{"url":"http://public2.vulnerablecode.io/api/packages/1035781?format=json","purl":"pkg:deb/debian/libreoffice@1:4.0.3-2~bpo70%2B1","type":"deb","namespace":"debian","name":"libreoffice","version":"1:4.0.3-2~bpo70+1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"4:7.4.7-1+deb12u10","latest_non_vulnerable_version":"4:7.4.7-1+deb12u10","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79183?format=json","vulnerability_id":"VCID-11vv-gd2v-2qhk","summary":"libreoffice: Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26306.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26306.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26306","reference_id":"","reference_type":"","scores":[{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58588","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58478","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58506","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58577","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58446","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58465","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58439","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58492","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58498","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58515","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58495","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58476","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58507","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58512","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.5849","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58457","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.5847","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58456","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58422","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58524","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26306"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2118613","reference_id":"2118613","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2118613"},{"reference_url":"https://security.archlinux.org/AVG-2783","reference_id":"AVG-2783","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2783"},{"reference_url":"https://security.archlinux.org/AVG-2784","reference_id":"AVG-2784","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2784"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0089","reference_id":"RHSA-2023:0089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0089"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0304","reference_id":"RHSA-2023:0304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0304"},{"reference_url":"https://usn.ubuntu.com/5661-1/","reference_id":"USN-5661-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5661-1/"},{"reference_url":"https://usn.ubuntu.com/5694-1/","reference_id":"USN-5694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5694-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2022-26306"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-11vv-gd2v-2qhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48798?format=json","vulnerability_id":"VCID-15h8-ucrr-kqbb","summary":"A vulnerability in OpenOffice Impress could cause memory\n    corruption.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1513","reference_id":"","reference_type":"","scores":[{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.78417","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.78402","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.7816","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.78169","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.78199","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.78181","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.78208","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.78213","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.78239","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.78222","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.78218","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.7825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.78248","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.78244","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.78276","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.78282","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.78298","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.78311","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.78336","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.78353","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.78348","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01117","scoring_system":"epss","scoring_elements":"0.78364","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1513"},{"reference_url":"https://bz.apache.org/ooo/show_bug.cgi?id=127045","reference_id":"","reference_type":"","scores":[],"url":"https://bz.apache.org/ooo/show_bug.cgi?id=127045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1513","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1513"},{"reference_url":"http://www.openoffice.org/security/cves/CVE-2016-1513.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openoffice.org/security/cves/CVE-2016-1513.html"},{"reference_url":"http://www.securityfocus.com/bid/92079","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92079"},{"reference_url":"http://www.securitytracker.com/id/1036443","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036443"},{"reference_url":"http://www.talosintelligence.com/reports/TALOS-2016-0051/","reference_id":"","reference_type":"","scores":[],"url":"http://www.talosintelligence.com/reports/TALOS-2016-0051/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3046-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3046-1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1513","reference_id":"CVE-2016-1513","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1513"},{"reference_url":"https://security.gentoo.org/glsa/201703-01","reference_id":"GLSA-201703-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201703-01"},{"reference_url":"https://usn.ubuntu.com/3046-1/","reference_id":"USN-3046-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3046-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035785?format=json","purl":"pkg:deb/debian/libreoffice@1:4.3.3-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.3.3-2"}],"aliases":["CVE-2016-1513"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-15h8-ucrr-kqbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60132?format=json","vulnerability_id":"VCID-1981-p3m3-sfhe","summary":"Multiple vulnerabilities have been found in LibreOffice, the worst of which could result in user-assisted code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6185.json","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6185.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6185","reference_id":"","reference_type":"","scores":[{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.78978","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79044","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79004","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.78989","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79013","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.7902","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79028","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79018","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79046","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79043","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79041","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79075","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79081","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79096","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01215","scoring_system":"epss","scoring_elements":"0.79108","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80906","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80903","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.8086","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80842","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80848","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01439","scoring_system":"epss","scoring_elements":"0.80827","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6186"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254003","reference_id":"2254003","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254003"},{"reference_url":"https://www.libreoffice.org/about-us/security/advisories/cve-2023-6185","reference_id":"cve-2023-6185","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-20T16:47:31Z/"}],"url":"https://www.libreoffice.org/about-us/security/advisories/cve-2023-6185"},{"reference_url":"https://www.debian.org/security/2023/dsa-5574","reference_id":"dsa-5574","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-20T16:47:31Z/"}],"url":"https://www.debian.org/security/2023/dsa-5574"},{"reference_url":"https://security.gentoo.org/glsa/202402-29","reference_id":"GLSA-202402-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-29"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-20T16:47:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/","reference_id":"QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-20T16:47:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1423","reference_id":"RHSA-2024:1423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1425","reference_id":"RHSA-2024:1425","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1425"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1427","reference_id":"RHSA-2024:1427","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1427"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1473","reference_id":"RHSA-2024:1473","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1473"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1480","reference_id":"RHSA-2024:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1512","reference_id":"RHSA-2024:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1513","reference_id":"RHSA-2024:1513","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1513"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1514","reference_id":"RHSA-2024:1514","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3304","reference_id":"RHSA-2024:3304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3304"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3835","reference_id":"RHSA-2024:3835","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3835"},{"reference_url":"https://usn.ubuntu.com/6546-1/","reference_id":"USN-6546-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6546-1/"},{"reference_url":"https://usn.ubuntu.com/6546-2/","reference_id":"USN-6546-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6546-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2023-6185"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1981-p3m3-sfhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81242?format=json","vulnerability_id":"VCID-1vte-fcdx-nfcd","summary":"libreoffice: crash recovered MSOffice encrypted documents defaulted to not to using encryption on next save","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12801.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12801.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12801","reference_id":"","reference_type":"","scores":[{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40235","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39851","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40087","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39744","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39768","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39839","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40259","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40182","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40234","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40245","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40256","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40218","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40247","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40217","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.4014","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39967","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39952","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39872","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39743","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39808","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39828","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12801"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12801","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12801"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2137844","reference_id":"2137844","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2137844"},{"reference_url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12801","reference_id":"CVE-2020-12801","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-10T15:37:49Z/"}],"url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12801"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00011.html","reference_id":"msg00011.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-10T15:37:49Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00011.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-10T15:37:49Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html"},{"reference_url":"https://usn.ubuntu.com/5694-1/","reference_id":"USN-5694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5694-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2020-12801"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1vte-fcdx-nfcd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76364?format=json","vulnerability_id":"VCID-1ykj-3m3w-1fez","summary":"libreoffice: create a document which without prompt will execute scripts built-into LibreOffice on clicking a graphic","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3044.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-3044.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3044","reference_id":"","reference_type":"","scores":[{"value":"0.02355","scoring_system":"epss","scoring_elements":"0.85079","published_at":"2026-05-15T12:55:00Z"},{"value":"0.02355","scoring_system":"epss","scoring_elements":"0.84966","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02355","scoring_system":"epss","scoring_elements":"0.84982","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02355","scoring_system":"epss","scoring_elements":"0.85007","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02355","scoring_system":"epss","scoring_elements":"0.85026","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02355","scoring_system":"epss","scoring_elements":"0.85022","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02355","scoring_system":"epss","scoring_elements":"0.85037","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02355","scoring_system":"epss","scoring_elements":"0.85069","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02355","scoring_system":"epss","scoring_elements":"0.84852","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02355","scoring_system":"epss","scoring_elements":"0.8487","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02355","scoring_system":"epss","scoring_elements":"0.84872","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02355","scoring_system":"epss","scoring_elements":"0.84895","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02355","scoring_system":"epss","scoring_elements":"0.84902","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02355","scoring_system":"epss","scoring_elements":"0.8492","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02355","scoring_system":"epss","scoring_elements":"0.84919","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02355","scoring_system":"epss","scoring_elements":"0.84913","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02355","scoring_system":"epss","scoring_elements":"0.84934","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02355","scoring_system":"epss","scoring_elements":"0.84935","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02355","scoring_system":"epss","scoring_elements":"0.84933","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02355","scoring_system":"epss","scoring_elements":"0.84958","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3044"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3044","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3044"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2280542","reference_id":"2280542","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2280542"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TU3TYDXICKPYHMCNL7ARYYBXACEAYJ4/","reference_id":"3TU3TYDXICKPYHMCNL7ARYYBXACEAYJ4","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-16T18:55:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TU3TYDXICKPYHMCNL7ARYYBXACEAYJ4/"},{"reference_url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2024-3044","reference_id":"CVE-2024-3044","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-16T18:55:50Z/"}],"url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2024-3044"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00016.html","reference_id":"msg00016.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-16T18:55:50Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00016.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4242","reference_id":"RHSA-2024:4242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4755","reference_id":"RHSA-2024:4755","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4755"},{"reference_url":"https://usn.ubuntu.com/6789-1/","reference_id":"USN-6789-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6789-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2024-3044"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1ykj-3m3w-1fez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47712?format=json","vulnerability_id":"VCID-2p1p-4t4u-kyd8","summary":"Multiple vulnerabilities have been found in both LibreOffice and\n    OpenOffice allowing remote attackers to execute arbitrary code or cause\n    Denial of Service.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/144836.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-November/144836.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9093.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9093.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9093","reference_id":"","reference_type":"","scores":[{"value":"0.0327","scoring_system":"epss","scoring_elements":"0.87307","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0327","scoring_system":"epss","scoring_elements":"0.87298","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87265","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87262","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87281","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87289","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87302","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87297","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87292","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87307","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87239","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87305","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87321","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87328","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.8733","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87347","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.8736","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87379","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87374","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87388","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87311","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03334","scoring_system":"epss","scoring_elements":"0.87249","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9093"},{"reference_url":"https://bugs.freedesktop.org/show_bug.cgi?id=86449","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.freedesktop.org/show_bug.cgi?id=86449"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9093","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9093"},{"reference_url":"http://www.debian.org/security/2015/dsa-3163","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3163"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/11/19/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/11/19/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/11/26/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/11/26/7"},{"reference_url":"http://www.ubuntu.com/usn/USN-2578-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2578-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1165737","reference_id":"1165737","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1165737"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771163","reference_id":"771163","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771163"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9093","reference_id":"CVE-2014-9093","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9093"},{"reference_url":"https://security.gentoo.org/glsa/201603-05","reference_id":"GLSA-201603-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-05"},{"reference_url":"https://usn.ubuntu.com/2578-1/","reference_id":"USN-2578-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2578-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035785?format=json","purl":"pkg:deb/debian/libreoffice@1:4.3.3-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.3.3-2"}],"aliases":["CVE-2014-9093"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2p1p-4t4u-kyd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79727?format=json","vulnerability_id":"VCID-3kcp-zzcm-kfc9","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00040.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00040.html"},{"reference_url":"http://packetstormsecurity.com/files/156474/Open-Xchange-App-Suite-Documents-Server-Side-Request-Forgery.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/156474/Open-Xchange-App-Suite-Documents-Server-Side-Request-Forgery.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9853.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9853.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9853","reference_id":"","reference_type":"","scores":[{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52485","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52664","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.5255","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52576","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52654","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52531","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52558","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52524","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52577","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.5257","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52621","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52605","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.5259","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52629","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52637","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52622","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52573","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52583","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52547","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52488","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52541","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52586","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9853"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9853","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9853"},{"reference_url":"http://seclists.org/fulldisclosure/2020/Feb/23","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2020/Feb/23"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.apache.org/thread.html/19c917f7c8a0d8f62142046fabfe3e2c7d6091ef1f92b99c6e79e24e%40%3Ccommits.openoffice.