Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
Typedeb
Namespacedebian
Namefreetype
Version2.6.3-3.2+deb9u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.12.1+dfsg-5+deb12u4
Latest_non_vulnerable_version2.12.1+dfsg-5+deb12u4
Affected_by_vulnerabilities
0
url VCID-dcxj-zzfj-3bg7
vulnerability_id VCID-dcxj-zzfj-3bg7
summary Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27406.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27406.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27406
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35967
published_at 2026-04-02T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.35996
published_at 2026-04-04T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.35828
published_at 2026-04-07T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.35878
published_at 2026-04-08T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35901
published_at 2026-04-09T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35907
published_at 2026-04-11T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35865
published_at 2026-04-12T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35842
published_at 2026-04-13T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35881
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27406
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
reference_id 1010183
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2077985
reference_id 2077985
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2077985
6
reference_url https://security.gentoo.org/glsa/202402-06
reference_id GLSA-202402-06
reference_type
scores
url https://security.gentoo.org/glsa/202402-06
7
reference_url https://access.redhat.com/errata/RHSA-2022:7745
reference_id RHSA-2022:7745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7745
8
reference_url https://access.redhat.com/errata/RHSA-2022:8340
reference_id RHSA-2022:8340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8340
9
reference_url https://access.redhat.com/errata/RHSA-2024:0420
reference_id RHSA-2024:0420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0420
10
reference_url https://usn.ubuntu.com/5453-1/
reference_id USN-5453-1
reference_type
scores
url https://usn.ubuntu.com/5453-1/
11
reference_url https://usn.ubuntu.com/5528-1/
reference_id USN-5528-1
reference_type
scores
url https://usn.ubuntu.com/5528-1/
12
reference_url https://usn.ubuntu.com/7352-2/
reference_id USN-7352-2
reference_type
scores
url https://usn.ubuntu.com/7352-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
1
vulnerability VCID-uy24-k7je-pyhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1
aliases CVE-2022-27406
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dcxj-zzfj-3bg7
1
url VCID-nx21-ks3v-53e4
vulnerability_id VCID-nx21-ks3v-53e4
summary
Heap buffer overflow in CefSharp
### Impact
A memory corruption bug(Heap overflow) in the FreeType font rendering library.

> This can be exploited by attackers to execute arbitrary code by using specially crafted fonts with embedded PNG images .

As per https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/ 

Google is aware of reports that an exploit for CVE-2020-15999 exists in the wild.

### Patches
Upgrade to 85.3.130 or higher

### References
- https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/
- https://www.zdnet.com/article/google-releases-chrome-security-update-to-patch-actively-exploited-zero-day/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
- https://magpcss.org/ceforum/viewtopic.php?f=10&t=17942

To review the `CEF/Chromium` patch see https://bitbucket.org/chromiumembedded/cef/commits/cd6cbe008b127990036945fb75e7c2c1594ab10d
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15999
reference_id
reference_type
scores
0
value 0.92905
scoring_system epss
scoring_elements 0.99772
published_at 2026-04-16T12:55:00Z
1
value 0.92905
scoring_system epss
scoring_elements 0.99771
published_at 2026-04-12T12:55:00Z
2
value 0.92931
scoring_system epss
scoring_elements 0.99772
published_at 2026-04-04T12:55:00Z
3
value 0.92931
scoring_system epss
scoring_elements 0.99774
published_at 2026-04-08T12:55:00Z
4
value 0.92931
scoring_system epss
scoring_elements 0.99773
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15999
3
reference_url https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
4
reference_url https://crbug.com/1139963
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://crbug.com/1139963
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569
140
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570
141
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571
142
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573
143
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575
144
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576
145
reference_url http://seclists.org/fulldisclosure/2020/Nov/33
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url http://seclists.org/fulldisclosure/2020/Nov/33
146
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
147
reference_url https://github.com/cefsharp/CefSharp
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/cefsharp/CefSharp
148
reference_url https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62
149
reference_url https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html
150
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
151
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
152
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-15999
