cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-47804,https://securityvulnerability.io/vulnerability/CVE-2023-47804,Apache OpenOffice: Macro URL arbitrary script execution,"A security issue in Apache OpenOffice allows documents to contain links that execute internal macros with arbitrary parameters, bypassing user approval for specific URI schemes. When activated, these links can lead to unintended script execution, raising significant security concerns for users. This issue arises from the inadequate handling of user consent during document interactions, particularly affecting specific versions of OpenOffice, as cited in related security discussions and advisories.",Apache,Apache OpenOffice,8.8,HIGH,0.004459999967366457,false,,false,false,false,,,false,false,,2023-12-29T15:15:00.000Z,0 CVE-2022-47502,https://securityvulnerability.io/vulnerability/CVE-2022-47502,Apache OpenOffice: Macro URL arbitrary script execution,"In Apache OpenOffice, documents can include links designed to invoke internal macros with arbitrary parameters. These links can be triggered either through user clicks or automatically by document events. For specific link activations in impacted versions, user confirmation is bypassed, creating a risk for unauthorized script execution without the user's consent.",Apache,Apache Openoffice,7.8,HIGH,0.00279000005684793,false,,false,false,false,,,false,false,,2023-03-24T16:15:00.000Z,0 CVE-2022-38745,https://securityvulnerability.io/vulnerability/CVE-2022-38745,Apache OpenOffice: Empty entry in Java class path,A security configuration issue in Apache OpenOffice allows for the potential execution of arbitrary Java code from the current directory due to an empty entry being added to the Java class path. This could lead to security risks as malicious actors might exploit this vulnerability to run untrusted code in the context of the application. Users running versions before 4.1.14 are advised to upgrade to mitigate these risks.,Apache,Apache Openoffice,7.8,HIGH,0.001180000021122396,false,,false,false,false,,,false,false,,2023-03-24T15:56:48.549Z,0 CVE-2022-37401,https://securityvulnerability.io/vulnerability/CVE-2022-37401,Apache OpenOffice Weak Master Keys,Apache OpenOffice supports the storage of passwords for web connections in the user's configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in OpenOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulnerable to a brute force attack if an attacker has access to the users stored config. This issue affects: Apache OpenOffice versions prior to 4.1.13. Reference: CVE-2022-26307 - LibreOffice,Apache,Apache Openoffice,8.8,HIGH,0.001879999996162951,false,,false,false,false,,,false,false,,2022-08-15T11:21:00.000Z,0 CVE-2022-37400,https://securityvulnerability.io/vulnerability/CVE-2022-37400,Apache OpenOffice Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password,Apache OpenOffice supports the storage of passwords for web connections in the user's configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in OpenOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user's configuration data. This issue affects: Apache OpenOffice versions prior to 4.1.13. Reference: CVE-2022-26306 - LibreOffice,Apache,Apache Openoffice,8.8,HIGH,0.0019099999917671084,false,,false,false,false,,,false,false,,2022-08-15T11:21:00.000Z,0 CVE-2021-41832,https://securityvulnerability.io/vulnerability/CVE-2021-41832,Content Manipulation with Certificate Validation Attack,It is possible for an attacker to manipulate documents to appear to be signed by a trusted source. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25635 for the LibreOffice advisory.,Apache,Apache Openoffice,7.5,HIGH,0.0027799999807029963,false,,false,false,false,,,false,false,,2021-10-11T08:10:15.000Z,0 CVE-2021-41831,https://securityvulnerability.io/vulnerability/CVE-2021-41831,Timestamp Manipulation with Signature Wrapping,It is possible for an attacker to manipulate the timestamp of signed documents. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25634 for the LibreOffice advisory.,Apache,Apache Openoffice,5.3,MEDIUM,0.0027799999807029963,false,,false,false,false,,,false,false,,2021-10-11T08:10:14.000Z,0 CVE-2021-41830,https://securityvulnerability.io/vulnerability/CVE-2021-41830,Double Certificate Attack,It is possible for an attacker to manipulate signed documents and macros to appear to come from a trusted source. All versions of Apache OpenOffice up to 4.1.10 are affected. Users are advised to update to version 4.1.11. See CVE-2021-25633 for the LibreOffice advisory.,Apache,Apache Openoffice,7.5,HIGH,0.0027799999807029963,false,,false,false,false,,,false,false,,2021-10-11T08:10:12.000Z,0 CVE-2021-40439,https://securityvulnerability.io/vulnerability/CVE-2021-40439,Billion Laughs,"Apache OpenOffice has a dependency on expat software. Versions prior to 2.1.0 were subject to CVE-2013-0340 a ""Billion Laughs"" entity expansion denial of service attack and exploit via crafted XML files. ODF files consist of a set of XML files. All versions of Apache OpenOffice up to 4.1.10 are subject to this issue. expat in version 4.1.11 is patched.",Apache,Apache Openoffice,6.5,MEDIUM,0.006169999949634075,false,,false,false,false,,,false,false,,2021-10-07T15:50:12.000Z,0 CVE-2021-28129,https://securityvulnerability.io/vulnerability/CVE-2021-28129,DEB packaging for Apache OpenOffice 4.1.8 installed with a non-root userid and groupid,"While working on Apache OpenOffice 4.1.8 a developer discovered that the DEB package did not install using root, but instead used a userid and groupid of 500. This both caused issues with desktop integration and could allow a crafted attack on files owned by that user or group if they exist. Users who installed the Apache OpenOffice 4.1.8 DEB packaging should upgrade to the latest version