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/19c917f7c8a0d8f62142046fabfe3e2c7d6091ef1f92b99c6e79e24e%40%3Ccommits.openoffice.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/27339e8a9a1e9bb47fbdb939b338256d0356250a1974aaf4d774f683%40%3Ccommits.openoffice.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/27339e8a9a1e9bb47fbdb939b338256d0356250a1974aaf4d774f683%40%3Ccommits.openoffice.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/306a374361891eb17c6cffc99c3d7be1d3152a99c839d4231edc1631%40%3Ccommits.openoffice.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/306a374361891eb17c6cffc99c3d7be1d3152a99c839d4231edc1631%40%3Ccommits.openoffice.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/3a5570ca5cd14ad08e24684c71cfeff3a507f108fe3cf30ba4f58226%40%3Ccommits.openoffice.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/3a5570ca5cd14ad08e24684c71cfeff3a507f108fe3cf30ba4f58226%40%3Ccommits.openoffice.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/4ae0e6e52600f408d943ded079d314733ce188b04b04471464f89c4f%40%3Ccommits.openoffice.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/4ae0e6e52600f408d943ded079d314733ce188b04b04471464f89c4f%40%3Ccommits.openoffice.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/70da9481dca267405e1d79e53942264765ef3f55c9a563c3737e3926%40%3Ccommits.openoffice.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/70da9481dca267405e1d79e53942264765ef3f55c9a563c3737e3926%40%3Ccommits.openoffice.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/7394e6b5f78a878bd0c44e9bc9adf90b8cdf49e9adc0f287145aba9b%40%3Ccommits.openoffice.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/7394e6b5f78a878bd0c44e9bc9adf90b8cdf49e9adc0f287145aba9b%40%3Ccommits.openoffice.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/9dc85d9937ad7f101047c53f78c00e8ceb135eaeff7dcf4724b46f2c%40%3Ccommits.openoffice.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/9dc85d9937ad7f101047c53f78c00e8ceb135eaeff7dcf4724b46f2c%40%3Ccommits.openoffice.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/a5231ad45b030b54828c7b0b62a7e7d4b48481c7cb83ff628e07fa43%40%3Ccommits.openoffice.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/a5231ad45b030b54828c7b0b62a7e7d4b48481c7cb83ff628e07fa43%40%3Ccommits.openoffice.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/a540d1b6f9a7ebb206adba02839f654a6ee63a7b0976f559a847e49a%40%3Ccommits.openoffice.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/a540d1b6f9a7ebb206adba02839f654a6ee63a7b0976f559a847e49a%40%3Ccommits.openoffice.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/ca216900abd846f0220fe18b95f9f787bdbe0e87fa4eee822073cd69%40%3Ccommits.openoffice.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/ca216900abd846f0220fe18b95f9f787bdbe0e87fa4eee822073cd69%40%3Ccommits.openoffice.apache.org%3E"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQGBRSD73KTDZ2MPAOL7FBWO3SQVYE5B/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQGBRSD73KTDZ2MPAOL7FBWO3SQVYE5B/"},{"reference_url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9853/","reference_id":"","reference_type":"","scores":[],"url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9853/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1797466","reference_id":"1797466","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1797466"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9853","reference_id":"CVE-2019-9853","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9853"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1151","reference_id":"RHSA-2020:1151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1598","reference_id":"RHSA-2020:1598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1598"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037007?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037966?format=json","purl":"pkg:deb/debian/libreoffice@1:6.1.5-3%2Bdeb10u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:6.1.5-3%252Bdeb10u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2019-9853"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3kcp-zzcm-kfc9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83227?format=json","vulnerability_id":"VCID-4y7m-x49j-f3gg","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12608.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12608.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12608","reference_id":"","reference_type":"","scores":[{"value":"0.01141","scoring_system":"epss","scoring_elements":"0.78371","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01141","scoring_system":"epss","scoring_elements":"0.78424","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01141","scoring_system":"epss","scoring_elements":"0.78377","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01141","scoring_system":"epss","scoring_elements":"0.78408","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01141","scoring_system":"epss","scoring_elements":"0.78391","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01141","scoring_system":"epss","scoring_elements":"0.78418","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01141","scoring_system":"epss","scoring_elements":"0.78423","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01141","scoring_system":"epss","scoring_elements":"0.78431","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01141","scoring_system":"epss","scoring_elements":"0.78449","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78698","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78577","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78593","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78618","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78633","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78629","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78645","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01151","scoring_system":"epss","scoring_elements":"0.78684","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01815","scoring_system":"epss","scoring_elements":"0.82884","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01815","scoring_system":"epss","scoring_elements":"0.82883","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01815","scoring_system":"epss","scoring_elements":"0.82882","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01815","scoring_system":"epss","scoring_elements":"0.82906","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01815","scoring_system":"epss","scoring_elements":"0.82915","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12608"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00017.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00017.html"},{"reference_url":"https://www.debian.org/security/2017/dsa-4022","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-4022"},{"reference_url":"https://www.openoffice.org/security/cves/CVE-2017-12608.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.openoffice.org/security/cves/CVE-2017-12608.html"},{"reference_url":"http://www.securityfocus.com/bid/101585","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101585"},{"reference_url":"http://www.securitytracker.com/id/1039733","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039733"},{"reference_url":"http://www.securitytracker.com/id/1039735","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039735"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1507806","reference_id":"1507806","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1507806"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12608","reference_id":"CVE-2017-12608","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12608"},{"reference_url":"https://usn.ubuntu.com/3472-1/","reference_id":"USN-3472-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3472-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035788?format=json","purl":"pkg:deb/debian/libreoffice@1:4.3.3-2%2Bdeb8u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.3.3-2%252Bdeb8u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037006?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u4~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u4~bpo8%252B1"}],"aliases":["CVE-2017-12608"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4y7m-x49j-f3gg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36606?format=json","vulnerability_id":"VCID-5j4w-jaa8-7kae","summary":"Multiple vulnerabilities have been found in OpenOffice and\n    LibreOffice, the worst of which may result in execution of arbitrary code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00006.html"},{"reference_url":"http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-0247.html","reference_id":"","reference_type":"","scores":[],"url":"http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-0247.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0377.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0377.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0247.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0247.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0247","reference_id":"","reference_type":"","scores":[{"value":"0.06607","scoring_system":"epss","scoring_elements":"0.91279","published_at":"2026-05-15T12:55:00Z"},{"value":"0.06607","scoring_system":"epss","scoring_elements":"0.91126","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06607","scoring_system":"epss","scoring_elements":"0.91131","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06607","scoring_system":"epss","scoring_elements":"0.91139","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06607","scoring_system":"epss","scoring_elements":"0.91147","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06607","scoring_system":"epss","scoring_elements":"0.9116","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06607","scoring_system":"epss","scoring_elements":"0.91166","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06607","scoring_system":"epss","scoring_elements":"0.91174","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06607","scoring_system":"epss","scoring_elements":"0.91176","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06607","scoring_system":"epss","scoring_elements":"0.912","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06607","scoring_system":"epss","scoring_elements":"0.91203","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06607","scoring_system":"epss","scoring_elements":"0.91216","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06607","scoring_system":"epss","scoring_elements":"0.91214","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06607","scoring_system":"epss","scoring_elements":"0.91213","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06607","scoring_system":"epss","scoring_elements":"0.91227","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06607","scoring_system":"epss","scoring_elements":"0.91245","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06607","scoring_system":"epss","scoring_elements":"0.91256","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06607","scoring_system":"epss","scoring_elements":"0.91255","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06607","scoring_system":"epss","scoring_elements":"0.91263","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06607","scoring_system":"epss","scoring_elements":"0.91273","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0247"},{"reference_url":"https://bugs.mageia.org/show_bug.cgi?id=13580","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.mageia.org/show_bug.cgi?id=13580"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0247","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0247"},{"reference_url":"http://secunia.com/advisories/57383","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/57383"},{"reference_url":"http://secunia.com/advisories/59330","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59330"},{"reference_url":"http://secunia.com/advisories/60799","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60799"},{"reference_url":"https://gerrit.libreoffice.org/gitweb?p=core.git%3Ba=blobdiff%3Bf=sfx2/source/doc/docmacromode.cxx%3Bh=4d4ae52b4339582a039744d03671c1db0633d6c3%3Bhp=2108d1920f8148ff60fd4a57684f295d6d733e7b%3Bhb=1b0402f87c9b17fef2141130bfaa1798ece6ba0d%3Bhpb=4d2113250fa7ed62fe2c53ed0f76e3de5875cb81","reference_id":"","reference_type":"","scores":[],"url":"https://gerrit.libreoffice.org/gitweb?p=core.git%3Ba=blobdiff%3Bf=sfx2/source/doc/docmacromode.cxx%3Bh=4d4ae52b4339582a039744d03671c1db0633d6c3%3Bhp=2108d1920f8148ff60fd4a57684f295d6d733e7b%3Bhb=1b0402f87c9b17fef2141130bfaa1798ece6ba0d%3Bhpb=4d2113250fa7ed62fe2c53ed0f76e3de5875cb81"},{"reference_url":"https://www.libreoffice.org/about-us/security/advisories/cve-2014-0247/","reference_id":"","reference_type":"","scores":[],"url":"https://www.libreoffice.org/about-us/security/advisories/cve-2014-0247/"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml"},{"reference_url":"http://www.securityfocus.com/bid/68151","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68151"},{"reference_url":"http://www.ubuntu.com/usn/USN-2253-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2253-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1111083","reference_id":"1111083","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1111083"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0247","reference_id":"CVE-2014-0247","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0247"},{"reference_url":"https://security.gentoo.org/glsa/201408-19","reference_id":"GLSA-201408-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0377","reference_id":"RHSA-2015:0377","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0377"},{"reference_url":"https://usn.ubuntu.com/2253-1/","reference_id":"USN-2253-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2253-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035783?format=json","purl":"pkg:deb/debian/libreoffice@1:4.2.6-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-15h8-ucrr-kqbb"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-2p1p-4t4u-kyd8"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-drkj-da54-jfgd"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-xr5b-gdek-kqgy"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.2.6-1~bpo70%252B1"}],"aliases":["CVE-2014-0247"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5j4w-jaa8-7kae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79728?format=json","vulnerability_id":"VCID-5rdw-edhu-qbhf","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9854.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9854.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9854","reference_id":"","reference_type":"","scores":[{"value":"0.00671","scoring_system":"epss","scoring_elements":"0.71569","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00671","scoring_system":"epss","scoring_elements":"0.71472","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00671","scoring_system":"epss","scoring_elements":"0.71508","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00671","scoring_system":"epss","scoring_elements":"0.71473","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00671","scoring_system":"epss","scoring_elements":"0.71503","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00671","scoring_system":"epss","scoring_elements":"0.7156","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.7331","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73318","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73331","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73355","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73335","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73327","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.7337","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73378","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73371","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73405","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73418","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73416","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73412","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73276","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73286","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0076","scoring_system":"epss","scoring_elements":"0.73282","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9854"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9854","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9854"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQKKOIY2DMZCXJINOLIQXD2NWISDKK3N/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQKKOIY2DMZCXJINOLIQXD2NWISDKK3N/"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/17","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Sep/17"},{"reference_url":"https://www.debian.org/security/2019/dsa-4519","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2019/dsa-4519"},{"reference_url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9854/","reference_id":"","reference_type":"","scores":[],"url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9854/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1769907","reference_id":"1769907","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1769907"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9854","reference_id":"CVE-2019-9854","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9854"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1151","reference_id":"RHSA-2020:1151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1598","reference_id":"RHSA-2020:1598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1598"},{"reference_url":"https://usn.ubuntu.com/4138-1/","reference_id":"USN-4138-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4138-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037007?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037966?format=json","purl":"pkg:deb/debian/libreoffice@1:6.1.5-3%2Bdeb10u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:6.1.5-3%252Bdeb10u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2019-9854"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5rdw-edhu-qbhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50388?format=json","vulnerability_id":"VCID-71cy-5hgf-skdr","summary":"Multiple vulnerabilities have been found in LibreOffice, the worst\n    of which allows for the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10327.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10327.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10327","reference_id":"","reference_type":"","scores":[{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69563","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69833","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69747","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69772","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69822","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69576","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69591","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.6957","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69621","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69637","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69659","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69644","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.6963","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69671","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.6968","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69661","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69713","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69721","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69727","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69701","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69745","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00606","scoring_system":"epss","scoring_elements":"0.69776","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10327"},{"reference_url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=313","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=313"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10327","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10327"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/LibreOffice/core/commit/7485fc2a1484f31631f62f97e5c64c0ae74c6416","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/LibreOffice/core/commit/7485fc2a1484f31631f62f97e5c64c0ae74c6416"},{"reference_url":"http://www.libreoffice.org/about-us/security/advisories/cve-2016-10327/","reference_id":"","reference_type":"","scores":[],"url":"http://www.libreoffice.org/about-us/security/advisories/cve-2016-10327/"},{"reference_url":"http://www.securityfocus.com/bid/97668","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97668"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1444053","reference_id":"1444053","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1444053"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:*:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10327","reference_id":"CVE-2016-10327","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10327"},{"reference_url":"https://security.gentoo.org/glsa/201706-28","reference_id":"GLSA-201706-28","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-28"},{"reference_url":"https://usn.ubuntu.com/3273-1/","reference_id":"USN-3273-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3273-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037006?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u4~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u4~bpo8%252B1"}],"aliases":["CVE-2016-10327"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-71cy-5hgf-skdr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47713?format=json","vulnerability_id":"VCID-7du8-skt4-dkew","summary":"Multiple vulnerabilities have been found in both LibreOffice and\n    OpenOffice allowing remote attackers to execute arbitrary code or cause\n    Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1774.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1774.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1774","reference_id":"","reference_type":"","scores":[{"value":"0.07403","scoring_system":"epss","scoring_elements":"0.91806","published_at":"2026-05-14T12:55:00Z"},{"value":"0.07403","scoring_system":"epss","scoring_elements":"0.91814","published_at":"2026-05-15T12:55:00Z"},{"value":"0.09725","scoring_system":"epss","scoring_elements":"0.92924","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09725","scoring_system":"epss","scoring_elements":"0.92931","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09725","scoring_system":"epss","scoring_elements":"0.92936","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09725","scoring_system":"epss","scoring_elements":"0.92941","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09725","scoring_system":"epss","scoring_elements":"0.92939","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09725","scoring_system":"epss","scoring_elements":"0.9294","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09725","scoring_system":"epss","scoring_elements":"0.9295","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09725","scoring_system":"epss","scoring_elements":"0.92952","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09725","scoring_system":"epss","scoring_elements":"0.92912","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09725","scoring_system":"epss","scoring_elements":"0.92961","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09725","scoring_system":"epss","scoring_elements":"0.92963","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09725","scoring_system":"epss","scoring_elements":"0.92967","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09725","scoring_system":"epss","scoring_elements":"0.92982","published_at":"2026-05-07T12:55:00Z"},{"value":"0.09725","scoring_system":"epss","scoring_elements":"0.92993","published_at":"2026-05-09T12:55:00Z"},{"value":"0.09725","scoring_system":"epss","scoring_elements":"0.92996","published_at":"2026-05-11T12:55:00Z"},{"value":"0.09725","scoring_system":"epss","scoring_elements":"0.93003","published_at":"2026-05-12T12:55:00Z"},{"value":"0.09725","scoring_system":"epss","scoring_elements":"0.92959","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09725","scoring_system":"epss","scoring_elements":"0.9292","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1774"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1774","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1774"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1216042","reference_id":"1216042","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1216042"},{"reference_url":"https://security.gentoo.org/glsa/201603-05","reference_id":"GLSA-201603-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1458","reference_id":"RHSA-2015:1458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1458"},{"reference_url":"https://usn.ubuntu.com/2578-1/","reference_id":"USN-2578-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2578-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035786?format=json","purl":"pkg:deb/debian/libreoffice@1:4.3.3-2%2Bdeb8u3~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.3.3-2%252Bdeb8u3~bpo70%252B1"},{"url":"http://public2.vulnerablecode.io/api/packages/1037006?