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-15999
153
reference_url https://security.gentoo.org/glsa/202011-12
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://security.gentoo.org/glsa/202011-12
154
reference_url https://security.gentoo.org/glsa/202012-04
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://security.gentoo.org/glsa/202012-04
155
reference_url https://security.gentoo.org/glsa/202401-19
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://security.gentoo.org/glsa/202401-19
156
reference_url https://security.netapp.com/advisory/ntap-20240812-0001
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240812-0001
157
reference_url https://www.debian.org/security/2021/dsa-4824
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://www.debian.org/security/2021/dsa-4824
158
reference_url https://www.nuget.org/packages/CefSharp.Common
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/CefSharp.Common
159
reference_url https://www.nuget.org/packages/CefSharp.WinForms
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/CefSharp.WinForms
160
reference_url https://www.nuget.org/packages/CefSharp.Wpf
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/CefSharp.Wpf
161
reference_url https://www.nuget.org/packages/CefSharp.Wpf.HwndHost
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/CefSharp.Wpf.HwndHost
162
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890210
reference_id 1890210
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890210
163
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586
reference_id 972586
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586
164
reference_url https://security.archlinux.org/ASA-202010-10
reference_id ASA-202010-10
reference_type
scores
url https://security.archlinux.org/ASA-202010-10
165
reference_url https://security.archlinux.org/ASA-202010-11
reference_id ASA-202010-11
reference_type
scores
url https://security.archlinux.org/ASA-202010-11
166
reference_url https://security.archlinux.org/ASA-202011-12
reference_id ASA-202011-12
reference_type
scores
url https://security.archlinux.org/ASA-202011-12
167
reference_url https://security.archlinux.org/AVG-1254
reference_id AVG-1254
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1254
168
reference_url https://security.archlinux.org/AVG-1255
reference_id AVG-1255
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1255
169
reference_url https://security.archlinux.org/AVG-1279
reference_id AVG-1279
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1279
170
reference_url https://github.com/advisories/GHSA-pv36-h7jh-qm62
reference_id GHSA-pv36-h7jh-qm62
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pv36-h7jh-qm62
171
reference_url https://security.gentoo.org/glsa/202010-07
reference_id GLSA-202010-07
reference_type
scores
url https://security.gentoo.org/glsa/202010-07
172
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/
reference_id J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/
173
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
174
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
reference_id mfsa2020-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
175
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
reference_id mfsa2020-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
176
reference_url https://access.redhat.com/errata/RHSA-2020:4351
reference_id RHSA-2020:4351
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4351
177
reference_url https://access.redhat.com/errata/RHSA-2020:4907
reference_id RHSA-2020:4907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4907
178
reference_url https://access.redhat.com/errata/RHSA-2020:4949
reference_id RHSA-2020:4949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4949
179
reference_url https://access.redhat.com/errata/RHSA-2020:4950
reference_id RHSA-2020:4950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4950
180
reference_url https://access.redhat.com/errata/RHSA-2020:4951
reference_id RHSA-2020:4951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4951
181
reference_url https://access.redhat.com/errata/RHSA-2020:4952
reference_id RHSA-2020:4952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4952
182
reference_url https://usn.ubuntu.com/4593-1/
reference_id USN-4593-1
reference_type
scores
url https://usn.ubuntu.com/4593-1/
183
reference_url https://usn.ubuntu.com/4593-2/
reference_id USN-4593-2
reference_type
scores
url https://usn.ubuntu.com/4593-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.9.1-3%2Bdeb10u3
purl pkg:deb/debian/freetype@2.9.1-3%2Bdeb10u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.9.1-3%252Bdeb10u3
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
1
vulnerability VCID-uy24-k7je-pyhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1
aliases CVE-2020-15999, GHSA-pv36-h7jh-qm62
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nx21-ks3v-53e4
2
url VCID-s148-7tzs-gfg8
vulnerability_id VCID-s148-7tzs-gfg8
summary Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27405.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27405.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27405
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.2594
published_at 2026-04-02T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25982
published_at 2026-04-04T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25749
published_at 2026-04-07T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.2582
published_at 2026-04-08T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25872
