{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37042?format=json","vulnerability_id":"VCID-qy36-h4j1-rbez","summary":"Multiple vulnerabilities have been reported in OpenOffice.org, possibly\n    allowing for user-assisted execution of arbitrary code.","aliases":[{"alias":"CVE-2007-5747"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74574?format=json","purl":"pkg:ebuild/app-office/openoffice@2.4.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-office/openoffice@2.4.0"},{"url":"http://public2.vulnerablecode.io/api/packages/74575?format=json","purl":"pkg:ebuild/app-office/openoffice-bin@2.4.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-office/openoffice-bin@2.4.0"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/129322?format=json","purl":"pkg:rpm/redhat/openoffice.org@1:2.0.4-5.4?arch=26","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-abwq-d34g-6fax"},{"vulnerability":"VCID-qy36-h4j1-rbez"},{"vulnerability":"VCID-vk6b-52uj-z7he"},{"vulnerability":"VCID-vrpb-u4tv-sqdj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openoffice.org@1:2.0.4-5.4%3Farch=26"},{"url":"http://public2.vulnerablecode.io/api/packages/129319?format=json","purl":"pkg:rpm/redhat/openoffice.org2@1:2.0.4-5.7.0.4?arch=0","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-abwq-d34g-6fax"},{"vulnerability":"VCID-qy36-h4j1-rbez"},{"vulnerability":"VCID-vk6b-52uj-z7he"},{"vulnerability":"VCID-vrpb-u4tv-sqdj"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openoffice.org2@1:2.0.4-5.7.0.4%3Farch=0"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5747.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5747.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5747","reference_id":"","reference_type":"","scores":[{"value":"0.0577","scoring_system":"epss","scoring_elements":"0.90436","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0577","scoring_system":"epss","scoring_elements":"0.9044","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0577","scoring_system":"epss","scoring_elements":"0.90452","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0577","scoring_system":"epss","scoring_elements":"0.90457","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0577","scoring_system":"epss","scoring_elements":"0.9047","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0577","scoring_system":"epss","scoring_elements":"0.90475","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0577","scoring_system":"epss","scoring_elements":"0.90483","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0577","scoring_system":"epss","scoring_elements":"0.90476","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0577","scoring_system":"epss","scoring_elements":"0.90493","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0577","scoring_system":"epss","scoring_elements":"0.90492","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0577","scoring_system":"epss","scoring_elements":"0.90491","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0577","scoring_system":"epss","scoring_elements":"0.90504","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0577","scoring_system":"epss","scoring_elements":"0.90501","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0577","scoring_system":"epss","scoring_elements":"0.90512","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0577","scoring_system":"epss","scoring_elements":"0.9053","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0577","scoring_system":"epss","scoring_elements":"0.90541","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0577","scoring_system":"epss","scoring_elements":"0.90539","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0577","scoring_system":"epss","scoring_elements":"0.90547","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0577","scoring_system":"epss","scoring_elements":"0.90561","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5747"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=435681","reference_id":"435681","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=435681"},{"reference_url":"https://security.gentoo.org/glsa/200805-16","reference_id":"GLSA-200805-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0175","reference_id":"RHSA-2008:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0175"},{"reference_url":"https://usn.ubuntu.com/609-1/","reference_id":"USN-609-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/609-1/"}],"weaknesses":[{"cwe_id":190,"name":"Integer Overflow or Wraparound","description":"The product performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control."}],"exploits":[],"severity_range_score":null,"exploitability":"0.5","weighted_severity":"0.1","risk_score":0.1,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qy36-h4j1-rbez"}