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u4~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u4~bpo8%252B1"}],"aliases":["CVE-2015-1774"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7du8-skt4-dkew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60133?format=json","vulnerability_id":"VCID-7y9n-6x5a-k3eg","summary":"Multiple vulnerabilities have been found in LibreOffice, the worst of which could result in user-assisted code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6186.json","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6186.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6186","reference_id":"","reference_type":"","scores":[{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.77044","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76957","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76975","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76963","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76979","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.7703","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77918","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77902","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.7785","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77878","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77859","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77886","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77891","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79703","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79734","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79718","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79663","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79662","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79666","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01287","scoring_system":"epss","scoring_elements":"0.79696","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6186"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6186","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6186"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254005","reference_id":"2254005","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254005"},{"reference_url":"https://security.gentoo.org/glsa/202402-29","reference_id":"GLSA-202402-29","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1423","reference_id":"RHSA-2024:1423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1425","reference_id":"RHSA-2024:1425","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1425"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1427","reference_id":"RHSA-2024:1427","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1427"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1473","reference_id":"RHSA-2024:1473","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1473"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1480","reference_id":"RHSA-2024:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1512","reference_id":"RHSA-2024:1512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1513","reference_id":"RHSA-2024:1513","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1513"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1514","reference_id":"RHSA-2024:1514","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1514"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3835","reference_id":"RHSA-2024:3835","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3835"},{"reference_url":"https://usn.ubuntu.com/6546-1/","reference_id":"USN-6546-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6546-1/"},{"reference_url":"https://usn.ubuntu.com/6546-2/","reference_id":"USN-6546-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6546-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2023-6186"],"risk_score":3.8,"exploitability":"0.5","weighted_severity":"7.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7y9n-6x5a-k3eg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83226?format=json","vulnerability_id":"VCID-886d-gwa2-6bcf","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12607.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12607.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12607","reference_id":"","reference_type":"","scores":[{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70384","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70279","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70253","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70295","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70328","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70296","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70323","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00626","scoring_system":"epss","scoring_elements":"0.70373","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74723","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74726","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74717","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74673","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74676","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74702","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74677","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74709","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74747","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00991","scoring_system":"epss","scoring_elements":"0.76925","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00991","scoring_system":"epss","scoring_elements":"0.76928","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00991","scoring_system":"epss","scoring_elements":"0.76933","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00991","scoring_system":"epss","scoring_elements":"0.76958","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00991","scoring_system":"epss","scoring_elements":"0.76966","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12607","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12607"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12608"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00017.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00017.html"},{"reference_url":"https://www.debian.org/security/2017/dsa-4022","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-4022"},{"reference_url":"https://www.openoffice.org/security/cves/CVE-2017-12607.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.openoffice.org/security/cves/CVE-2017-12607.html"},{"reference_url":"http://www.securityfocus.com/bid/101585","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101585"},{"reference_url":"http://www.securitytracker.com/id/1039732","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039732"},{"reference_url":"http://www.securitytracker.com/id/1039734","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039734"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1507805","reference_id":"1507805","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1507805"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12607","reference_id":"CVE-2017-12607","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-12607"},{"reference_url":"https://usn.ubuntu.com/3472-1/","reference_id":"USN-3472-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3472-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035788?format=json","purl":"pkg:deb/debian/libreoffice@1:4.3.3-2%2Bdeb8u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.3.3-2%252Bdeb8u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037006?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u4~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u4~bpo8%252B1"}],"aliases":["CVE-2017-12607"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-886d-gwa2-6bcf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79644?format=json","vulnerability_id":"VCID-91c1-yujx-zbft","summary":"libreoffice: Incorrect trust validation of signature with ambiguous KeyInfo children","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25636.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25636.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-25636","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38994","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3918","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39202","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39121","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39176","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39192","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39152","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39115","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39095","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3915","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3912","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39032","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38823","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.388","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38717","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38593","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38666","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38679","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38592","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38615","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38689","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38696","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-25636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25636"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2056955","reference_id":"2056955","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2056955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7461","reference_id":"RHSA-2022:7461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7461"},{"reference_url":"https://usn.ubuntu.com/5330-1/","reference_id":"USN-5330-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5330-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2021-25636"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-91c1-yujx-zbft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80006?format=json","vulnerability_id":"VCID-b13x-6q14-gfau","summary":"libreoffice: Timestamp Manipulation with Signature Wrapping","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25634.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25634.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-25634","reference_id":"","reference_type":"","scores":[{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.6095","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61027","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61056","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61021","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.6107","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61086","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61107","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61093","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61074","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61116","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61122","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61106","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61095","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.611","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61048","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61097","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61157","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61119","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61146","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.61204","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00406","scoring_system":"epss","scoring_elements":"0.6122","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-25634"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25633","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25634"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2013151","reference_id":"2013151","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2013151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1766","reference_id":"RHSA-2022:1766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1766"},{"reference_url":"https://usn.ubuntu.com/5153-1/","reference_id":"USN-5153-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5153-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2021-25634"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b13x-6q14-gfau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47714?format=json","vulnerability_id":"VCID-by33-ugtg-47hx","summary":"Multiple vulnerabilities have been found in both LibreOffice and\n    OpenOffice allowing remote attackers to execute arbitrary code or cause\n    Denial of Service.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2619.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2619.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4551.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4551.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4551","reference_id":"","reference_type":"","scores":[{"value":"0.07753","scoring_system":"epss","scoring_elements":"0.92025","published_at":"2026-05-15T12:55:00Z"},{"value":"0.07753","scoring_system":"epss","scoring_elements":"0.92016","published_at":"2026-05-14T12:55:00Z"},{"value":"0.096","scoring_system":"epss","scoring_elements":"0.92863","published_at":"2026-04-04T12:55:00Z"},{"value":"0.096","scoring_system":"epss","scoring_elements":"0.9286","published_at":"2026-04-07T12:55:00Z"},{"value":"0.096","scoring_system":"epss","scoring_elements":"0.92869","published_at":"2026-04-08T12:55:00Z"},{"value":"0.096","scoring_system":"epss","scoring_elements":"0.92873","published_at":"2026-04-09T12:55:00Z"},{"value":"0.096","scoring_system":"epss","scoring_elements":"0.92878","published_at":"2026-04-13T12:55:00Z"},{"value":"0.096","scoring_system":"epss","scoring_elements":"0.92887","published_at":"2026-04-16T12:55:00Z"},{"value":"0.096","scoring_system":"epss","scoring_elements":"0.92889","published_at":"2026-04-18T12:55:00Z"},{"value":"0.096","scoring_system":"epss","scoring_elements":"0.92852","published_at":"2026-04-01T12:55:00Z"},{"value":"0.096","scoring_system":"epss","scoring_elements":"0.92897","published_at":"2026-04-24T12:55:00Z"},{"value":"0.096","scoring_system":"epss","scoring_elements":"0.92899","published_at":"2026-04-26T12:55:00Z"},{"value":"0.096","scoring_system":"epss","scoring_elements":"0.92903","published_at":"2026-05-05T12:55:00Z"},{"value":"0.096","scoring_system":"epss","scoring_elements":"0.92917","published_at":"2026-05-07T12:55:00Z"},{"value":"0.096","scoring_system":"epss","scoring_elements":"0.92928","published_at":"2026-05-09T12:55:00Z"},{"value":"0.096","scoring_system":"epss","scoring_elements":"0.92931","published_at":"2026-05-11T12:55:00Z"},{"value":"0.096","scoring_system":"epss","scoring_elements":"0.92938","published_at":"2026-05-12T12:55:00Z"},{"value":"0.096","scoring_system":"epss","scoring_elements":"0.92895","published_at":"2026-04-29T12:55:00Z"},{"value":"0.096","scoring_system":"epss","scoring_elements":"0.92859","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-4551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5214"},{"reference_url":"http://www.debian.org/security/2015/dsa-3394","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3394"},{"reference_url":"http://www.libreoffice.org/about-us/security/advisories/cve-2015-4551/","reference_id":"","reference_type":"","scores":[],"url":"http://www.libreoffice.org/about-us/security/advisories/cve-2015-4551/"},{"reference_url":"http://www.openoffice.org/security/cves/CVE-2015-4551.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openoffice.org/security/cves/CVE-2015-4551.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/77486","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77486"},{"reference_url":"http://www.securitytracker.com/id/1034085","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034085"},{"reference_url":"http://www.securitytracker.com/id/1034091","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034091"},{"reference_url":"http://www.ubuntu.com/usn/USN-2793-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2793-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1278812","reference_id":"1278812","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1278812"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4551","reference_id":"CVE-2015-4551","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-4551"},{"reference_url":"https://security.gentoo.org/glsa/201603-05","reference_id":"GLSA-201603-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-05"},{"reference_url":"https://security.gentoo.org/glsa/201611-03","reference_id":"GLSA-201611-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201611-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2619","reference_id":"RHSA-2015:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2619"},{"reference_url":"https://usn.ubuntu.com/2793-1/","reference_id":"USN-2793-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2793-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035786?format=json","purl":"pkg:deb/debian/libreoffice@1:4.3.3-2%2Bdeb8u3~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.3.3-2%252Bdeb8u3~bpo70%252B1"},{"url":"http://public2.vulnerablecode.io/api/packages/1037006?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u4~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u4~bpo8%252B1"}],"aliases":["CVE-2015-4551"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-by33-ugtg-47hx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41757?format=json","vulnerability_id":"VCID-bywq-ypgf-xyae","summary":"A vulnerability has been discovered in LibreOffice which could result in arbitrary script execution via crafted links.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3140.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3140.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3140","reference_id":"","reference_type":"","scores":[{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.80075","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.80031","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.80071","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.79841","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.79862","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.7985","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.79879","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.79886","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.79907","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.7989","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.79882","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.79911","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.79912","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.79915","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.79943","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.79949","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.79967","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.79981","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.80004","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.80019","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01322","scoring_system":"epss","scoring_elements":"0.80015","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-3140"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3140","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3140"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134697","reference_id":"2134697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2134697"},{"reference_url":"https://security.archlinux.org/AVG-2806","reference_id":"AVG-2806","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2806"},{"reference_url":"https://security.archlinux.org/AVG-2807","reference_id":"AVG-2807","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2807"},{"reference_url":"https://security.gentoo.org/glsa/202212-04","reference_id":"GLSA-202212-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202212-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0089","reference_id":"RHSA-2023:0089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0089"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0304","reference_id":"RHSA-2023:0304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0304"},{"reference_url":"https://usn.ubuntu.com/5694-1/","reference_id":"USN-5694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5694-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2022-3140"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bywq-ypgf-xyae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79724?format=json","vulnerability_id":"VCID-c1fx-u5yh-jucb","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9850.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9850.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9850","reference_id":"","reference_type":"","scores":[{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.863","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.86311","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.86329","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.8633","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.86347","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.86357","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.86371","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.86369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.86363","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.8638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.86385","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.86378","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.86398","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.86408","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.86404","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.86424","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.86444","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.86463","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.8646","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.86473","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.86509","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02907","scoring_system":"epss","scoring_elements":"0.86518","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9853","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9853"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1744862","reference_id":"1744862","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1744862"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1151","reference_id":"RHSA-2020:1151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1598","reference_id":"RHSA-2020:1598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1598"},{"reference_url":"https://usn.ubuntu.com/4102-1/","reference_id":"USN-4102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037007?