Page 2 of 45 results (0.044 seconds)

CVSS: 8.8EPSS: 1%CPEs: 1EXPL: 0

15 Apr 2021 — The project received a report that all versions of Apache OpenOffice through 4.1.8 can open non-http(s) hyperlinks. The problem has existed since about 2006 and the issue is also in 4.1.9. If the link is specifically crafted this could lead to untrusted code execution. It is always best practice to be careful opening documents from unknown and unverified sources. The mitigation in Apache OpenOffice 4.1.10 (unreleased) assures that a security warning is displayed giving the user the option of continuing to o... • https://lists.apache.org/thread.html/r7c01173f763b0c4212ada0e6ab283984d6e058d72258efce85c006ab%40%3Cannounce.apache.org%3E • CWE-610: Externally Controlled Reference to a Resource in Another Sphere •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

31 Jan 2019 — When loading a document with Apache Open Office 4.1.5 and earlier with smaller end line termination than the operating system uses, the defect occurs. In this case OpenOffice runs into an Arithmetic Overflow at a string length calculation. Al cargar un documento con Apache Open Office, en versiones 4.1.5 y anteriores, con una terminación de final de línea más pequeña que las que emplea el sistema operativo, ocurre este defecto. En este caso, OpenOffice sufre un desbordamiento de aritmética en un cálculo de ... • http://www.securityfocus.com/bid/106803 • CWE-682: Incorrect Calculation •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

20 Nov 2017 — A vulnerability in the OpenOffice Writer DOC file parser before 4.1.4, and specifically in the WW8Fonts Constructor, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution. Una vulnerabilidad en el analizador sintáctico de archivos DOC de OpenOffice Writer en versiones anteriores a la 4.1.4, específicamente en WW8Fonts Constructor, permite que atacantes manipulen documentos maliciosos que provoque... • http://www.openoffice.org/security/cves/CVE-2017-9806.html • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

02 Nov 2017 — A vulnerability in OpenOffice's PPT file parser before 4.1.4, and specifically in PPTStyleSheet, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution. Una vulnerabilidad en el analizador sintáctico de archivos PPT de OpenOffice en versiones anteriores a la 4.1.4, específicamente en PPTStyleSheet, permite que atacantes manipulen documentos maliciosos que provoquen una denegación de servicio (corr... • http://www.securityfocus.com/bid/101585 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

02 Nov 2017 — A vulnerability in Apache OpenOffice Writer DOC file parser before 4.1.4, and specifically in ImportOldFormatStyles, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution. Una vulnerabilidad en el analizador sintáctico de archivos DOC de OpenOffice Writer en versiones anteriores a la 4.1.4, específicamente en ImportOldFormatStyles, permite que atacantes manipulen documentos maliciosos que provoqu... • http://www.securityfocus.com/bid/101585 • CWE-787: Out-of-bounds Write •

CVSS: 5.5EPSS: 0%CPEs: 18EXPL: 0

25 Feb 2017 — By exploiting the way Apache OpenOffice before 4.1.4 renders embedded objects, an attacker could craft a document that allows reading in a file from the user's filesystem. Information could be retrieved by the attacker by, e.g., using hidden sections to store the information, tricking the user into saving the document and convincing the user to send the document back to the attacker. The vulnerability is mitigated by the need for the attacker to know the precise file path in the target system, and the need ... • http://www.securityfocus.com/bid/96402 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 0

26 Nov 2016 — An installer defect known as an "unquoted Windows search path vulnerability" affected the Apache OpenOffice before 4.1.3 installers for Windows. The PC must have previously been infected by a Trojan Horse application (or user) running with administrative privilege. Any installer with the unquoted search path vulnerability becomes a delayed trigger for the exploit. Un defecto de instalador conocido como "unquoted Windows search path vulnerability" afectó a los instaladores de Apache OpenOffice en versiones a... • http://www.securityfocus.com/bid/94418 • CWE-426: Untrusted Search Path •

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 0

25 Oct 2016 — The Apache OpenOffice installer (versions prior to 4.1.3, including some branded as OpenOffice.org) for Windows contains a defective operation that allows execution of arbitrary code with elevated privileges. This requires that the location in which the installer is run has been previously poisoned by a file that impersonates a dynamic-link library that the installer depends upon. El instalador de Apache OpenOffice (versiones anteriores a la 4.13, incluyendo algunas denominadas OpenOffice.org) para Windows ... • http://www.securityfocus.com/bid/93774 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

05 Aug 2016 — The Impress tool in Apache OpenOffice 4.1.2 and earlier allows remote attackers to cause a denial of service (out-of-bounds read or write) or execute arbitrary code via crafted MetaActions in an (1) ODP or (2) OTP file. La herramienta Impress en Apache OpenOffice 4.1.2 y versiones anteriores permite a atacantes remotos provocar una denegación de servicio (lectura o escritura fuera de rango) o ejecutar código arbitrario a través de MetaActions manipuladas en un archivo (1) ODP o (2) OTP. Yves Younan and Rich... • http://www.openoffice.org/security/cves/CVE-2016-1513.html • CWE-125: Out-of-bounds Read CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 1%CPEs: 7EXPL: 0

06 Nov 2015 — LibreOffice before 4.4.5 and Apache OpenOffice before 4.1.2 uses the stored LinkUpdateMode configuration information in OpenDocument Format files and templates when handling links, which might allow remote attackers to obtain sensitive information via a crafted document, which embeds data from local files into (1) Calc or (2) Writer. LibreOffice en versiones anteriores a 4.4.5 y Apache OpenOffice en versiones anteriores a 4.1.2 usa la información de configuración LinkUpdateMode almacenada en archivos OpenDo... • http://rhn.redhat.com/errata/RHSA-2015-2619.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-787: Out-of-bounds Write •