published_at 2026-04-09T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25882
published_at 2026-04-11T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25841
published_at 2026-04-12T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25785
published_at 2026-04-13T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25788
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27405
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
reference_id 1010183
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2077991
reference_id 2077991
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2077991
6
reference_url https://security.gentoo.org/glsa/202402-06
reference_id GLSA-202402-06
reference_type
scores
url https://security.gentoo.org/glsa/202402-06
7
reference_url https://access.redhat.com/errata/RHSA-2022:7745
reference_id RHSA-2022:7745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7745
8
reference_url https://access.redhat.com/errata/RHSA-2022:8340
reference_id RHSA-2022:8340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8340
9
reference_url https://access.redhat.com/errata/RHSA-2024:0420
reference_id RHSA-2024:0420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0420
10
reference_url https://usn.ubuntu.com/5528-1/
reference_id USN-5528-1
reference_type
scores
url https://usn.ubuntu.com/5528-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
1
vulnerability VCID-uy24-k7je-pyhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1
aliases CVE-2022-27405
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s148-7tzs-gfg8
3
url VCID-uy24-k7je-pyhr
vulnerability_id VCID-uy24-k7je-pyhr
summary A vulnerability has been discovered in FreeType, which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27363.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27363.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-27363
reference_id
reference_type
scores
0
value 0.63439
scoring_system epss
scoring_elements 0.98416
published_at 2026-04-16T12:55:00Z
1
value 0.63439
scoring_system epss
scoring_elements 0.98411
published_at 2026-04-13T12:55:00Z
2
value 0.64976
scoring_system epss
scoring_elements 0.98459
published_at 2026-04-02T12:55:00Z
3
value 0.64976
scoring_system epss
scoring_elements 0.98462
published_at 2026-04-04T12:55:00Z
4
value 0.64976
scoring_system epss
scoring_elements 0.98464
published_at 2026-04-07T12:55:00Z
5
value 0.64976
scoring_system epss
scoring_elements 0.98467
published_at 2026-04-08T12:55:00Z
6
value 0.64976
scoring_system epss
scoring_elements 0.98468
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-27363
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2351357
reference_id 2351357
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2351357
5
reference_url https://security.archlinux.org/ASA-202505-11
reference_id ASA-202505-11
reference_type
scores
url https://security.archlinux.org/ASA-202505-11
6
reference_url https://security.archlinux.org/AVG-2877
reference_id AVG-2877
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2877
7
reference_url https://www.facebook.com/security/advisories/cve-2025-27363
reference_id cve-2025-27363
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-05-07T03:55:53Z/
url https://www.facebook.com/security/advisories/cve-2025-27363
8
reference_url https://security.gentoo.org/glsa/202505-07
reference_id GLSA-202505-07
reference_type
scores
url https://security.gentoo.org/glsa/202505-07
9
reference_url https://access.redhat.com/errata/RHSA-2025:3382
reference_id RHSA-2025:3382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3382
10
reference_url https://access.redhat.com/errata/RHSA-2025:3383
reference_id RHSA-2025:3383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3383
11
reference_url https://access.redhat.com/errata/RHSA-2025:3384
reference_id RHSA-2025:3384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3384
12
reference_url https://access.redhat.com/errata/RHSA-2025:3385
reference_id RHSA-2025:3385
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3385
13
reference_url https://access.redhat.com/errata/RHSA-2025:3386
reference_id RHSA-2025:3386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3386
14
reference_url https://access.redhat.com/errata/RHSA-2025:3387
reference_id RHSA-2025:3387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3387
15
reference_url https://access.redhat.com/errata/RHSA-2025:3393
reference_id RHSA-2025:3393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3393
16
reference_url https://access.redhat.com/errata/RHSA-2025:3395
reference_id RHSA-2025:3395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3395
17
reference_url https://access.redhat.com/errata/RHSA-2025:3407
reference_id RHSA-2025:3407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3407
18
reference_url https://access.redhat.com/errata/RHSA-2025:3421
reference_id RHSA-2025:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3421
19
reference_url https://access.redhat.com/errata/RHSA-2025:8195
reference_id RHSA-2025:8195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8195
20
reference_url https://access.redhat.com/errata/RHSA-2025:8219
reference_id RHSA-2025:8219
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8219
21
reference_url https://access.redhat.com/errata/RHSA-2025:8253
reference_id RHSA-2025:8253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8253
22
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8292
23
reference_url https://access.redhat.com/errata/RHSA-2025:9380