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037966?format=json","purl":"pkg:deb/debian/libreoffice@1:6.1.5-3%2Bdeb10u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:6.1.5-3%252Bdeb10u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2019-9850"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c1fx-u5yh-jucb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47711?format=json","vulnerability_id":"VCID-drkj-da54-jfgd","summary":"Multiple vulnerabilities have been found in both LibreOffice and\n    OpenOffice allowing remote attackers to execute arbitrary code or cause\n    Denial of Service.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00049.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00049.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0377.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-0377.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3693.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3693.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3693","reference_id":"","reference_type":"","scores":[{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.89006","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.88849","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.88858","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.88873","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.88875","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.88893","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.88899","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.8891","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.88905","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.88918","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.88917","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.88913","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.88929","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.88937","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.88938","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.88946","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.88962","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.88973","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.88967","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.88977","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0432","scoring_system":"epss","scoring_elements":"0.88996","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3693"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3693","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3693"},{"reference_url":"http://secunia.com/advisories/62111","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62111"},{"reference_url":"http://secunia.com/advisories/62132","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62132"},{"reference_url":"http://secunia.com/advisories/62396","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62396"},{"reference_url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2014-3693/","reference_id":"","reference_type":"","scores":[],"url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2014-3693/"},{"reference_url":"http://www.securityfocus.com/bid/71351","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71351"},{"reference_url":"http://www.ubuntu.com/usn/USN-2398-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2398-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1164733","reference_id":"1164733","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1164733"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.0.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.0.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.0.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.0.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.0.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.0.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:4.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:4.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3693","reference_id":"CVE-2014-3693","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3693"},{"reference_url":"https://security.gentoo.org/glsa/201603-05","reference_id":"GLSA-201603-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0377","reference_id":"RHSA-2015:0377","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0377"},{"reference_url":"https://usn.ubuntu.com/2398-1/","reference_id":"USN-2398-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2398-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035785?format=json","purl":"pkg:deb/debian/libreoffice@1:4.3.3-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.3.3-2"}],"aliases":["CVE-2014-3693"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-drkj-da54-jfgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81206?format=json","vulnerability_id":"VCID-dt65-hb25-t7ck","summary":"libreoffice: 'stealth mode' remote resource restrictions bypass","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12802.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12802.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12802","reference_id":"","reference_type":"","scores":[{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60615","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60881","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.6081","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60868","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.6069","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.6072","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60733","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60749","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60773","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.6076","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60741","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60783","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60788","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60774","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60766","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60717","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60764","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60822","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12802"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1850226","reference_id":"1850226","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1850226"},{"reference_url":"https://security.archlinux.org/AVG-1184","reference_id":"AVG-1184","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1184"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4628","reference_id":"RHSA-2020:4628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4628"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2020-12802"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dt65-hb25-t7ck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84566?format=json","vulnerability_id":"VCID-e911-8nez-yfb7","summary":"libreoffice: Arbitrary file disclosure in Calc and Writer","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3157.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3157.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3157","reference_id":"","reference_type":"","scores":[{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.7372","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73944","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73858","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73882","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73938","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.7373","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73753","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73724","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73759","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73772","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73795","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73777","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73768","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.7381","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73817","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73809","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73843","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73852","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73846","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73872","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00785","scoring_system":"epss","scoring_elements":"0.73895","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3157"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3157","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3157"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.debian.org/security/2017/dsa-3792","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-3792"},{"reference_url":"https://www.openoffice.org/security/cves/CVE-2017-3157.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.openoffice.org/security/cves/CVE-2017-3157.html"},{"reference_url":"http://www.securityfocus.com/bid/96402","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/96402"},{"reference_url":"http://www.securitytracker.com/id/1037893","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1037893"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1425844","reference_id":"1425844","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1425844"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3157","reference_id":"CVE-2017-3157","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0914","reference_id":"RHSA-2017:0914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0979","reference_id":"RHSA-2017:0979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0979"},{"reference_url":"https://usn.ubuntu.com/3210-1/","reference_id":"USN-3210-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3210-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035787?format=json","purl":"pkg:deb/debian/libreoffice@1:4.3.3-2%2Bdeb8u7~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.3.3-2%252Bdeb8u7~bpo70%252B1"},{"url":"http://public2.vulnerablecode.io/api/packages/1037006?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u4~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u4~bpo8%252B1"}],"aliases":["CVE-2017-3157"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e911-8nez-yfb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79181?format=json","vulnerability_id":"VCID-hnaa-96w8-3uhu","summary":"libreoffice: Execution of Untrusted Macros Due to Improper Certificate Validation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26305.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26305.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26305","reference_id":"","reference_type":"","scores":[{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.72309","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.72218","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.72245","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.72303","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.72088","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.72109","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.72085","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.72122","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.72134","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.72157","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.72141","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.72127","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.72168","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.72176","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.72162","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.72205","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.72214","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.72209","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.722","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.72229","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00706","scoring_system":"epss","scoring_elements":"0.72256","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26305"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26305","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26305"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2118611","reference_id":"2118611","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2118611"},{"reference_url":"https://security.archlinux.org/AVG-2783","reference_id":"AVG-2783","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2783"},{"reference_url":"https://security.archlinux.org/AVG-2784","reference_id":"AVG-2784","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2784"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0089","reference_id":"RHSA-2023:0089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0089"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0304","reference_id":"RHSA-2023:0304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0304"},{"reference_url":"https://usn.ubuntu.com/5661-1/","reference_id":"USN-5661-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5661-1/"},{"reference_url":"https://usn.ubuntu.com/5694-1/","reference_id":"USN-5694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5694-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2022-26305"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hnaa-96w8-3uhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78551?format=json","vulnerability_id":"VCID-jew4-uq9k-93b3","summary":"libreoffice: Empty entry in Java class path","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38745.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38745.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38745","reference_id":"","reference_type":"","scores":[{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.289","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28851","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28813","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28773","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00106","scoring_system":"epss","scoring_elements":"0.28707","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31837","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3182","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31725","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31748","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31817","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32349","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32311","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32283","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3232","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32296","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32267","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32092","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31968","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31886","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31739","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31811","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38745"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182044","reference_id":"2182044","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2182044"},{"reference_url":"https://www.openoffice.org/security/cves/CVE-2022-38745.html","reference_id":"CVE-2022-38745.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T14:37:34Z/"}],"url":"https://www.openoffice.org/security/cves/CVE-2022-38745.html"},{"reference_url":"https://lists.apache.org/thread/q3noq7m681kvtb29m28x74q8cnwnzzo0","reference_id":"q3noq7m681kvtb29m28x74q8cnwnzzo0","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-13T14:37:34Z/"}],"url":"https://lists.apache.org/thread/q3noq7m681kvtb29m28x74q8cnwnzzo0"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6508","reference_id":"RHSA-2023:6508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6933","reference_id":"RHSA-2023:6933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6933"},{"reference_url":"https://usn.ubuntu.com/6023-1/","reference_id":"USN-6023-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6023-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2022-38745"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jew4-uq9k-93b3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73109?format=json","vulnerability_id":"VCID-jmtk-qy9f-z3hu","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10120.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10120.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10120","reference_id":"","reference_type":"","scores":[{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65822","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65869","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.659","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65865","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65917","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65928","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65946","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65933","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65903","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65938","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65953","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65941","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65954","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65965","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65963","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.6594","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65986","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66031","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66021","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66077","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66086","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10120"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10119","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10120","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10120"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1569840","reference_id":"1569840","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1569840"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3054","reference_id":"RHSA-2018:3054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3054"},{"reference_url":"https://usn.ubuntu.com/3883-1/","reference_id":"USN-3883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3883-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035788?format=json","purl":"pkg:deb/debian/libreoffice@1:4.3.3-2%2Bdeb8u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.3.3-2%252Bdeb8u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037007?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037966?format=json","purl":"pkg:deb/debian/libreoffice@1:6.1.5-3%2Bdeb10u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:6.1.5-3%252Bdeb10u7"}],"aliases":["CVE-2018-10120"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jmtk-qy9f-z3hu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56784?format=json","vulnerability_id":"VCID-k36c-4eyp-p7hq","summary":"Multiple vulnerabilities have been found in LibreOffice, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9848.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9848.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9848","reference_id":"","reference_type":"","scores":[{"value":"0.86449","scoring_system":"epss","scoring_elements":"0.9942","published_at":"2026-05-15T12:55:00Z"},{"value":"0.86449","scoring_system":"epss","scoring_elements":"0.99415","published_at":"2026-05-07T12:55:00Z"},{"value":"0.86449","scoring_system":"epss","scoring_elements":"0.99417","published_at":"2026-05-11T12:55:00Z"},{"value":"0.86558","scoring_system":"epss","scoring_elements":"0.9941","published_at":"2026-04-02T12:55:00Z"},{"value":"0.86558","scoring_system":"epss","scoring_elements":"0.99412","published_at":"2026-04-04T12:55:00Z"},{"value":"0.86558","scoring_system":"epss","scoring_elements":"0.99413","published_at":"2026-04-07T12:55:00Z"},{"value":"0.86558","scoring_system":"epss","scoring_elements":"0.99414","published_at":"2026-04-09T12:55:00Z"},{"value":"0.86558","scoring_system":"epss","scoring_elements":"0.99416","published_at":"2026-04-11T12:55:00Z"},{"value":"0.86558","scoring_system":"epss","scoring_elements":"0.99417","published_at":"2026-04-12T12:55:00Z"},{"value":"0.86558","scoring_system":"epss","scoring_elements":"0.99418","published_at":"2026-04-13T12:55:00Z"},{"value":"0.86558","scoring_system":"epss","scoring_elements":"0.9942","published_at":"2026-04-18T12:55:00Z"},{"value":"0.86558","scoring_system":"epss","scoring_elements":"0.99419","published_at":"2026-04-21T12:55:00Z"},{"value":"0.86558","scoring_system":"epss","scoring_elements":"0.99421","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9848"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9848","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9848"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9849","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9849"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1737427","reference_id":"1737427","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1737427"},{"reference_url":"https://security.archlinux.org/ASA-201908-9","reference_id":"ASA-201908-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201908-9"},{"reference_url":"https://security.archlinux.org/AVG-1009","reference_id":"AVG-1009","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1009"},{"reference_url":"https://security.archlinux.org/AVG-1010","reference_id":"AVG-1010","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1010"},{"reference_url":"https://security.gentoo.org/glsa/201908-13","reference_id":"GLSA-201908-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201908-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1151","reference_id":"RHSA-2020:1151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1151"},{"reference_url":"https://usn.ubuntu.com/4063-1/","reference_id":"USN-4063-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4063-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037007?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037966?format=json","purl":"pkg:deb/debian/libreoffice@1:6.1.5-3%2Bdeb10u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:6.1.5-3%252Bdeb10u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2019-9848"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k36c-4eyp-p7hq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56791?format=json","vulnerability_id":"VCID-k3cz-81fc-sbg7","summary":"Multiple vulnerabilities have been found in both LibreOffice and\n    OpenOffice, the worst of which allows for the remote execution of arbitrary\n    code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4324.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4324.