of Apache OpenOffice.",Apache,Apache Openoffice,7.8,HIGH,0.0004799999878741801,false,,false,false,false,,,false,false,,2021-10-07T15:50:11.000Z,0 CVE-2021-33035,https://securityvulnerability.io/vulnerability/CVE-2021-33035,Buffer overflow from a crafted DBF file,"Apache OpenOffice opens dBase/DBF documents and shows the contents as spreadsheets. DBF are database files with data organized in fields. When reading DBF data the size of certain fields is not checked: the data is just copied into local variables. A carefully crafted document could overflow the allocated space, leading to the execution of arbitrary code by altering the contents of the program stack. This issue affects Apache OpenOffice up to and including version 4.1.10",Apache,Apache Openoffice,7.8,HIGH,0.003719999920576811,false,,false,false,false,,,false,false,,2021-09-23T08:10:10.000Z,0 CVE-2021-30245,https://securityvulnerability.io/vulnerability/CVE-2021-30245,Code execution in Apache OpenOffice via non-http(s) schemes in Hyperlinks,The project received a report that all versions of Apache OpenOffice through 4.1.8 can open non-http(s) hyperlinks. The problem has existed since about 2006 and the issue is also in 4.1.9. If the link is specifically crafted this could lead to untrusted code execution. It is always best practice to be careful opening documents from unknown and unverified sources. The mitigation in Apache OpenOffice 4.1.10 (unreleased) assures that a security warning is displayed giving the user the option of continuing to open the hyperlink.,Apache,Apache Openoffice,8.8,HIGH,0.014670000411570072,false,,false,false,false,,,false,false,,2021-04-15T19:30:14.000Z,0 CVE-2020-13958,https://securityvulnerability.io/vulnerability/CVE-2020-13958,,A vulnerability in Apache OpenOffice scripting events allows an attacker to construct documents containing hyperlinks pointing to an executable on the target users file system. These hyperlinks can be triggered unconditionally. In fixed versions no internal protocol may be called from the document event handler and other hyperlinks require a control-click.,Apache,Apache Openoffice,7.8,HIGH,0.000910000002477318,false,,false,false,false,,,false,false,,2020-11-17T15:17:57.000Z,0 CVE-2018-11790,https://securityvulnerability.io/vulnerability/CVE-2018-11790,,"When loading a document with Apache Open Office 4.1.5 and earlier with smaller end line termination than the operating system uses, the defect occurs. In this case OpenOffice runs into an Arithmetic Overflow at a string length calculation.",Apache,Apache Openoffice,7.8,HIGH,0.0005699999746866524,false,,false,false,true,2021-07-28T06:18:30.000Z,true,false,false,,2019-01-31T16:29:00.000Z,0 CVE-2017-12608,https://securityvulnerability.io/vulnerability/CVE-2017-12608,,"A vulnerability in Apache OpenOffice Writer DOC file parser before 4.1.4, and specifically in ImportOldFormatStyles, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.",Apache,Apache Openoffice,7.8,HIGH,0.00610999995842576,false,,false,false,false,,,false,false,,2017-11-20T20:29:00.000Z,0 CVE-2017-3157,https://securityvulnerability.io/vulnerability/CVE-2017-3157,,"By exploiting the way Apache OpenOffice before 4.1.4 renders embedded objects, an attacker could craft a document that allows reading in a file from the user's filesystem. Information could be retrieved by the attacker by, e.g., using hidden sections to store the information, tricking the user into saving the document and convincing the user to send the document back to the attacker. The vulnerability is mitigated by the need for the attacker to know the precise file path in the target system, and the need to trick the user into saving the document and sending it back.",Apache,Apache Openoffice,5.5,MEDIUM,0.0006500000017695129,false,,false,false,false,,,false,false,,2017-11-20T20:29:00.000Z,0 CVE-2017-12607,https://securityvulnerability.io/vulnerability/CVE-2017-12607,,"A vulnerability in OpenOffice's PPT file parser before 4.1.4, and specifically in PPTStyleSheet, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.",Apache,Apache Openoffice,7.8,HIGH,0.00610999995842576,false,,false,false,false,,,false,false,,2017-11-20T19:29:00.000Z,0 CVE-2016-6804,https://securityvulnerability.io/vulnerability/CVE-2016-6804,,"The Apache OpenOffice installer (versions prior to 4.1.3, including some branded as OpenOffice.org) for Windows contains a defective operation that allows execution of arbitrary code with elevated privileges. This requires that the location in which the installer is run has been previously poisoned by a file that impersonates a dynamic-link library that the installer depends upon.",Apache,Apache Openoffice,7.8,HIGH,0.001979999942705035,false,,false,false,false,,,false,false,,2017-11-20T15:29:00.000Z,0 CVE-2017-9806,https://securityvulnerability.io/vulnerability/CVE-2017-9806,,"A vulnerability in the OpenOffice Writer DOC file parser before 4.1.4, and specifically in the WW8Fonts Constructor, allows attackers to craft malicious documents that cause denial of service (memory corruption and application crash) potentially resulting in arbitrary code execution.",Apache,Apache Openoffice,7.8,HIGH,0.0006099999882280827,false,,false,false,false,,,false,false,,2017-11-18T00:00:00.000Z,0 CVE-2016-6803,https://securityvulnerability.io/vulnerability/CVE-2016-6803,,"An installer defect known as an ""unquoted Windows search path vulnerability"" affected the Apache OpenOffice before 4.1.3 installers for Windows. The PC must have previously been infected by a Trojan Horse application (or user) running with administrative privilege. Any installer with the unquoted search path vulnerability becomes a delayed trigger for the exploit.",Apache,Apache Openoffice,7.8,HIGH,0.0009200000204145908,false,,false,false,false,,,false,false,,2017-11-13T14:29:00.000Z,0