reference_id RHSA-2025:9380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9380
24
reference_url https://usn.ubuntu.com/7352-1/
reference_id USN-7352-1
reference_type
scores
url https://usn.ubuntu.com/7352-1/
25
reference_url https://usn.ubuntu.com/7352-2/
reference_id USN-7352-2
reference_type
scores
url https://usn.ubuntu.com/7352-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4
aliases CVE-2025-27363
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uy24-k7je-pyhr
4
url VCID-xb9q-dk8j-fbch
vulnerability_id VCID-xb9q-dk8j-fbch
summary Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27404.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27404.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27404
reference_id
reference_type
scores
0
value 0.00124
scoring_system epss
scoring_elements 0.31668
published_at 2026-04-02T12:55:00Z
1
value 0.00124
scoring_system epss
scoring_elements 0.31713
published_at 2026-04-04T12:55:00Z
2
value 0.00124
scoring_system epss
scoring_elements 0.31531
published_at 2026-04-07T12:55:00Z
3
value 0.00124
scoring_system epss
scoring_elements 0.31584
published_at 2026-04-08T12:55:00Z
4
value 0.00124
scoring_system epss
scoring_elements 0.31614
published_at 2026-04-09T12:55:00Z
5
value 0.00124
scoring_system epss
scoring_elements 0.31618
published_at 2026-04-11T12:55:00Z
6
value 0.00124
scoring_system epss
scoring_elements 0.31576
published_at 2026-04-12T12:55:00Z
7
value 0.00124
scoring_system epss
scoring_elements 0.31539
published_at 2026-04-13T12:55:00Z
8
value 0.00124
scoring_system epss
scoring_elements 0.31574
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27404
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
reference_id 1010183
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2077989
reference_id 2077989
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2077989
6
reference_url https://security.gentoo.org/glsa/202402-06
reference_id GLSA-202402-06
reference_type
scores
url https://security.gentoo.org/glsa/202402-06
7
reference_url https://access.redhat.com/errata/RHSA-2022:7745
reference_id RHSA-2022:7745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7745
8
reference_url https://access.redhat.com/errata/RHSA-2022:8340
reference_id RHSA-2022:8340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8340
9
reference_url https://access.redhat.com/errata/RHSA-2024:0420
reference_id RHSA-2024:0420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0420
10
reference_url https://usn.ubuntu.com/5528-1/
reference_id USN-5528-1
reference_type
scores
url https://usn.ubuntu.com/5528-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
1
vulnerability VCID-uy24-k7je-pyhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1
aliases CVE-2022-27404
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xb9q-dk8j-fbch
5
url VCID-y4qf-qfbv-mqdg
vulnerability_id VCID-y4qf-qfbv-mqdg
summary freetype: NULL pointer dereference in the Ins_GETVARIATION() function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6942.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6942.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6942
reference_id
reference_type
scores
0
value 0.00197
scoring_system epss
scoring_elements 0.41742
published_at 2026-04-16T12:55:00Z
1
value 0.00197
scoring_system epss
scoring_elements 0.41695
published_at 2026-04-13T12:55:00Z
2
value 0.00258
scoring_system epss
scoring_elements 0.49131
published_at 2026-04-02T12:55:00Z
3
value 0.00258
scoring_system epss
scoring_elements 0.4916
published_at 2026-04-04T12:55:00Z
4
value 0.00258
scoring_system epss
scoring_elements 0.49113
published_at 2026-04-07T12:55:00Z
5
value 0.00258
scoring_system epss
scoring_elements 0.49167
published_at 2026-04-08T12:55:00Z
6
value 0.00258
scoring_system epss
scoring_elements 0.49164
published_at 2026-04-09T12:55:00Z
7
value 0.00258
scoring_system epss
scoring_elements 0.49181
published_at 2026-04-11T12:55:00Z
8
value 0.00258
scoring_system epss
scoring_elements 0.49155
published_at 2026-04-12T12:55:00Z
9
value 0.00258
scoring_system epss
scoring_elements 0.49098
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6942
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1544771
reference_id 1544771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1544771
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890450
reference_id 890450
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890450
5
reference_url https://security.archlinux.org/ASA-201805-3
reference_id ASA-201805-3
reference_type
scores
url https://security.archlinux.org/ASA-201805-3
6
reference_url https://security.archlinux.org/AVG-613
reference_id AVG-613
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-613
7
reference_url https://usn.ubuntu.com/3572-1/
reference_id USN-3572-1
reference_type
scores
url https://usn.ubuntu.com/3572-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.9.1-3%2Bdeb10u3
purl pkg:deb/debian/freetype@2.9.1-3%2Bdeb10u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.9.1-3%252Bdeb10u3
aliases CVE-2018-6942
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y4qf-qfbv-mqdg
Fixing_vulnerabilities
0
url VCID-6xf8-49hw-hfaf
vulnerability_id VCID-6xf8-49hw-hfaf
summary
Multiple vulnerabilities have been found in FreeType, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10244.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10244
reference_id
reference_type
scores
0
value 0.00513
scoring_system epss
scoring_elements 0.66463
published_at 2026-04-01T12:55:00Z
1
value 0.00513
scoring_system epss