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4324","reference_id":"","reference_type":"","scores":[{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71209","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71466","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71373","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71401","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71457","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71218","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71236","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71211","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71253","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71267","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.7129","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71275","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71259","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71305","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71311","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71289","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71342","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71348","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71352","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71338","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71374","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71409","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4324"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4324","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4324"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.debian.org/security/2016/dsa-3608","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3608"},{"reference_url":"http://www.libreoffice.org/about-us/security/advisories/cve-2016-4324/","reference_id":"","reference_type":"","scores":[],"url":"http://www.libreoffice.org/about-us/security/advisories/cve-2016-4324/"},{"reference_url":"http://www.securityfocus.com/bid/91499","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/91499"},{"reference_url":"http://www.securitytracker.com/id/1036209","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036209"},{"reference_url":"http://www.talosintelligence.com/reports/TALOS-2016-0126/","reference_id":"","reference_type":"","scores":[],"url":"http://www.talosintelligence.com/reports/TALOS-2016-0126/"},{"reference_url":"http://www.ubuntu.com/usn/USN-3022-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3022-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351197","reference_id":"1351197","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1351197"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4324","reference_id":"CVE-2016-4324","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4324"},{"reference_url":"https://security.gentoo.org/glsa/201611-03","reference_id":"GLSA-201611-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201611-03"},{"reference_url":"https://usn.ubuntu.com/3022-1/","reference_id":"USN-3022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3022-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035787?format=json","purl":"pkg:deb/debian/libreoffice@1:4.3.3-2%2Bdeb8u7~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.3.3-2%252Bdeb8u7~bpo70%252B1"},{"url":"http://public2.vulnerablecode.io/api/packages/1037006?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u4~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u4~bpo8%252B1"}],"aliases":["CVE-2016-4324"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k3cz-81fc-sbg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61541?format=json","vulnerability_id":"VCID-k6mn-jky6-wqg2","summary":"Multiple vulnerabilities have been found in LibreOffice, the worst of which could result in user-assisted code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12425.json","reference_id":"","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12425.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-12425","reference_id":"","reference_type":"","scores":[{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59263","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.5915","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59129","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59148","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59134","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59092","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59141","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59198","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59154","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59181","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59252","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61141","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61187","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.6116","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61181","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61095","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61123","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61089","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61137","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61153","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-12425"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12425"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336110","reference_id":"2336110","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336110"},{"reference_url":"https://www.libreoffice.org/about-us/security/advisories/cve-2024-12425","reference_id":"cve-2024-12425","reference_type":"","scores":[{"value":"2.4","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:16:49Z/"}],"url":"https://www.libreoffice.org/about-us/security/advisories/cve-2024-12425"},{"reference_url":"https://security.gentoo.org/glsa/202506-03","reference_id":"GLSA-202506-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-03"},{"reference_url":"https://usn.ubuntu.com/7228-1/","reference_id":"USN-7228-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7228-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052323?format=json","purl":"pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:7.4.7-1%252Bdeb12u10"}],"aliases":["CVE-2024-12425"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k6mn-jky6-wqg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70887?format=json","vulnerability_id":"VCID-kx13-c2d7-nke3","summary":"libreoffice: Macro URL arbitrary script execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1080.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-1080.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1080","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21383","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2133","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21437","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21189","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2134","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3038","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30278","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30301","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30369","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30831","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30803","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30835","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30815","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30779","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30613","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30497","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30414","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30274","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30345","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30353","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-1080"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1080","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1080"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2349906","reference_id":"2349906","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2349906"},{"reference_url":"https://www.libreoffice.org/about-us/security/advisories/cve-2025-1080","reference_id":"cve-2025-1080","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:L/VA:H/SC:H/SI:H/SA:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-04T20:34:55Z/"}],"url":"https://www.libreoffice.org/about-us/security/advisories/cve-2025-1080"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:2868","reference_id":"RHSA-2025:2868","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:2868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3169","reference_id":"RHSA-2025:3169","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3169"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3265","reference_id":"RHSA-2025:3265","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3265"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3267","reference_id":"RHSA-2025:3267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3269","reference_id":"RHSA-2025:3269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3390","reference_id":"RHSA-2025:3390","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3390"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3408","reference_id":"RHSA-2025:3408","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3408"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3548","reference_id":"RHSA-2025:3548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3549","reference_id":"RHSA-2025:3549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3550","reference_id":"RHSA-2025:3550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3550"},{"reference_url":"https://usn.ubuntu.com/7337-1/","reference_id":"USN-7337-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7337-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052323?format=json","purl":"pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:7.4.7-1%252Bdeb12u10"}],"aliases":["CVE-2025-1080"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kx13-c2d7-nke3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74457?format=json","vulnerability_id":"VCID-ma9t-qst9-xbcm","summary":"libreoffice: Ability to trust not validated macro signatures removed in high security mode","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6472.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6472.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-6472","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22371","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22249","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22271","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22353","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22545","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22588","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22377","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22458","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22513","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22532","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2249","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22435","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22451","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22448","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22397","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22245","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22231","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22225","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22122","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22202","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22281","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-6472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6472"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302866","reference_id":"2302866","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302866"},{"reference_url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2024-6472","reference_id":"CVE-2024-6472","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-05T14:28:03Z/"}],"url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2024-6472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5583","reference_id":"RHSA-2024:5583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5584","reference_id":"RHSA-2024:5584","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5584"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5598","reference_id":"RHSA-2024:5598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5599","reference_id":"RHSA-2024:5599","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5599"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5601","reference_id":"RHSA-2024:5601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5607","reference_id":"RHSA-2024:5607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5608","reference_id":"RHSA-2024:5608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5886","reference_id":"RHSA-2024:5886","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5886"},{"reference_url":"https://usn.ubuntu.com/6962-1/","reference_id":"USN-6962-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6962-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2024-6472"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ma9t-qst9-xbcm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50389?format=json","vulnerability_id":"VCID-mfqa-v61r-gqcb","summary":"Multiple vulnerabilities have been found in LibreOffice, the worst\n    of which allows for the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7870.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7870.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7870","reference_id":"","reference_type":"","scores":[{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80039","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80278","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80221","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80217","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80233","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80275","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80047","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80068","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80057","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80085","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80093","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80112","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80096","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80088","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80117","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80118","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80147","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80154","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.8017","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80184","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01349","scoring_system":"epss","scoring_elements":"0.80205","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-7870"},{"reference_url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=372","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7870","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7870"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/LibreOffice/core/commit/62a97e6a561ce65e88d4c537a1b82c336f012722","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/LibreOffice/core/commit/62a97e6a561ce65e88d4c537a1b82c336f012722"},{"reference_url":"http://www.debian.org/security/2017/dsa-3837","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3837"},{"reference_url":"http://www.libreoffice.org/about-us/security/advisories/cve-2017-7870/","reference_id":"","reference_type":"","scores":[],"url":"http://www.libreoffice.org/about-us/security/advisories/cve-2017-7870/"},{"reference_url":"http://www.securityfocus.com/bid/97671","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/97671"},{"reference_url":"http://www.securitytracker.com/id/1039029","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039029"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1444061","reference_id":"1444061","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1444061"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:*:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7870","reference_id":"CVE-2017-7870","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7870"},{"reference_url":"https://security.gentoo.org/glsa/201706-28","reference_id":"GLSA-201706-28","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-28"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1975","reference_id":"RHSA-2017:1975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1975"},{"reference_url":"https://usn.ubuntu.com/3273-1/","reference_id":"USN-3273-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3273-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035788?format=json","purl":"pkg:deb/debian/libreoffice@1:4.3.3-2%2Bdeb8u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.3.3-2%252Bdeb8u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037006?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u4~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u4~bpo8%252B1"}],"aliases":["CVE-2017-7870"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mfqa-v61r-gqcb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79180?format=json","vulnerability_id":"VCID-n34y-vynb-qbae","summary":"libreoffice: Weak Master Keys","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26307.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26307.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26307","reference_id":"","reference_type":"","scores":[{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.5284","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52728","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52754","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52829","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52718","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52745","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.5271","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52761","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52756","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52807","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52791","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52774","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52811","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52819","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52802","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52751","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52722","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52666","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52762","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26307"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26307","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26307"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2118610","reference_id":"2118610","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2118610"},{"reference_url":"https://security.archlinux.org/AVG-2783","reference_id":"AVG-2783","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2783"},{"reference_url":"https://security.archlinux.org/AVG-2784","reference_id":"AVG-2784","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2784"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0089","reference_id":"RHSA-2023:0089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0089"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0304","reference_id":"RHSA-2023:0304","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0304"},{"reference_url":"https://usn.ubuntu.com/5661-1/","reference_id":"USN-5661-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5661-1/"},{"reference_url":"https://usn.ubuntu.com/5694-1/","reference_id":"USN-5694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5694-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2022-26307"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n34y-vynb-qbae"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79726?format=json","vulnerability_id":"VCID-pc43-5jvh-fbe2","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9852.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9852.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9852","reference_id":"","reference_type":"","scores":[{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28954","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2903","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2908","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28889","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28957","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.29003","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28959","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28909","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28933","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28863","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28744","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28633","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28563","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28405","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28462","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28484","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28406","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28427","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28501","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28518","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9853","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9853"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1744868","reference_id":"1744868","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1744868"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1151","reference_id":"RHSA-2020:1151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1598","reference_id":"RHSA-2020:1598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1598"},{"reference_url":"https://usn.ubuntu.com/4102-1/","reference_id":"USN-4102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037007?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037966?format=json","purl":"pkg:deb/debian/libreoffice@1:6.1.5-3%2Bdeb10u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:6.1.5-3%252Bdeb10u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2019-9852"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pc43-5jvh-fbe2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56785?format=json","vulnerability_id":"VCID-pkz4-5wxb-5qdc","summary":"Multiple vulnerabilities have been found in LibreOffice, the worst\n    of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9849.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9849.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9849","reference_id":"","reference_type":"","scores":[{"value":"0.03491","scoring_system":"epss","scoring_elements":"0.87726","published_at":"2026-05-15T12:55:00Z"},{"value":"0.03491","scoring_system":"epss","scoring_elements":"0.87641","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03491","scoring_system":"epss","scoring_elements":"0.87657","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03491","scoring_system":"epss","scoring_elements":"0.87676","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03491","scoring_system":"epss","scoring_elements":"0.87672","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03491","scoring_system":"epss","scoring_elements":"0.87685","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03491","scoring_system":"epss","scoring_elements":"0.87718","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03556","scoring_system":"epss","scoring_elements":"0.87669","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03556","scoring_system":"epss","scoring_elements":"0.87696","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03556","scoring_system":"epss","scoring_elements":"0.87707","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03556","scoring_system":"epss","scoring_elements":"0.87701","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03556","scoring_system":"epss","scoring_elements":"0.87698","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03556","scoring_system":"epss","scoring_elements":"0.87713","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03556","scoring_system":"epss","scoring_elements":"0.8771","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03556","scoring_system":"epss","scoring_elements":"0.87728","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03556","scoring_system":"epss","scoring_elements":"0.87733","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03556","scoring_system":"epss","scoring_elements":"0.87732","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03556","scoring_system":"epss","scoring_elements":"0.87645","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03556","scoring_system":"epss","scoring_elements":"0.87655","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03556","scoring_system":"epss","scoring_elements":"0.87668","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03556","scoring_system":"epss","scoring_elements":"0.8769","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9849"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9848","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9848"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9849","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9849"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1737421","reference_id":"1737421","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1737421"},{"reference_url":"https://security.archlinux.org/ASA-201908-9","reference_id":"ASA-201908-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201908-9"},{"reference_url":"https://security.archlinux.org/AVG-1009","reference_id":"AVG-1009","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1009"},{"reference_url":"https://security.archlinux.org/AVG-1010","reference_id":"AVG-1010","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1010"},{"reference_url":"https://security.gentoo.org/glsa/201908-13","reference_id":"GLSA-201908-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201908-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1151","reference_id":"RHSA-2020:1151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1598","reference_id":"RHSA-2020:1598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1598"},{"reference_url":"https://usn.ubuntu.com/4063-1/","reference_id":"USN-4063-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4063-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037007?