cpe:2.3:a:openoffice:openoffice.org:2.0.2:*:*:*:*:*:*:*
Heap-based buffer overflow in OpenOffice.org (OOo) before 3.1.1 and StarOffice/StarSuite 7, 8, and 9 might allow remote attackers to execute arbitrary code via unspecified records in a crafted Word document, related to "table parsing."
Max CVSS
9.3
EPSS Score
33.45%
Published
2009-09-02
Updated
2018-10-11
Integer underflow in OpenOffice.org (OOo) before 3.1.1 and StarOffice/StarSuite 7, 8, and 9 might allow remote attackers to execute arbitrary code via crafted records in the document table of a Word document, leading to a heap-based buffer overflow.
Max CVSS
9.3
EPSS Score
21.79%
Published
2009-09-02
Updated
2018-10-11
OpenOffice.org (OOo) before 2.1.0 does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning.
Max CVSS
7.5
EPSS Score
0.17%
Published
2008-08-01
Updated
2008-09-05
Multiple integer overflows in OpenOffice.org (OOo) 2.x before 2.4.2 allow remote attackers to execute arbitrary code via crafted EMR records in an EMF file associated with a StarOffice/StarSuite document, which trigger a heap-based buffer overflow.
Max CVSS
9.3
EPSS Score
12.39%
Published
2008-10-30
Updated
2017-09-29
Heap-based buffer overflow in OpenOffice.org (OOo) 2.x before 2.4.2 allows remote attackers to execute arbitrary code via a crafted WMF file associated with a StarOffice/StarSuite document.
Max CVSS
9.3
EPSS Score
11.69%
Published
2008-10-30
Updated
2017-09-29

CVE-2008-0320

Public exploit
Heap-based buffer overflow in the OLE importer in OpenOffice.org before 2.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an OLE file with a crafted DocumentSummaryInformation stream.
Max CVSS
9.3
EPSS Score
93.22%
Published
2008-04-17
Updated
2017-09-29
6 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!