{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36587?format=json","vulnerability_id":"VCID-j1z4-mn41-uyev","summary":"Multiple vulnerabilities have been found in OpenOffice and\n    LibreOffice, the worst of which may result in execution of arbitrary code.","aliases":[{"alias":"CVE-2010-2936"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74512?format=json","purl":"pkg:ebuild/app-office/libreoffice@3.5.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-office/libreoffice@3.5.5.3"},{"url":"http://public2.vulnerablecode.io/api/packages/74513?format=json","purl":"pkg:ebuild/app-office/libreoffice@4.2.5.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-office/libreoffice@4.2.5.2"},{"url":"http://public2.vulnerablecode.io/api/packages/74514?format=json","purl":"pkg:ebuild/app-office/libreoffice-bin@3.5.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-office/libreoffice-bin@3.5.5.3"},{"url":"http://public2.vulnerablecode.io/api/packages/74515?format=json","purl":"pkg:ebuild/app-office/libreoffice-bin@4.2.5.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-office/libreoffice-bin@4.2.5.2"},{"url":"http://public2.vulnerablecode.io/api/packages/74511?format=json","purl":"pkg:ebuild/app-office/openoffice@3.5.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-office/openoffice@3.5.5.3"},{"url":"http://public2.vulnerablecode.io/api/packages/74510?format=json","purl":"pkg:ebuild/app-office/openoffice-bin@3.5.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-office/openoffice-bin@3.5.5.3"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/127741?format=json","purl":"pkg:rpm/redhat/openoffice.org@1.1.2-48.2.0?arch=EL3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-cxcy-3wfh-b3b6"},{"vulnerability":"VCID-j1z4-mn41-uyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openoffice.org@1.1.2-48.2.0%3Farch=EL3"},{"url":"http://public2.vulnerablecode.io/api/packages/127742?format=json","purl":"pkg:rpm/redhat/openoffice.org@1.1.5-10.6.0.7.EL4?arch=5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-cxcy-3wfh-b3b6"},{"vulnerability":"VCID-j1z4-mn41-uyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openoffice.org@1.1.5-10.6.0.7.EL4%3Farch=5"},{"url":"http://public2.vulnerablecode.io/api/packages/127740?format=json","purl":"pkg:rpm/redhat/openoffice.org2@1:2.0.4-5.7.0.6.1.el4_8?arch=6","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-cxcy-3wfh-b3b6"},{"vulnerability":"VCID-j1z4-mn41-uyev"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openoffice.org2@1:2.0.4-5.7.0.6.1.el4_8%3Farch=6"}],"references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2936.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2936.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2936","reference_id":"","reference_type":"","scores":[{"value":"0.05655","scoring_system":"epss","scoring_elements":"0.90451","published_at":"2026-05-14T12:55:00Z"},{"value":"0.05655","scoring_system":"epss","scoring_elements":"0.90327","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05655","scoring_system":"epss","scoring_elements":"0.90329","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05655","scoring_system":"epss","scoring_elements":"0.90341","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05655","scoring_system":"epss","scoring_elements":"0.90345","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05655","scoring_system":"epss","scoring_elements":"0.90359","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05655","scoring_system":"epss","scoring_elements":"0.90366","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05655","scoring_system":"epss","scoring_elements":"0.90374","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05655","scoring_system":"epss","scoring_elements":"0.90373","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05655","scoring_system":"epss","scoring_elements":"0.90367","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05655","scoring_system":"epss","scoring_elements":"0.90382","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05655","scoring_system":"epss","scoring_elements":"0.9038","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05655","scoring_system":"epss","scoring_elements":"0.90395","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05655","scoring_system":"epss","scoring_elements":"0.90394","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05655","scoring_system":"epss","scoring_elements":"0.9039","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05655","scoring_system":"epss","scoring_elements":"0.90403","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05655","scoring_system":"epss","scoring_elements":"0.9042","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05655","scoring_system":"epss","scoring_elements":"0.90432","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05655","scoring_system":"epss","scoring_elements":"0.90429","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05655","scoring_system":"epss","scoring_elements":"0.90438","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2936"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=622529#c6","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=622529#c6"},{"reference_url":"http://secunia.com/advisories/40775","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/40775"},{"reference_url":"http://secunia.com/advisories/41052","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/41052"},{"reference_url":"http://secunia.com/advisories/41235","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/41235"},{"reference_url":"http://secunia.com/advisories/42927","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42927"},{"reference_url":"http://secunia.com/advisories/43105","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43105"},{"reference_url":"http://secunia.com/advisories/60799","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60799"},{"reference_url":"http://securityevaluators.com/files/papers/CrashAnalysis.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://securityevaluators.com/files/papers/CrashAnalysis.pdf"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12144","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12144"},{"reference_url":"http://ubuntu.com/usn/usn-1056-1","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-1056-1"},{"reference_url":"http://www.debian.org/security/2010/dsa-2099","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2099"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:221","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:221"},{"reference_url":"http://www.openoffice.org/security/cves/CVE-2010-2935_CVE-2010-2936.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openoffice.org/security/cves/CVE-2010-2935_CVE-2010-2936.html"},{"reference_url":"http://www.openoffice.org/servlets/ReadMsg?list=dev&msgNo=27690","reference_id":"","reference_type":"","scores":[],"url":"http://www.openoffice.org/servlets/ReadMsg?list=dev&msgNo=27690"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/08/11/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/08/11/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2010/08/11/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2010/08/11/4"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0643.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0643.html"},{"reference_url":"http://www.securitytracker.com/id?1024352","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1024352"},{"reference_url":"http://www.securitytracker.com/id?1024976","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1024976"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2003","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2003"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2149","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2149"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2228","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2228"},{"reference_url":"http://www.vupen.com/english/advisories/2010/2905","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/2905"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0150","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0150"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0230","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0230"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0279","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0279"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=622555","reference_id":"622555","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=622555"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openoffice:openoffice.org:3.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openoffice:openoffice.org:3.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openoffice:openoffice.org:3.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2936","reference_id":"CVE-2010-2936","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2936"},{"reference_url":"https://security.gentoo.org/glsa/201408-19","reference_id":"GLSA-201408-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0643","reference_id":"RHSA-2010:0643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0643"},{"reference_url":"https://usn.ubuntu.com/1056-1/","reference_id":"USN-1056-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1056-1/"}],"weaknesses":[{"cwe_id":122,"name":"Heap-based Buffer Overflow","description":"A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc()."},{"cwe_id":189,"name":"Numeric Errors","description":"Weaknesses in this category are related to improper calculation or conversion of numbers."}],"exploits":[],"severity_range_score":"9.3 - 9.3","exploitability":"0.5","weighted_severity":"8.4","risk_score":4.2,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j1z4-mn41-uyev"}