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037966?format=json","purl":"pkg:deb/debian/libreoffice@1:6.1.5-3%2Bdeb10u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:6.1.5-3%252Bdeb10u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2019-9849"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pkz4-5wxb-5qdc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74700?format=json","vulnerability_id":"VCID-qt46-94xf-eyaz","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00059.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00059.html"},{"reference_url":"http://packetstormsecurity.com/files/152560/LibreOffice-Macro-Code-Execution.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/152560/LibreOffice-Macro-Code-Execution.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16858.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16858.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16858","reference_id":"","reference_type":"","scores":[{"value":"0.92343","scoring_system":"epss","scoring_elements":"0.99722","published_at":"2026-04-02T12:55:00Z"},{"value":"0.92343","scoring_system":"epss","scoring_elements":"0.99734","published_at":"2026-05-15T12:55:00Z"},{"value":"0.92343","scoring_system":"epss","scoring_elements":"0.99729","published_at":"2026-04-24T12:55:00Z"},{"value":"0.92343","scoring_system":"epss","scoring_elements":"0.9973","published_at":"2026-04-26T12:55:00Z"},{"value":"0.92343","scoring_system":"epss","scoring_elements":"0.99731","published_at":"2026-04-29T12:55:00Z"},{"value":"0.92343","scoring_system":"epss","scoring_elements":"0.99732","published_at":"2026-05-07T12:55:00Z"},{"value":"0.92343","scoring_system":"epss","scoring_elements":"0.99733","published_at":"2026-05-14T12:55:00Z"},{"value":"0.92343","scoring_system":"epss","scoring_elements":"0.99723","published_at":"2026-04-04T12:55:00Z"},{"value":"0.92343","scoring_system":"epss","scoring_elements":"0.99724","published_at":"2026-04-13T12:55:00Z"},{"value":"0.92343","scoring_system":"epss","scoring_elements":"0.99725","published_at":"2026-04-16T12:55:00Z"},{"value":"0.92343","scoring_system":"epss","scoring_elements":"0.99726","published_at":"2026-04-18T12:55:00Z"},{"value":"0.92343","scoring_system":"epss","scoring_elements":"0.99728","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16858"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16858","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16858"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://seclists.org/bugtraq/2019/Aug/28","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Aug/28"},{"reference_url":"https://www.exploit-db.com/exploits/46727/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/46727/"},{"reference_url":"https://www.libreoffice.org/about-us/security/advisories/cve-2018-16858/","reference_id":"","reference_type":"","scores":[],"url":"https://www.libreoffice.org/about-us/security/advisories/cve-2018-16858/"},{"reference_url":"http://www.rapid7.com/db/modules/exploit/multi/fileformat/libreoffice_macro_exec","reference_id":"","reference_type":"","scores":[],"url":"http://www.rapid7.com/db/modules/exploit/multi/fileformat/libreoffice_macro_exec"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1649841","reference_id":"1649841","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1649841"},{"reference_url":"https://security.archlinux.org/AVG-883","reference_id":"AVG-883","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-883"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/46727.rb","reference_id":"CVE-2018-16858","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/local/46727.rb"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16858","reference_id":"CVE-2018-16858","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16858"},{"reference_url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/fileformat/libreoffice_macro_exec.rb","reference_id":"CVE-2018-16858","reference_type":"exploit","scores":[],"url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/fileformat/libreoffice_macro_exec.rb"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2130","reference_id":"RHSA-2019:2130","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2130"},{"reference_url":"https://usn.ubuntu.com/3883-1/","reference_id":"USN-3883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3883-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037007?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037966?format=json","purl":"pkg:deb/debian/libreoffice@1:6.1.5-3%2Bdeb10u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:6.1.5-3%252Bdeb10u7"}],"aliases":["CVE-2018-16858"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qt46-94xf-eyaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86604?format=json","vulnerability_id":"VCID-r8k2-18at-6ygp","summary":"libreoffice: NULL pointer dereference when parsing certain DOCM documents","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4156.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4156.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4156","reference_id":"","reference_type":"","scores":[{"value":"0.01221","scoring_system":"epss","scoring_elements":"0.79039","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01221","scoring_system":"epss","scoring_elements":"0.79046","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01221","scoring_system":"epss","scoring_elements":"0.79072","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01221","scoring_system":"epss","scoring_elements":"0.79057","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01221","scoring_system":"epss","scoring_elements":"0.79081","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01221","scoring_system":"epss","scoring_elements":"0.79089","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01221","scoring_system":"epss","scoring_elements":"0.79113","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01221","scoring_system":"epss","scoring_elements":"0.79099","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01221","scoring_system":"epss","scoring_elements":"0.79117","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01221","scoring_system":"epss","scoring_elements":"0.79115","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01221","scoring_system":"epss","scoring_elements":"0.79146","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01221","scoring_system":"epss","scoring_elements":"0.79153","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01221","scoring_system":"epss","scoring_elements":"0.79169","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01221","scoring_system":"epss","scoring_elements":"0.79181","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01221","scoring_system":"epss","scoring_elements":"0.79202","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01221","scoring_system":"epss","scoring_elements":"0.79219","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01221","scoring_system":"epss","scoring_elements":"0.79218","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01221","scoring_system":"epss","scoring_elements":"0.79236","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01221","scoring_system":"epss","scoring_elements":"0.79274","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01221","scoring_system":"epss","scoring_elements":"0.79285","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4156"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=988832","reference_id":"988832","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=988832"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035782?format=json","purl":"pkg:deb/debian/libreoffice@1:4.2.5-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-15h8-ucrr-kqbb"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-2p1p-4t4u-kyd8"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5j4w-jaa8-7kae"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-drkj-da54-jfgd"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-xr5b-gdek-kqgy"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.2.5-1~bpo70%252B1"}],"aliases":["CVE-2013-4156"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r8k2-18at-6ygp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80005?format=json","vulnerability_id":"VCID-re5e-qp85-ybdd","summary":"libreoffice: Content Manipulation with Double Certificate Attack","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25633.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25633.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-25633","reference_id":"","reference_type":"","scores":[{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67065","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67126","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.671","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.6715","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67163","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67182","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67168","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67137","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67171","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67185","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67165","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67186","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67198","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67166","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67207","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67245","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67218","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67242","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67304","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67316","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-25633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25633","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25633"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25634","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25634"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2013135","reference_id":"2013135","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2013135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1766","reference_id":"RHSA-2022:1766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1766"},{"reference_url":"https://usn.ubuntu.com/5153-1/","reference_id":"USN-5153-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5153-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2021-25633"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-re5e-qp85-ybdd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79725?format=json","vulnerability_id":"VCID-sega-433y-v7bb","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9851.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9851.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9851","reference_id":"","reference_type":"","scores":[{"value":"0.85784","scoring_system":"epss","scoring_elements":"0.99375","published_at":"2026-04-01T12:55:00Z"},{"value":"0.85784","scoring_system":"epss","scoring_elements":"0.99376","published_at":"2026-04-02T12:55:00Z"},{"value":"0.85784","scoring_system":"epss","scoring_elements":"0.99377","published_at":"2026-04-04T12:55:00Z"},{"value":"0.85784","scoring_system":"epss","scoring_elements":"0.99379","published_at":"2026-04-07T12:55:00Z"},{"value":"0.85784","scoring_system":"epss","scoring_elements":"0.9938","published_at":"2026-04-08T12:55:00Z"},{"value":"0.85784","scoring_system":"epss","scoring_elements":"0.99381","published_at":"2026-04-09T12:55:00Z"},{"value":"0.85784","scoring_system":"epss","scoring_elements":"0.99382","published_at":"2026-04-13T12:55:00Z"},{"value":"0.85784","scoring_system":"epss","scoring_elements":"0.99384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.85784","scoring_system":"epss","scoring_elements":"0.99383","published_at":"2026-04-21T12:55:00Z"},{"value":"0.85784","scoring_system":"epss","scoring_elements":"0.99385","published_at":"2026-04-29T12:55:00Z"},{"value":"0.85784","scoring_system":"epss","scoring_elements":"0.99386","published_at":"2026-05-05T12:55:00Z"},{"value":"0.85784","scoring_system":"epss","scoring_elements":"0.99387","published_at":"2026-05-07T12:55:00Z"},{"value":"0.85784","scoring_system":"epss","scoring_elements":"0.99389","published_at":"2026-05-09T12:55:00Z"},{"value":"0.85784","scoring_system":"epss","scoring_elements":"0.9939","published_at":"2026-05-11T12:55:00Z"},{"value":"0.85784","scoring_system":"epss","scoring_elements":"0.99391","published_at":"2026-05-12T12:55:00Z"},{"value":"0.85784","scoring_system":"epss","scoring_elements":"0.99392","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9850","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9850"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9853","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9853"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1744866","reference_id":"1744866","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1744866"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/47298.rb","reference_id":"CVE-2019-9851","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/47298.rb"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1151","reference_id":"RHSA-2020:1151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1151"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1598","reference_id":"RHSA-2020:1598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1598"},{"reference_url":"https://usn.ubuntu.com/4102-1/","reference_id":"USN-4102-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4102-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037007?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037966?format=json","purl":"pkg:deb/debian/libreoffice@1:6.1.5-3%2Bdeb10u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:6.1.5-3%252Bdeb10u7"},{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2019-9851"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sega-433y-v7bb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73108?format=json","vulnerability_id":"VCID-sqwy-enu1-1uep","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10119.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10119.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10119","reference_id":"","reference_type":"","scores":[{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67704","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67737","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67757","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67788","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67802","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67826","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67812","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67778","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67814","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67827","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67809","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67828","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67838","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67843","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67818","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67861","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67901","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.6787","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67895","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67952","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67965","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-10119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10119","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10120","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10120"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1569836","reference_id":"1569836","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1569836"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3054","reference_id":"RHSA-2018:3054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3054"},{"reference_url":"https://usn.ubuntu.com/3883-1/","reference_id":"USN-3883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3883-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035788?format=json","purl":"pkg:deb/debian/libreoffice@1:4.3.3-2%2Bdeb8u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.3.3-2%252Bdeb8u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037007?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037966?format=json","purl":"pkg:deb/debian/libreoffice@1:6.1.5-3%2Bdeb10u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:6.1.5-3%252Bdeb10u7"}],"aliases":["CVE-2018-10119"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sqwy-enu1-1uep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47715?format=json","vulnerability_id":"VCID-txaq-r51k-k3gn","summary":"Multiple vulnerabilities have been found in both LibreOffice and\n    OpenOffice allowing remote attackers to execute arbitrary code or cause\n    Denial of Service.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2619.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2619.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5212.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5212.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5212","reference_id":"","reference_type":"","scores":[{"value":"0.43027","scoring_system":"epss","scoring_elements":"0.97531","published_at":"2026-05-15T12:55:00Z"},{"value":"0.43027","scoring_system":"epss","scoring_elements":"0.9753","published_at":"2026-05-14T12:55:00Z"},{"value":"0.49583","scoring_system":"epss","scoring_elements":"0.97786","published_at":"2026-04-04T12:55:00Z"},{"value":"0.49583","scoring_system":"epss","scoring_elements":"0.97789","published_at":"2026-04-07T12:55:00Z"},{"value":"0.49583","scoring_system":"epss","scoring_elements":"0.97793","published_at":"2026-04-08T12:55:00Z"},{"value":"0.49583","scoring_system":"epss","scoring_elements":"0.97796","published_at":"2026-04-09T12:55:00Z"},{"value":"0.49583","scoring_system":"epss","scoring_elements":"0.97798","published_at":"2026-04-11T12:55:00Z"},{"value":"0.49583","scoring_system":"epss","scoring_elements":"0.978","published_at":"2026-04-12T12:55:00Z"},{"value":"0.49583","scoring_system":"epss","scoring_elements":"0.97802","published_at":"2026-04-13T12:55:00Z"},{"value":"0.49583","scoring_system":"epss","scoring_elements":"0.97779","published_at":"2026-04-01T12:55:00Z"},{"value":"0.49583","scoring_system":"epss","scoring_elements":"0.9781","published_at":"2026-04-18T12:55:00Z"},{"value":"0.49583","scoring_system":"epss","scoring_elements":"0.97809","published_at":"2026-04-26T12:55:00Z"},{"value":"0.49583","scoring_system":"epss","scoring_elements":"0.97815","published_at":"2026-04-29T12:55:00Z"},{"value":"0.49583","scoring_system":"epss","scoring_elements":"0.9782","published_at":"2026-05-05T12:55:00Z"},{"value":"0.49583","scoring_system":"epss","scoring_elements":"0.97819","published_at":"2026-05-07T12:55:00Z"},{"value":"0.49583","scoring_system":"epss","scoring_elements":"0.97821","published_at":"2026-05-11T12:55:00Z"},{"value":"0.49583","scoring_system":"epss","scoring_elements":"0.97826","published_at":"2026-05-12T12:55:00Z"},{"value":"0.49583","scoring_system":"epss","scoring_elements":"0.97808","published_at":"2026-04-24T12:55:00Z"},{"value":"0.49583","scoring_system":"epss","scoring_elements":"0.97785","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5214"},{"reference_url":"http://www.debian.org/security/2015/dsa-3394","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3394"},{"reference_url":"http://www.libreoffice.org/about-us/security/advisories/cve-2015-5212/","reference_id":"","reference_type":"","scores":[],"url":"http://www.libreoffice.org/about-us/security/advisories/cve-2015-5212/"},{"reference_url":"http://www.openoffice.org/security/cves/CVE-2015-5212.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openoffice.org/security/cves/CVE-2015-5212.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/77486","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77486"},{"reference_url":"http://www.securitytracker.com/id/1034085","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034085"},{"reference_url":"http://www.securitytracker.com/id/1034091","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034091"},{"reference_url":"http://www.ubuntu.com/usn/USN-2793-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2793-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1278820","reference_id":"1278820","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1278820"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5212","reference_id":"CVE-2015-5212","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5212"},{"reference_url":"https://security.gentoo.org/glsa/201603-05","reference_id":"GLSA-201603-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-05"},{"reference_url":"https://security.gentoo.org/glsa/201611-03","reference_id":"GLSA-201611-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201611-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2619","reference_id":"RHSA-2015:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2619"},{"reference_url":"https://usn.ubuntu.com/2793-1/","reference_id":"USN-2793-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2793-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035786?format=json","purl":"pkg:deb/debian/libreoffice@1:4.3.3-2%2Bdeb8u3~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.3.3-2%252Bdeb8u3~bpo70%252B1"},{"url":"http://public2.vulnerablecode.io/api/packages/1037006?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u4~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u4~bpo8%252B1"}],"aliases":["CVE-2015-5212"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-txaq-r51k-k3gn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49796?format=json","vulnerability_id":"VCID-u1ry-xuyn-77fm","summary":"Multiple vulnerabilities have been discovered in LibreOffice, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0950.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0950.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0950","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19746","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19529","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19427","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19416","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19377","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19268","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19356","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19444","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19404","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19435","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19531","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19796","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1952","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.196","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19652","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19657","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19608","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19549","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19513","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19522","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19534","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-0950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2255"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2210186","reference_id":"2210186","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2210186"},{"reference_url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2023-0950","reference_id":"CVE-2023-0950","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:15Z/"}],"url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2023-0950"},{"reference_url":"https://www.debian.org/security/2023/dsa-5415","reference_id":"dsa-5415","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:15Z/"}],"url":"https://www.debian.org/security/2023/dsa-5415"},{"reference_url":"https://security.gentoo.org/glsa/202311-15","reference_id":"GLSA-202311-15","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:15Z/"}],"url":"https://security.gentoo.org/glsa/202311-15"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00014.html","reference_id":"msg00014.html","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:15Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00014.