scoring_elements 0.66502
published_at 2026-04-02T12:55:00Z
2
value 0.00513
scoring_system epss
scoring_elements 0.66527
published_at 2026-04-04T12:55:00Z
3
value 0.00513
scoring_system epss
scoring_elements 0.66499
published_at 2026-04-07T12:55:00Z
4
value 0.00513
scoring_system epss
scoring_elements 0.66547
published_at 2026-04-08T12:55:00Z
5
value 0.00513
scoring_system epss
scoring_elements 0.66561
published_at 2026-04-09T12:55:00Z
6
value 0.00513
scoring_system epss
scoring_elements 0.6658
published_at 2026-04-11T12:55:00Z
7
value 0.00513
scoring_system epss
scoring_elements 0.66568
published_at 2026-04-12T12:55:00Z
8
value 0.00513
scoring_system epss
scoring_elements 0.66536
published_at 2026-04-13T12:55:00Z
9
value 0.00513
scoring_system epss
scoring_elements 0.66572
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1429965
reference_id 1429965
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1429965
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856971
reference_id 856971
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856971
8
reference_url https://security.gentoo.org/glsa/201706-14
reference_id GLSA-201706-14
reference_type
scores
url https://security.gentoo.org/glsa/201706-14
9
reference_url https://usn.ubuntu.com/3237-1/
reference_id USN-3237-1
reference_type
scores
url https://usn.ubuntu.com/3237-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
purl pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2
1
url pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
purl pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
5
vulnerability VCID-y4qf-qfbv-mqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1
aliases CVE-2016-10244
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6xf8-49hw-hfaf
1
url VCID-a9r6-k8gp-nbfs
vulnerability_id VCID-a9r6-k8gp-nbfs
summary freetype: a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c may lead to a DoS
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9383.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9383.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-9383
reference_id
reference_type
scores
0
value 0.02734
scoring_system epss
scoring_elements 0.85895
published_at 2026-04-01T12:55:00Z
1
value 0.02734
scoring_system epss
scoring_elements 0.8598
published_at 2026-04-16T12:55:00Z
2
value 0.02734
scoring_system epss
scoring_elements 0.85968
published_at 2026-04-11T12:55:00Z
3
value 0.02734
scoring_system epss
scoring_elements 0.85966
published_at 2026-04-12T12:55:00Z
4
value 0.02734
scoring_system epss
scoring_elements 0.85961
published_at 2026-04-13T12:55:00Z
5
value 0.02734
scoring_system epss
scoring_elements 0.85906
published_at 2026-04-02T12:55:00Z
6
value 0.02734
scoring_system epss
scoring_elements 0.85923
published_at 2026-04-04T12:55:00Z
7
value 0.02734
scoring_system epss
scoring_elements 0.85925
published_at 2026-04-07T12:55:00Z
8
value 0.02734
scoring_system epss
scoring_elements 0.85944
published_at 2026-04-08T12:55:00Z
9
value 0.02734
scoring_system epss
scoring_elements 0.85954
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-9383
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9383
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
6
reference_url https://savannah.nongnu.org/bugs/?46346
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?46346
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1763613
reference_id 1763613
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1763613
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-9383
reference_id CVE-2015-9383
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-9383
14
reference_url https://usn.ubuntu.com/4126-1/
reference_id USN-4126-1
reference_type
scores
url https://usn.ubuntu.com/4126-1/
15
reference_url https://usn.ubuntu.com/4126-2/
reference_id USN-4126-2
reference_type
scores
url https://usn.ubuntu.com/4126-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
purl pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
5
vulnerability VCID-y4qf-qfbv-mqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1
aliases CVE-2015-9383
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a9r6-k8gp-nbfs
2
url VCID-b35u-t7u2-sudy
vulnerability_id VCID-b35u-t7u2-sudy
summary security update
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9746.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9746.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9746
reference_id
reference_type
scores
0
value 0.00842
scoring_system epss
scoring_elements 0.74764
published_at 2026-04-16T12:55:00Z
1
value 0.00842
scoring_system epss
scoring_elements 0.74736
published_at 2026-04-12T12:55:00Z
2
value 0.00842
scoring_system epss
scoring_elements 0.74727
published_at 2026-04-13T12:55:00Z
3
value 0.00842
scoring_system epss
scoring_elements 0.74684
published_at 2026-04-01T12:55:00Z
4
value 0.00842
scoring_system epss
scoring_elements 0.74687
published_at 2026-04-07T12:55:00Z
5
value 0.00842
scoring_system epss
scoring_elements 0.74714
published_at 2026-04-04T12:55:00Z
6
value 0.00842
scoring_system epss
scoring_elements 0.7472
published_at 2026-04-08T12:55:00Z
7
value 0.00842
scoring_system epss
scoring_elements 0.74734
published_at 2026-04-09T12:55:00Z
8
value 0.00842
scoring_system epss
scoring_elements 0.74757
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9746
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://savannah.nongnu.org/bugs/?41309
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?41309
8
reference_url http://www.debian.org/security/2015/dsa-3370
