.4.7.2-16.el8_9
  • M
Improper Input Validation

<1:6.4.7.2-15.el8
  • M
CVE-2023-2255

<1:6.4.7.2-15.el8
  • M
Improper Validation of Array Index

<1:6.4.7.2-15.el8
  • M
Uncontrolled Search Path Element

<1:6.4.7.2-15.el8
  • M
Arbitrary Argument Injection

<1:6.4.7.2-12.el8_7
  • M
Arbitrary Argument Injection

<1:6.4.7.2-12.el8_7
  • M
Arbitrary Argument Injection

<1:6.4.7.2-12.el8_7
  • M
Arbitrary Argument Injection

<1:6.4.7.2-12.el8_7
  • M
Arbitrary Argument Injection

<1:6.4.7.2-12.el8_7
  • M
CVE-2022-26307

<1:6.4.7.2-12.el8_7
  • M
CVE-2022-26307

<1:6.4.7.2-12.el8_7
  • M
CVE-2022-26307

<1:6.4.7.2-12.el8_7
  • M
CVE-2022-26307

<1:6.4.7.2-12.el8_7
  • M
CVE-2022-26307

<1:6.4.7.2-12.el8_7
  • M
Use of Insufficiently Random Values

<1:6.4.7.2-12.el8_7
  • M
Use of Insufficiently Random Values

<1:6.4.7.2-12.el8_7
  • M
Use of Insufficiently Random Values

<1:6.4.7.2-12.el8_7
  • M
Use of Insufficiently Random Values

<1:6.4.7.2-12.el8_7
  • M
Use of Insufficiently Random Values

<1:6.4.7.2-12.el8_7
  • M
Improper Certificate Validation

<1:6.4.7.2-12.el8_7
  • M
Improper Certificate Validation

<1:6.4.7.2-12.el8_7
  • M
Improper Certificate Validation

<1:6.4.7.2-12.el8_7
  • M
Improper Certificate Validation

<1:6.4.7.2-12.el8_7
  • M
Improper Certificate Validation

<1:6.4.7.2-12.el8_7
  • M
Improper Certificate Validation

<1:6.4.7.2-11.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-11.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-11.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-11.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-11.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Certificate Validation