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6508","reference_id":"RHSA-2023:6508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6933","reference_id":"RHSA-2023:6933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6933"},{"reference_url":"https://usn.ubuntu.com/6144-1/","reference_id":"USN-6144-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6144-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2023-0950"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u1ry-xuyn-77fm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47719?format=json","vulnerability_id":"VCID-u2z4-zcay-uufy","summary":"Multiple vulnerabilities have been found in both LibreOffice and\n    OpenOffice allowing remote attackers to execute arbitrary code or cause\n    Denial of Service.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2619.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2619.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5214.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5214.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5214","reference_id":"","reference_type":"","scores":[{"value":"0.29516","scoring_system":"epss","scoring_elements":"0.96666","published_at":"2026-05-15T12:55:00Z"},{"value":"0.29516","scoring_system":"epss","scoring_elements":"0.96664","published_at":"2026-05-14T12:55:00Z"},{"value":"0.35608","scoring_system":"epss","scoring_elements":"0.97048","published_at":"2026-04-04T12:55:00Z"},{"value":"0.35608","scoring_system":"epss","scoring_elements":"0.97049","published_at":"2026-04-07T12:55:00Z"},{"value":"0.35608","scoring_system":"epss","scoring_elements":"0.97059","published_at":"2026-04-08T12:55:00Z"},{"value":"0.35608","scoring_system":"epss","scoring_elements":"0.9706","published_at":"2026-04-09T12:55:00Z"},{"value":"0.35608","scoring_system":"epss","scoring_elements":"0.97063","published_at":"2026-04-12T12:55:00Z"},{"value":"0.35608","scoring_system":"epss","scoring_elements":"0.97064","published_at":"2026-04-13T12:55:00Z"},{"value":"0.35608","scoring_system":"epss","scoring_elements":"0.97074","published_at":"2026-04-16T12:55:00Z"},{"value":"0.35608","scoring_system":"epss","scoring_elements":"0.97078","published_at":"2026-04-18T12:55:00Z"},{"value":"0.35608","scoring_system":"epss","scoring_elements":"0.97037","published_at":"2026-04-01T12:55:00Z"},{"value":"0.35608","scoring_system":"epss","scoring_elements":"0.97083","published_at":"2026-04-24T12:55:00Z"},{"value":"0.35608","scoring_system":"epss","scoring_elements":"0.97085","published_at":"2026-04-26T12:55:00Z"},{"value":"0.35608","scoring_system":"epss","scoring_elements":"0.97086","published_at":"2026-04-29T12:55:00Z"},{"value":"0.35608","scoring_system":"epss","scoring_elements":"0.97089","published_at":"2026-05-05T12:55:00Z"},{"value":"0.35608","scoring_system":"epss","scoring_elements":"0.97092","published_at":"2026-05-07T12:55:00Z"},{"value":"0.35608","scoring_system":"epss","scoring_elements":"0.97098","published_at":"2026-05-09T12:55:00Z"},{"value":"0.35608","scoring_system":"epss","scoring_elements":"0.97102","published_at":"2026-05-11T12:55:00Z"},{"value":"0.35608","scoring_system":"epss","scoring_elements":"0.97108","published_at":"2026-05-12T12:55:00Z"},{"value":"0.35608","scoring_system":"epss","scoring_elements":"0.97082","published_at":"2026-04-21T12:55:00Z"},{"value":"0.35608","scoring_system":"epss","scoring_elements":"0.97044","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5214"},{"reference_url":"http://www.debian.org/security/2015/dsa-3394","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3394"},{"reference_url":"http://www.libreoffice.org/about-us/security/advisories/cve-2015-5214/","reference_id":"","reference_type":"","scores":[],"url":"http://www.libreoffice.org/about-us/security/advisories/cve-2015-5214/"},{"reference_url":"http://www.openoffice.org/security/cves/CVE-2015-5214.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openoffice.org/security/cves/CVE-2015-5214.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/77486","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77486"},{"reference_url":"http://www.securitytracker.com/id/1034086","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034086"},{"reference_url":"http://www.securitytracker.com/id/1034091","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034091"},{"reference_url":"http://www.ubuntu.com/usn/USN-2793-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2793-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1278827","reference_id":"1278827","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1278827"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5214","reference_id":"CVE-2015-5214","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5214"},{"reference_url":"https://security.gentoo.org/glsa/201603-05","reference_id":"GLSA-201603-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-05"},{"reference_url":"https://security.gentoo.org/glsa/201611-03","reference_id":"GLSA-201611-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201611-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2619","reference_id":"RHSA-2015:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2619"},{"reference_url":"https://usn.ubuntu.com/2793-1/","reference_id":"USN-2793-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2793-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035786?format=json","purl":"pkg:deb/debian/libreoffice@1:4.3.3-2%2Bdeb8u3~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.3.3-2%252Bdeb8u3~bpo70%252B1"},{"url":"http://public2.vulnerablecode.io/api/packages/1037006?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u4~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u4~bpo8%252B1"}],"aliases":["CVE-2015-5214"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u2z4-zcay-uufy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73926?format=json","vulnerability_id":"VCID-u6wr-a1wv-byax","summary":"libreoffice: improper digital signature invalidation vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7788.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7788.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7788","reference_id":"","reference_type":"","scores":[{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19171","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.18967","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19066","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1903","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19387","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19439","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19155","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19234","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19287","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19292","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19245","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19191","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1915","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1916","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19169","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1906","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1905","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19005","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.18885","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7788"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2312865","reference_id":"2312865","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2312865"},{"reference_url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2024-7788","reference_id":"CVE-2024-7788","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-17T15:52:01Z/"}],"url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2024-7788"},{"reference_url":"https://usn.ubuntu.com/7025-1/","reference_id":"USN-7025-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7025-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052323?format=json","purl":"pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:7.4.7-1%252Bdeb12u10"}],"aliases":["CVE-2024-7788"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u6wr-a1wv-byax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48034?format=json","vulnerability_id":"VCID-us6f-vsb9-83ck","summary":"A vulnerability in LibreOffice might allow remote attackers to read\n    arbitrary files.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6871.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6871.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6871","reference_id":"","reference_type":"","scores":[{"value":"0.30055","scoring_system":"epss","scoring_elements":"0.96713","published_at":"2026-05-15T12:55:00Z"},{"value":"0.30055","scoring_system":"epss","scoring_elements":"0.96694","published_at":"2026-05-09T12:55:00Z"},{"value":"0.30055","scoring_system":"epss","scoring_elements":"0.96699","published_at":"2026-05-11T12:55:00Z"},{"value":"0.30055","scoring_system":"epss","scoring_elements":"0.96703","published_at":"2026-05-12T12:55:00Z"},{"value":"0.30055","scoring_system":"epss","scoring_elements":"0.96711","published_at":"2026-05-14T12:55:00Z"},{"value":"0.30055","scoring_system":"epss","scoring_elements":"0.96645","published_at":"2026-04-07T12:55:00Z"},{"value":"0.30055","scoring_system":"epss","scoring_elements":"0.96652","published_at":"2026-04-08T12:55:00Z"},{"value":"0.30055","scoring_system":"epss","scoring_elements":"0.96654","published_at":"2026-04-09T12:55:00Z"},{"value":"0.30055","scoring_system":"epss","scoring_elements":"0.96656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.30055","scoring_system":"epss","scoring_elements":"0.96657","published_at":"2026-04-12T12:55:00Z"},{"value":"0.30055","scoring_system":"epss","scoring_elements":"0.96659","published_at":"2026-04-13T12:55:00Z"},{"value":"0.30055","scoring_system":"epss","scoring_elements":"0.96666","published_at":"2026-04-16T12:55:00Z"},{"value":"0.30055","scoring_system":"epss","scoring_elements":"0.9667","published_at":"2026-04-18T12:55:00Z"},{"value":"0.30055","scoring_system":"epss","scoring_elements":"0.96675","published_at":"2026-04-26T12:55:00Z"},{"value":"0.30055","scoring_system":"epss","scoring_elements":"0.96673","published_at":"2026-04-24T12:55:00Z"},{"value":"0.30055","scoring_system":"epss","scoring_elements":"0.96676","published_at":"2026-04-29T12:55:00Z"},{"value":"0.30055","scoring_system":"epss","scoring_elements":"0.96685","published_at":"2026-05-05T12:55:00Z"},{"value":"0.30055","scoring_system":"epss","scoring_elements":"0.96688","published_at":"2026-05-07T12:55:00Z"},{"value":"0.4268","scoring_system":"epss","scoring_elements":"0.97454","published_at":"2026-04-02T12:55:00Z"},{"value":"0.4268","scoring_system":"epss","scoring_elements":"0.97458","published_at":"2026-04-04T12:55:00Z"},{"value":"0.4268","scoring_system":"epss","scoring_elements":"0.97447","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6871"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1543120","reference_id":"1543120","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1543120"},{"reference_url":"https://github.com/jollheef/libreoffice-remote-arbitrary-file-disclosure/tree/7eb75ff6662e50783824df97c34f6c7f58e71ce5","reference_id":"CVE-2018-6871","reference_type":"exploit","scores":[],"url":"https://github.com/jollheef/libreoffice-remote-arbitrary-file-disclosure/tree/7eb75ff6662e50783824df97c34f6c7f58e71ce5"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/44022.md","reference_id":"CVE-2018-6871","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/44022.md"},{"reference_url":"https://security.gentoo.org/glsa/201802-06","reference_id":"GLSA-201802-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201802-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0418","reference_id":"RHSA-2018:0418","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0418"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0517","reference_id":"RHSA-2018:0517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0517"},{"reference_url":"https://usn.ubuntu.com/3579-1/","reference_id":"USN-3579-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3579-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035788?format=json","purl":"pkg:deb/debian/libreoffice@1:4.3.3-2%2Bdeb8u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.3.3-2%252Bdeb8u11"},{"url":"http://public2.vulnerablecode.io/api/packages/1037006?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u4~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u4~bpo8%252B1"},{"url":"http://public2.vulnerablecode.io/api/packages/1037966?format=json","purl":"pkg:deb/debian/libreoffice@1:6.1.5-3%2Bdeb10u7","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:6.1.5-3%252Bdeb10u7"}],"aliases":["CVE-2018-6871"],"risk_score":8.4,"exploitability":"2.0","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-us6f-vsb9-83ck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61542?format=json","vulnerability_id":"VCID-w6ze-2zem-p3ev","summary":"Multiple vulnerabilities have been found in LibreOffice, the worst of which could result in user-assisted code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12426.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12426.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-12426","reference_id":"","reference_type":"","scores":[{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.65031","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.6488","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64897","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.6491","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64906","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64886","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64933","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64975","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64944","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64965","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.65021","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66712","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66708","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66678","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66725","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66637","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66663","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.66701","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00516","scoring_system":"epss","scoring_elements":"0.6672","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-12426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12426"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336117","reference_id":"2336117","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336117"},{"reference_url":"https://www.libreoffice.org/about-us/security/advisories/cve-2024-12426","reference_id":"cve-2024-12426","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-07T14:38:29Z/"}],"url":"https://www.libreoffice.org/about-us/security/advisories/cve-2024-12426"},{"reference_url":"https://security.gentoo.org/glsa/202506-03","reference_id":"GLSA-202506-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202506-03"},{"reference_url":"https://usn.ubuntu.com/7228-1/","reference_id":"USN-7228-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7228-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052323?format=json","purl":"pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:7.4.7-1%252Bdeb12u10"}],"aliases":["CVE-2024-12426"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w6ze-2zem-p3ev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62577?format=json","vulnerability_id":"VCID-xe1u-3snm-bka7","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00110.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00110.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-07/msg00050.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-07/msg00050.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2579.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2579.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0795.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0795.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0795","reference_id":"","reference_type":"","scores":[{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.68044","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.68031","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67787","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67821","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67841","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67871","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67885","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67908","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67895","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67859","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67889","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67918","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67923","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67897","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.6794","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67981","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67949","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00547","scoring_system":"epss","scoring_elements":"0.67974","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0794","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0794"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0795"},{"reference_url":"https://www.libreoffice.org/about-us/security/advisories/cve-2016-0795/","reference_id":"","reference_type":"","scores":[],"url":"https://www.libreoffice.org/about-us/security/advisories/cve-2016-0795/"},{"reference_url":"https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1223","reference_id":"","reference_type":"","scores":[],"url":"https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1223"},{"reference_url":"http://www.debian.org/security/2016/dsa-3482","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3482"},{"reference_url":"http://www.securitytracker.com/id/1035022","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035022"},{"reference_url":"http://www.ubuntu.com/usn/USN-2899-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2899-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306609","reference_id":"1306609","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306609"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0795","reference_id":"CVE-2016-0795","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0795"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2579","reference_id":"RHSA-2016:2579","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2579"},{"reference_url":"https://usn.ubuntu.com/2899-1/","reference_id":"USN-2899-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2899-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035787?format=json","purl":"pkg:deb/debian/libreoffice@1:4.3.3-2%2Bdeb8u7~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.3.3-2%252Bdeb8u7~bpo70%252B1"},{"url":"http://public2.vulnerablecode.io/api/packages/1037006?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u4~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u4~bpo8%252B1"}],"aliases":["CVE-2016-0795"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xe1u-3snm-bka7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70164?format=json","vulnerability_id":"VCID-xkby-5yru-97gd","summary":"LibreOffice: PDF signature forgery with adbe.pkcs7.sha1 SubFilter","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-2866.json","reference_id":"","reference_type":"","scores":[{"value":"2.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-2866.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-2866","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25835","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25594","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25546","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25468","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25564","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25878","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25648","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25719","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25767","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25737","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25679","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25681","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25665","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25641","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25589","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2558","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25531","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25418","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25485","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-2866"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2866","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2866"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2362574","reference_id":"2362574","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2362574"},{"reference_url":"https://www.libreoffice.org/about-us/security/advisories/cve-2025-2866","reference_id":"cve-2025-2866","reference_type":"","scores":[{"value":"2.4","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-28T13:41:33Z/"}],"url":"https://www.libreoffice.org/about-us/security/advisories/cve-2025-2866"},{"reference_url":"https://usn.ubuntu.com/7504-1/","reference_id":"USN-7504-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7504-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1052323?format=json","purl":"pkg:deb/debian/libreoffice@4:7.4.7-1%2Bdeb12u10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@4:7.4.7-1%252Bdeb12u10"}],"aliases":["CVE-2025-2866"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xkby-5yru-97gd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94761?format=json","vulnerability_id":"VCID-xr5b-gdek-kqgy","summary":"Apache OpenOffice opens dBase/DBF documents and shows the contents as spreadsheets. DBF are database files with data organized in fields. When reading DBF data the size of certain fields is not checked: the data is just copied into local variables. A carefully crafted document could overflow the allocated space, leading to the execution of arbitrary code by altering the contents of the program stack. This issue affects Apache OpenOffice up to and including version 4.1.10","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33035","reference_id":"","reference_type":"","scores":[{"value":"0.04607","scoring_system":"epss","scoring_elements":"0.89326","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04607","scoring_system":"epss","scoring_elements":"0.89356","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04607","scoring_system":"epss","scoring_elements":"0.89366","published_at":"2026-05-15T12:55:00Z"},{"value":"0.04607","scoring_system":"epss","scoring_elements":"0.89328","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04607","scoring_system":"epss","scoring_elements":"0.89336","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06007","scoring_system":"epss","scoring_elements":"0.90758","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06007","scoring_system":"epss","scoring_elements":"0.90739","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06238","scoring_system":"epss","scoring_elements":"0.90896","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06238","scoring_system":"epss","scoring_elements":"0.9092","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06238","scoring_system":"epss","scoring_elements":"0.90918","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06238","scoring_system":"epss","scoring_elements":"0.90843","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06238","scoring_system":"epss","scoring_elements":"0.9093","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06238","scoring_system":"epss","scoring_elements":"0.90928","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06238","scoring_system":"epss","scoring_elements":"0.90932","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06238","scoring_system":"epss","scoring_elements":"0.90849","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06238","scoring_system":"epss","scoring_elements":"0.90859","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06238","scoring_system":"epss","scoring_elements":"0.9087","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06238","scoring_system":"epss","scoring_elements":"0.90881","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06238","scoring_system":"epss","scoring_elements":"0.90888","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06238","scoring_system":"epss","scoring_elements":"0.90897","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33035"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33035","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33035"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035784?format=json","purl":"pkg:deb/debian/libreoffice@1:4.3.2-1~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-15h8-ucrr-kqbb"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-2p1p-4t4u-kyd8"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-drkj-da54-jfgd"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.3.2-1~bpo70%252B1"}],"aliases":["CVE-2021-33035"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xr5b-gdek-kqgy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81205?format=json","vulnerability_id":"VCID-y2ja-v9xa-k7af","summary":"libreoffice: forms allowed to be submitted to any URI could result in local file overwrite","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12803.