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3370
9
reference_url http://www.openwall.com/lists/oss-security/2015/09/11/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/09/11/4
10
reference_url http://www.openwall.com/lists/oss-security/2015/09/25/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/09/25/4
11
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1262373
reference_id 1262373
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1262373
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619
reference_id 798619
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9746
reference_id CVE-2014-9746
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2014-9746
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
purl pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2
2
url pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
purl pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
5
vulnerability VCID-y4qf-qfbv-mqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1
aliases CVE-2014-9746
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b35u-t7u2-sudy
3
url VCID-hutw-rk7x-5bc3
vulnerability_id VCID-hutw-rk7x-5bc3
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9745.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9745.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9745
reference_id
reference_type
scores
0
value 0.02361
scoring_system epss
scoring_elements 0.84869
published_at 2026-04-02T12:55:00Z
1
value 0.02361
scoring_system epss
scoring_elements 0.84887
published_at 2026-04-04T12:55:00Z
2
value 0.02361
scoring_system epss
scoring_elements 0.84889
published_at 2026-04-07T12:55:00Z
3
value 0.02361
scoring_system epss
scoring_elements 0.84854
published_at 2026-04-01T12:55:00Z
4
value 0.02908
scoring_system epss
scoring_elements 0.8637
published_at 2026-04-12T12:55:00Z
5
value 0.02908
scoring_system epss
scoring_elements 0.86365
published_at 2026-04-13T12:55:00Z
6
value 0.02908
scoring_system epss
scoring_elements 0.86382
published_at 2026-04-16T12:55:00Z
7
value 0.02908
scoring_system epss
scoring_elements 0.86349
published_at 2026-04-08T12:55:00Z
8
value 0.02908
scoring_system epss
scoring_elements 0.86359
published_at 2026-04-09T12:55:00Z
9
value 0.02908
scoring_system epss
scoring_elements 0.86373
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1262377
reference_id 1262377
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1262377
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798620
reference_id 798620
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798620
8
reference_url https://usn.ubuntu.com/2739-1/
reference_id USN-2739-1
reference_type
scores
url https://usn.ubuntu.com/2739-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
purl pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2
2
url pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
purl pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
5
vulnerability VCID-y4qf-qfbv-mqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1
aliases CVE-2014-9745
risk_score 0.6
exploitability 0.5
weighted_severity 1.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hutw-rk7x-5bc3
4
url VCID-m8ha-zxb7-tyg6
vulnerability_id VCID-m8ha-zxb7-tyg6
summary
Multiple vulnerabilities have been found in FreeType, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8105.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8105.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8105
reference_id
reference_type
scores
0
value 0.01616
scoring_system epss
scoring_elements 0.81728
published_at 2026-04-01T12:55:00Z
1
value 0.01616
scoring_system epss
scoring_elements 0.81831
published_at 2026-04-16T12:55:00Z
2
value 0.01616
scoring_system epss
scoring_elements 0.8176
published_at 2026-04-07T12:55:00Z
3
value 0.01616
scoring_system epss
scoring_elements 0.81786
published_at 2026-04-08T12:55:00Z
4
value 0.01616
scoring_system epss
scoring_elements 0.81792
published_at 2026-04-09T12:55:00Z
5
value 0.01616
scoring_system epss
scoring_elements 0.81811
published_at 2026-04-11T12:55:00Z
6
value 0.01616
scoring_system epss
scoring_elements 0.81799
published_at 2026-04-12T12:55:00Z
7
value 0.01616
scoring_system epss
scoring_elements 0.81794
published_at 2026-04-13T12:55:00Z
8
value 0.01616
scoring_system epss
scoring_elements 0.81739
published_at 2026-04-02T12:55:00Z
9
value 0.01616
scoring_system epss
scoring_elements 0.81762
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8105
3
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
1
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
9
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
10
reference_url http://www.debian.org/security/2017/dsa-3839
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3839
11
reference_url http://www.securityfocus.com/bid/99093
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99093
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1446500
reference_id 1446500
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1446500
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861220
reference_id 861220
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861220
14
reference_url https://security.archlinux.org/ASA-201705-10
reference_id ASA-201705-10
reference_type
scores
url https://security.archlinux.org/ASA-201705-10
15
reference_url https://security.archlinux.org/ASA-201705-7
reference_id ASA-201705-7
reference_type
scores
url https://security.archlinux.org/ASA-201705-7
16
reference_url https://security.archlinux.org/AVG-257