<1:6.4.7.2-10.el8
  • M
Improper Access Control

<1:6.0.6.1-20.el8
  • M
Improper Access Control

<1:6.0.6.1-20.el8
  • M
Improper Access Control

<1:6.0.6.1-20.el8
  • M
Improper Access Control

<1:6.0.6.1-20.el8
  • M
Improper Access Control

<1:6.0.6.1-20.el8
  • M
Improper Access Control

<1:6.0.6.1-20.el8
  • M
Improper Access Control

<1:6.0.6.1-20.el8
  • M
Improper Access Control

<1:6.0.6.1-20.el8
  • M
Improper Access Control

<1:6.0.6.1-20.el8
  • M
Improper Access Control

<1:6.0.6.1-20.el8
  • M
Improper Access Control

<1:6.0.6.1-20.el8
  • M
Improper Access Control

<1:6.0.6.1-20.el8
  • M
Improper Access Control

<1:6.0.6.1-20.el8
  • M
Improper Access Control

<1:6.0.6.1-20.el8
  • M
Improper Access Control

<1:6.0.6.1-20.el8
  • M
Improper Access Control

<1:6.0.6.1-20.el8
  • M
Improper Access Control

<1:6.0.6.1-20.el8
  • M
Inappropriate Encoding for Output Context

<1:6.0.6.1-20.el8
  • M
Inappropriate Encoding for Output Context

<1:6.0.6.1-20.el8
  • M
Inappropriate Encoding for Output Context

<1:6.0.6.1-20.el8
  • M
Inappropriate Encoding for Output Context

<1:6.0.6.1-20.el8
  • M
Inappropriate Encoding for Output Context

<1:6.0.6.1-20.el8
  • M
Inappropriate Encoding for Output Context

<1:6.0.6.1-20.el8
  • M
Inappropriate Encoding for Output Context

<1:6.0.6.1-20.el8
  • M
Inappropriate Encoding for Output Context

<1:6.0.6.1-20.el8
  • M
Inappropriate Encoding for Output Context

<1:6.0.6.1-20.el8
  • M
Inappropriate Encoding for Output Context

<1:6.0.6.1-20.el8
  • M
Inappropriate Encoding for Output Context

<1:6.0.6.1-20.el8
  • M
Inappropriate Encoding for Output Context

<1:6.0.6.1-20.el8
  • M
Inappropriate Encoding for Output Context

<1:6.0.6.1-20.el8
  • M
Inappropriate Encoding for Output Context

<1:6.0.6.1-20.el8
  • M
Inappropriate Encoding for Output Context

<1:6.0.6.1-20.el8
  • M
Inappropriate Encoding for Output Context

<1:6.0.6.1-20.el8
  • M
Inappropriate Encoding for Output Context

<1:6.0.6.1-20.el8
  • M
Directory Traversal

<1:6.0.6.1-20.el8
  • M
Directory Traversal

<1:6.0.6.1-20.el8
  • M
Directory Traversal

<1:6.0.6.1-20.el8
  • M
Directory Traversal

<1:6.0.6.1-20.el8
  • M
Directory Traversal

<1:6.0.6.1-20.el8
  • M
Directory Traversal

<1:6.0.6.1-20.el8
  • M
Directory Traversal

<1:6.0.6.1-20.el8
  • M
Directory Traversal

<1:6.0.6.1-20.el8
  • M
Directory Traversal

<1:6.0.6.1-20.el8
  • M
Directory Traversal

<1:6.0.6.1-20.el8
  • M
Directory Traversal

<1:6.0.6.1-20.el8
  • M
Directory Traversal

<1:6.0.6.1-20.el8
  • M
Directory Traversal

<1:6.0.6.1-20.el8
  • M
Directory Traversal

<1:6.0.6.1-20.el8
  • M
Directory Traversal

<1:6.0.6.1-20.el8
  • M
Directory Traversal

<1:6.0.6.1-20.el8
  • M
Directory Traversal

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Arbitrary Code Injection

<1:6.0.6.1-20.el8
  • M
Information Exposure

<1:6.0.6.1-20.el8
  • M
Information Exposure

<1:6.0.6.1-20.el8
  • M
Information Exposure

<1:6.0.6.1-20.el8
  • M
Information Exposure

<1:6.0.6.1-20.el8
  • M
Information Exposure

<1:6.0.6.1-20.el8
  • M
Information Exposure

<1:6.0.6.1-20.el8
  • M
Information Exposure

<1:6.0.6.1-20.el8
  • M
Information Exposure

<1:6.0.6.1-20.el8
  • M
Information Exposure

<1:6.0.6.1-20.el8
  • M
Information Exposure

<1:6.0.6.1-20.el8
  • M
Information Exposure

<1:6.0.6.1-20.el8
  • M
Information Exposure

<1:6.0.6.1-20.el8
  • M
Information Exposure

<1:6.0.6.1-20.el8
  • M
Information Exposure

<1:6.0.6.1-20.el8
  • M
Information Exposure

<1:6.0.6.1-20.el8
  • M
Information Exposure

<1:6.0.6.1-20.el8
  • M
Information Exposure

<1:6.0.6.1-20.el8
  • L
Improper Access Control

<1:6.3.6.2-3.el8
  • L
Improper Access Control

<1:6.3.6.2-3.el8
  • L
Improper Access Control

<1:6.3.6.2-3.el8
  • L
Improper Access Control

<1:6.3.6.2-3.el8
  • L
Improper Access Control

<1:6.3.6.2-3.el8
  • L
Improper Access Control

<1:6.3.6.2-3.el8
  • L
Improper Access Control

<1:6.3.6.2-3.el8
  • L
Improper Access Control

<1:6.3.6.2-3.el8
  • L
Improper Access Control

<1:6.3.6.2-3.el8
  • L
Improper Access Control

<1:6.3.6.2-3.el8
  • L
Improper Access Control

<1:6.3.6.2-3.el8
  • L
Improper Access Control

<1:6.3.6.2-3.el8
  • L
Improper Access Control

<1:6.3.6.2-3.el8
  • L
Information Exposure

<1:6.3.6.2-3.el8
  • L
Information Exposure

<1:6.3.6.2-3.el8
  • L
Information Exposure

<1:6.3.6.2-3.el8
  • L
Information Exposure

<1:6.3.6.2-3.el8
  • L
Information Exposure

<1:6.3.6.2-3.el8
  • L
Information Exposure

<1:6.3.6.2-3.el8
  • L
Information Exposure

<1:6.3.6.2-3.el8
  • L
Information Exposure

<1:6.3.6.2-3.el8
  • L
Information Exposure

<1:6.3.6.2-3.el8
  • L
Information Exposure

<1:6.3.6.2-3.el8
  • L
Information Exposure

<1:6.3.6.2-3.el8
  • L
Information Exposure

<1:6.3.6.2-3.el8
  • L
Information Exposure

<1:6.3.6.2-3.el8