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-12803.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12803","reference_id":"","reference_type":"","scores":[{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.63957","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64214","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64154","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64206","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64015","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64043","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64003","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64054","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64071","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64083","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64069","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64039","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64074","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64085","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64072","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64092","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64105","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64102","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64113","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64159","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64127","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-12803"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12803","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12803"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1848346","reference_id":"1848346","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1848346"},{"reference_url":"https://security.archlinux.org/AVG-1184","reference_id":"AVG-1184","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1184"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4628","reference_id":"RHSA-2020:4628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4628"},{"reference_url":"https://usn.ubuntu.com/5694-1/","reference_id":"USN-5694-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5694-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2020-12803"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y2ja-v9xa-k7af"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62576?format=json","vulnerability_id":"VCID-yfrn-ay4p-t7cp","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00110.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00110.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-07/msg00050.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-07/msg00050.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2579.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2579.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0794.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0794.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0794","reference_id":"","reference_type":"","scores":[{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65911","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65845","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.659","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65646","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65695","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65725","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.6569","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65742","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65753","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65775","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.6576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65731","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65765","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65779","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65778","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65789","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65788","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65763","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65812","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65856","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00494","scoring_system":"epss","scoring_elements":"0.65826","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-0794"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0794","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0794"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0795"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.libreoffice.org/about-us/security/advisories/cve-2016-0794/","reference_id":"","reference_type":"","scores":[],"url":"https://www.libreoffice.org/about-us/security/advisories/cve-2016-0794/"},{"reference_url":"https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1220","reference_id":"","reference_type":"","scores":[],"url":"https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1220"},{"reference_url":"https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1221","reference_id":"","reference_type":"","scores":[],"url":"https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1221"},{"reference_url":"https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1222","reference_id":"","reference_type":"","scores":[],"url":"https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1222"},{"reference_url":"http://www.debian.org/security/2016/dsa-3482","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3482"},{"reference_url":"http://www.securitytracker.com/id/1035022","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035022"},{"reference_url":"http://www.ubuntu.com/usn/USN-2899-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2899-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306609","reference_id":"1306609","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306609"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0794","reference_id":"CVE-2016-0794","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-0794"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2579","reference_id":"RHSA-2016:2579","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2579"},{"reference_url":"https://usn.ubuntu.com/2899-1/","reference_id":"USN-2899-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2899-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035787?format=json","purl":"pkg:deb/debian/libreoffice@1:4.3.3-2%2Bdeb8u7~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.3.3-2%252Bdeb8u7~bpo70%252B1"},{"url":"http://public2.vulnerablecode.io/api/packages/1037006?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u4~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u4~bpo8%252B1"}],"aliases":["CVE-2016-0794"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yfrn-ay4p-t7cp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47717?format=json","vulnerability_id":"VCID-yg74-q3xa-tkcx","summary":"Multiple vulnerabilities have been found in both LibreOffice and\n    OpenOffice allowing remote attackers to execute arbitrary code or cause\n    Denial of Service.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2619.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2619.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5213.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5213.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5213","reference_id":"","reference_type":"","scores":[{"value":"0.14165","scoring_system":"epss","scoring_elements":"0.94447","published_at":"2026-05-15T12:55:00Z"},{"value":"0.14165","scoring_system":"epss","scoring_elements":"0.94443","published_at":"2026-05-14T12:55:00Z"},{"value":"0.2277","scoring_system":"epss","scoring_elements":"0.95855","published_at":"2026-04-04T12:55:00Z"},{"value":"0.2277","scoring_system":"epss","scoring_elements":"0.95858","published_at":"2026-04-07T12:55:00Z"},{"value":"0.2277","scoring_system":"epss","scoring_elements":"0.95867","published_at":"2026-04-08T12:55:00Z"},{"value":"0.2277","scoring_system":"epss","scoring_elements":"0.9587","published_at":"2026-04-09T12:55:00Z"},{"value":"0.2277","scoring_system":"epss","scoring_elements":"0.95873","published_at":"2026-04-12T12:55:00Z"},{"value":"0.2277","scoring_system":"epss","scoring_elements":"0.95874","published_at":"2026-04-13T12:55:00Z"},{"value":"0.2277","scoring_system":"epss","scoring_elements":"0.95886","published_at":"2026-04-16T12:55:00Z"},{"value":"0.2277","scoring_system":"epss","scoring_elements":"0.95838","published_at":"2026-04-01T12:55:00Z"},{"value":"0.2277","scoring_system":"epss","scoring_elements":"0.95893","published_at":"2026-04-21T12:55:00Z"},{"value":"0.2277","scoring_system":"epss","scoring_elements":"0.95895","published_at":"2026-04-29T12:55:00Z"},{"value":"0.2277","scoring_system":"epss","scoring_elements":"0.95894","published_at":"2026-04-26T12:55:00Z"},{"value":"0.2277","scoring_system":"epss","scoring_elements":"0.95908","published_at":"2026-05-05T12:55:00Z"},{"value":"0.2277","scoring_system":"epss","scoring_elements":"0.9591","published_at":"2026-05-07T12:55:00Z"},{"value":"0.2277","scoring_system":"epss","scoring_elements":"0.95915","published_at":"2026-05-09T12:55:00Z"},{"value":"0.2277","scoring_system":"epss","scoring_elements":"0.95918","published_at":"2026-05-11T12:55:00Z"},{"value":"0.2277","scoring_system":"epss","scoring_elements":"0.95923","published_at":"2026-05-12T12:55:00Z"},{"value":"0.2277","scoring_system":"epss","scoring_elements":"0.95891","published_at":"2026-04-18T12:55:00Z"},{"value":"0.2277","scoring_system":"epss","scoring_elements":"0.95846","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5214"},{"reference_url":"http://www.debian.org/security/2015/dsa-3394","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3394"},{"reference_url":"http://www.libreoffice.org/about-us/security/advisories/cve-2015-5213/","reference_id":"","reference_type":"","scores":[],"url":"http://www.libreoffice.org/about-us/security/advisories/cve-2015-5213/"},{"reference_url":"http://www.openoffice.org/security/cves/CVE-2015-5213.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openoffice.org/security/cves/CVE-2015-5213.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/77486","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/77486"},{"reference_url":"http://www.securitytracker.com/id/1034085","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034085"},{"reference_url":"http://www.securitytracker.com/id/1034091","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034091"},{"reference_url":"http://www.ubuntu.com/usn/USN-2793-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2793-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1278824","reference_id":"1278824","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1278824"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5213","reference_id":"CVE-2015-5213","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5213"},{"reference_url":"https://security.gentoo.org/glsa/201603-05","reference_id":"GLSA-201603-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201603-05"},{"reference_url":"https://security.gentoo.org/glsa/201611-03","reference_id":"GLSA-201611-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201611-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2619","reference_id":"RHSA-2015:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2619"},{"reference_url":"https://usn.ubuntu.com/2793-1/","reference_id":"USN-2793-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2793-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035786?format=json","purl":"pkg:deb/debian/libreoffice@1:4.3.3-2%2Bdeb8u3~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.3.3-2%252Bdeb8u3~bpo70%252B1"},{"url":"http://public2.vulnerablecode.io/api/packages/1037006?format=json","purl":"pkg:deb/debian/libreoffice@1:5.2.7-1%2Bdeb9u4~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:5.2.7-1%252Bdeb9u4~bpo8%252B1"}],"aliases":["CVE-2015-5213"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yg74-q3xa-tkcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49797?format=json","vulnerability_id":"VCID-zh9v-egc2-ufc5","summary":"Multiple vulnerabilities have been discovered in LibreOffice, the worst of which could lead to code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2255.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2255.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2255","reference_id":"","reference_type":"","scores":[{"value":"0.42502","scoring_system":"epss","scoring_elements":"0.97503","published_at":"2026-05-15T12:55:00Z"},{"value":"0.42502","scoring_system":"epss","scoring_elements":"0.97472","published_at":"2026-04-26T12:55:00Z"},{"value":"0.42502","scoring_system":"epss","scoring_elements":"0.97471","published_at":"2026-04-24T12:55:00Z"},{"value":"0.42502","scoring_system":"epss","scoring_elements":"0.97474","published_at":"2026-04-29T12:55:00Z"},{"value":"0.42502","scoring_system":"epss","scoring_elements":"0.97478","published_at":"2026-05-05T12:55:00Z"},{"value":"0.42502","scoring_system":"epss","scoring_elements":"0.97481","published_at":"2026-05-07T12:55:00Z"},{"value":"0.42502","scoring_system":"epss","scoring_elements":"0.97484","published_at":"2026-05-09T12:55:00Z"},{"value":"0.42502","scoring_system":"epss","scoring_elements":"0.97487","published_at":"2026-05-11T12:55:00Z"},{"value":"0.42502","scoring_system":"epss","scoring_elements":"0.97492","published_at":"2026-05-12T12:55:00Z"},{"value":"0.42502","scoring_system":"epss","scoring_elements":"0.97501","published_at":"2026-05-14T12:55:00Z"},{"value":"0.49062","scoring_system":"epss","scoring_elements":"0.97783","published_at":"2026-04-18T12:55:00Z"},{"value":"0.49062","scoring_system":"epss","scoring_elements":"0.97773","published_at":"2026-04-12T12:55:00Z"},{"value":"0.49062","scoring_system":"epss","scoring_elements":"0.97775","published_at":"2026-04-13T12:55:00Z"},{"value":"0.49062","scoring_system":"epss","scoring_elements":"0.97781","published_at":"2026-04-16T12:55:00Z"},{"value":"0.50818","scoring_system":"epss","scoring_elements":"0.97858","published_at":"2026-04-11T12:55:00Z"},{"value":"0.50818","scoring_system":"epss","scoring_elements":"0.97853","published_at":"2026-04-08T12:55:00Z"},{"value":"0.50818","scoring_system":"epss","scoring_elements":"0.97856","published_at":"2026-04-09T12:55:00Z"},{"value":"0.50818","scoring_system":"epss","scoring_elements":"0.97849","published_at":"2026-04-07T12:55:00Z"},{"value":"0.50818","scoring_system":"epss","scoring_elements":"0.97846","published_at":"2026-04-04T12:55:00Z"},{"value":"0.50818","scoring_system":"epss","scoring_elements":"0.97845","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-2255"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2255","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2255"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2210185","reference_id":"2210185","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2210185"},{"reference_url":"https://security.gentoo.org/glsa/202311-15","reference_id":"GLSA-202311-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202311-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6508","reference_id":"RHSA-2023:6508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6933","reference_id":"RHSA-2023:6933","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6933"},{"reference_url":"https://usn.ubuntu.com/6144-1/","reference_id":"USN-6144-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6144-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049241?format=json","purl":"pkg:deb/debian/libreoffice@1:7.0.4-4%2Bdeb11u10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-tsra-8vhf-5bch"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xkby-5yru-97gd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:7.0.4-4%252Bdeb11u10"}],"aliases":["CVE-2023-2255"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zh9v-egc2-ufc5"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93499?format=json","vulnerability_id":"VCID-b79q-fg8n-vbf8","summary":"When loading a document with Apache Open Office 4.1.5 and earlier with smaller end line termination than the operating system uses, the defect occurs. In this case OpenOffice runs into an Arithmetic Overflow at a string length calculation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-11790","reference_id":"","reference_type":"","scores":[{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66161","published_at":"2026-05-15T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66152","published_at":"2026-05-14T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65896","published_at":"2026-04-01T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65937","published_at":"2026-04-02T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65967","published_at":"2026-04-04T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65934","published_at":"2026-04-07T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65985","published_at":"2026-04-08T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65997","published_at":"2026-04-09T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66016","published_at":"2026-04-11T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66003","published_at":"2026-04-12T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65972","published_at":"2026-04-13T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66008","published_at":"2026-04-16T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66021","published_at":"2026-04-18T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66009","published_at":"2026-04-21T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66028","published_at":"2026-04-24T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66039","published_at":"2026-04-26T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66038","published_at":"2026-04-29T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66015","published_at":"2026-05-05T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66061","published_at":"2026-05-07T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66104","published_at":"2026-05-09T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66075","published_at":"2026-05-11T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66095","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-11790"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11790","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11790"},{"reference_url":"https://lists.apache.org/thread.html/7394e6b5f78a878bd0c44e9bc9adf90b8cdf49e9adc0f287145aba9b%40%3Ccommits.openoffice.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/7394e6b5f78a878bd0c44e9bc9adf90b8cdf49e9adc0f287145aba9b%40%3Ccommits.openoffice.apache.org%3E"},{"reference_url":"https://www.openoffice.org/security/cves/CVE-2018-11790.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.openoffice.org/security/cves/CVE-2018-11790.html"},{"reference_url":"http://www.securityfocus.com/bid/106803","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106803"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:openoffice:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11790","reference_id":"CVE-2018-11790","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11790"},{"reference_url":"https://usn.ubuntu.com/3883-1/","reference_id":"USN-3883-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3883-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035781?format=json","purl":"pkg:deb/debian/libreoffice@1:4.0.3-2~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-11vv-gd2v-2qhk"},{"vulnerability":"VCID-15h8-ucrr-kqbb"},{"vulnerability":"VCID-1981-p3m3-sfhe"},{"vulnerability":"VCID-1vte-fcdx-nfcd"},{"vulnerability":"VCID-1ykj-3m3w-1fez"},{"vulnerability":"VCID-2p1p-4t4u-kyd8"},{"vulnerability":"VCID-3kcp-zzcm-kfc9"},{"vulnerability":"VCID-4y7m-x49j-f3gg"},{"vulnerability":"VCID-5j4w-jaa8-7kae"},{"vulnerability":"VCID-5rdw-edhu-qbhf"},{"vulnerability":"VCID-71cy-5hgf-skdr"},{"vulnerability":"VCID-7du8-skt4-dkew"},{"vulnerability":"VCID-7y9n-6x5a-k3eg"},{"vulnerability":"VCID-886d-gwa2-6bcf"},{"vulnerability":"VCID-91c1-yujx-zbft"},{"vulnerability":"VCID-b13x-6q14-gfau"},{"vulnerability":"VCID-by33-ugtg-47hx"},{"vulnerability":"VCID-bywq-ypgf-xyae"},{"vulnerability":"VCID-c1fx-u5yh-jucb"},{"vulnerability":"VCID-drkj-da54-jfgd"},{"vulnerability":"VCID-dt65-hb25-t7ck"},{"vulnerability":"VCID-e911-8nez-yfb7"},{"vulnerability":"VCID-hnaa-96w8-3uhu"},{"vulnerability":"VCID-jew4-uq9k-93b3"},{"vulnerability":"VCID-jmtk-qy9f-z3hu"},{"vulnerability":"VCID-k36c-4eyp-p7hq"},{"vulnerability":"VCID-k3cz-81fc-sbg7"},{"vulnerability":"VCID-k6mn-jky6-wqg2"},{"vulnerability":"VCID-kx13-c2d7-nke3"},{"vulnerability":"VCID-ma9t-qst9-xbcm"},{"vulnerability":"VCID-mfqa-v61r-gqcb"},{"vulnerability":"VCID-n34y-vynb-qbae"},{"vulnerability":"VCID-pc43-5jvh-fbe2"},{"vulnerability":"VCID-pkz4-5wxb-5qdc"},{"vulnerability":"VCID-qt46-94xf-eyaz"},{"vulnerability":"VCID-r8k2-18at-6ygp"},{"vulnerability":"VCID-re5e-qp85-ybdd"},{"vulnerability":"VCID-sega-433y-v7bb"},{"vulnerability":"VCID-sqwy-enu1-1uep"},{"vulnerability":"VCID-txaq-r51k-k3gn"},{"vulnerability":"VCID-u1ry-xuyn-77fm"},{"vulnerability":"VCID-u2z4-zcay-uufy"},{"vulnerability":"VCID-u6wr-a1wv-byax"},{"vulnerability":"VCID-us6f-vsb9-83ck"},{"vulnerability":"VCID-w6ze-2zem-p3ev"},{"vulnerability":"VCID-xe1u-3snm-bka7"},{"vulnerability":"VCID-xkby-5yru-97gd"},{"vulnerability":"VCID-xr5b-gdek-kqgy"},{"vulnerability":"VCID-y2ja-v9xa-k7af"},{"vulnerability":"VCID-yfrn-ay4p-t7cp"},{"vulnerability":"VCID-yg74-q3xa-tkcx"},{"vulnerability":"VCID-zh9v-egc2-ufc5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.0.3-2~bpo70%252B1"}],"aliases":["CVE-2018-11790"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b79q-fg8n-vbf8"}],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libreoffice@1:4.0.3-2~bpo70%252B1"}