reference_id AVG-257
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-257
17
reference_url https://security.archlinux.org/AVG-258
reference_id AVG-258
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-258
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8105
reference_id CVE-2017-8105
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8105
21
reference_url https://security.gentoo.org/glsa/201706-14
reference_id GLSA-201706-14
reference_type
scores
url https://security.gentoo.org/glsa/201706-14
22
reference_url https://usn.ubuntu.com/3282-1/
reference_id USN-3282-1
reference_type
scores
url https://usn.ubuntu.com/3282-1/
23
reference_url https://usn.ubuntu.com/3282-2/
reference_id USN-3282-2
reference_type
scores
url https://usn.ubuntu.com/3282-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
purl pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2
1
url pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
purl pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
5
vulnerability VCID-y4qf-qfbv-mqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1
aliases CVE-2017-8105
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m8ha-zxb7-tyg6
5
url VCID-nn4w-gq71-kfgd
vulnerability_id VCID-nn4w-gq71-kfgd
summary freetype: buffer over-read in function T1_Get_Private_Dict in type1/t1parse.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9290.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9290.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-9290
reference_id
reference_type
scores
0
value 0.005
scoring_system epss
scoring_elements 0.65886
published_at 2026-04-01T12:55:00Z
1
value 0.005
scoring_system epss
scoring_elements 0.65927
published_at 2026-04-02T12:55:00Z
2
value 0.005
scoring_system epss
scoring_elements 0.65958
published_at 2026-04-04T12:55:00Z
3
value 0.005
scoring_system epss
scoring_elements 0.65924
published_at 2026-04-07T12:55:00Z
4
value 0.005
scoring_system epss
scoring_elements 0.65975
published_at 2026-04-08T12:55:00Z
5
value 0.005
scoring_system epss
scoring_elements 0.65987
published_at 2026-04-09T12:55:00Z
6
value 0.005
scoring_system epss
scoring_elements 0.66006
published_at 2026-04-11T12:55:00Z
7
value 0.005
scoring_system epss
scoring_elements 0.65993
published_at 2026-04-12T12:55:00Z
8
value 0.005
scoring_system epss
scoring_elements 0.65962
published_at 2026-04-13T12:55:00Z
9
value 0.005
scoring_system epss
scoring_elements 0.65997
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-9290
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9290
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1741802
reference_id 1741802
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1741802
fixed_packages
0
url pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
purl pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
5
vulnerability VCID-y4qf-qfbv-mqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1
aliases CVE-2015-9290
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nn4w-gq71-kfgd
6
url VCID-tsw4-kqbc-kqf1
vulnerability_id VCID-tsw4-kqbc-kqf1
summary freetype: a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c leading to crash
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-9381
reference_id
reference_type
scores
0
value 0.00711
scoring_system epss
scoring_elements 0.722
published_at 2026-04-01T12:55:00Z
1
value 0.00711
scoring_system epss
scoring_elements 0.72285
published_at 2026-04-16T12:55:00Z
2
value 0.00711
scoring_system epss
scoring_elements 0.72272
published_at 2026-04-11T12:55:00Z
3
value 0.00711
scoring_system epss
scoring_elements 0.72256
published_at 2026-04-12T12:55:00Z
4
value 0.00711
scoring_system epss
scoring_elements 0.72242
published_at 2026-04-13T12:55:00Z
5
value 0.00711
scoring_system epss
scoring_elements 0.72205
published_at 2026-04-02T12:55:00Z
6
value 0.00711
scoring_system epss
scoring_elements 0.72225
published_at 2026-04-04T12:55:00Z
7
value 0.00711
scoring_system epss
scoring_elements 0.72201
published_at 2026-04-07T12:55:00Z
8
value 0.00711
scoring_system epss
scoring_elements 0.72237
published_at 2026-04-08T12:55:00Z
9
value 0.00711
scoring_system epss
scoring_elements 0.72249
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-9381
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
6
reference_url https://savannah.nongnu.org/bugs/?45955
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?45955
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1752788
reference_id 1752788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1752788
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-9381
reference_id CVE-2015-9381
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-9381
11
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
12
reference_url https://access.redhat.com/errata/RHSA-2019:4254
reference_id RHSA-2019:4254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4254
13
reference_url https://usn.ubuntu.com/4126-2/
reference_id USN-4126-2
reference_type
scores
url https://usn.ubuntu.com/4126-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
purl pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
5
vulnerability VCID-y4qf-qfbv-mqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1
aliases CVE-2015-9381
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tsw4-kqbc-kqf1
7
url VCID-wr9p-x4sm-aqdh
vulnerability_id VCID-wr9p-x4sm-aqdh
summary
Multiple vulnerabilities have been found in FreeType, the worst of
    which allows remote attackers to execute arbitrary code.
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8287.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8287.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8287
reference_id
reference_type
scores
0
value 0.00797
scoring_system epss
scoring_elements 0.73951
published_at 2026-04-01T12:55:00Z
1
value 0.00797
scoring_system epss
scoring_elements 0.74039
published_at 2026-04-16T12:55:00Z
2
value 0.00797
scoring_system epss
scoring_elements 0.73955
published_at 2026-04-07T12:55:00Z
3
value 0.00797
scoring_system epss
scoring_elements 0.73989
published_at 2026-04-08T12:55:00Z
4
value 0.00797
scoring_system epss
scoring_elements 0.74002
published_at 2026-04-09T12:55:00Z
5
value 0.00797
scoring_system epss
scoring_elements 0.74024
published_at 2026-04-11T12:55:00Z
6
value 0.00797
scoring_system epss
scoring_elements 0.74006
published_at 2026-04-12T12:55:00Z
7
value 0.00797
scoring_system epss
scoring_elements 0.73999
published_at 2026-04-13T12:55:00Z
8
value 0.00797
scoring_system epss
scoring_elements 0.73958
published_at 2026-04-02T12:55:00Z
9
value 0.00797
scoring_system epss
scoring_elements 0.73984
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8287
3
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
1
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2020.html
9
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
10
reference_url http://www.debian.org/security/2017/dsa-3839
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3839
11
reference_url http://www.securityfocus.com/bid/99091
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/99091
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1446073
reference_id 1446073
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1446073
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861308
reference_id 861308
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861308
14
reference_url https://security.archlinux.org/ASA-201705-10
reference_id ASA-201705-10
reference_type
scores
url https://security.archlinux.org/ASA-201705-10
15
reference_url https://security.archlinux.org/ASA-201705-7
reference_id ASA-201705-7
reference_type
scores
url https://security.archlinux.org/ASA-201705-7
16
reference_url https://security.archlinux.org/AVG-257
reference_id AVG-257
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-257
17
reference_url https://security.archlinux.org/AVG-258
reference_id AVG-258
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-258
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8287
reference_id CVE-2017-8287
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8287
20
reference_url https://security.gentoo.org/glsa/201706-14
reference_id GLSA-201706-14
reference_type
scores
url https://security.gentoo.org/glsa/201706-14
21
reference_url https://usn.ubuntu.com/3282-1/
reference_id USN-3282-1
reference_type
scores
url https://usn.ubuntu.com/3282-1/
22
reference_url https://usn.ubuntu.com/3282-2/
reference_id USN-3282-2
reference_type
scores
url https://usn.ubuntu.com/3282-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
purl pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2
1
url pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
purl pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
5
vulnerability VCID-y4qf-qfbv-mqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1
aliases CVE-2017-8287
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wr9p-x4sm-aqdh
8
url VCID-ysfs-xxjz-vbep
vulnerability_id VCID-ysfs-xxjz-vbep
summary freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-9382
reference_id
reference_type
scores
0
value 0.00798
scoring_system epss
scoring_elements 0.73965
published_at 2026-04-01T12:55:00Z
1
value 0.00798
scoring_system epss
scoring_elements 0.74054
published_at 2026-04-16T12:55:00Z
2
value 0.00798
scoring_system epss
scoring_elements 0.74039
published_at 2026-04-11T12:55:00Z
3
value 0.00798
scoring_system epss
scoring_elements 0.74021
published_at 2026-04-12T12:55:00Z
4
value 0.00798
scoring_system epss
scoring_elements 0.74014
published_at 2026-04-13T12:55:00Z
5
value 0.00798
scoring_system epss
scoring_elements 0.73972
published_at 2026-04-02T12:55:00Z
6
value 0.00798
scoring_system epss
scoring_elements 0.73998
published_at 2026-04-04T12:55:00Z
7
value 0.00798
scoring_system epss
scoring_elements 0.73969
published_at 2026-04-07T12:55:00Z
8
value 0.00798
scoring_system epss
scoring_elements 0.74003
published_at 2026-04-08T12:55:00Z
9
value 0.00798
scoring_system epss
scoring_elements 0.74017
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-9382
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html
6
reference_url https://savannah.nongnu.org/bugs/?45922
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?45922
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1763609
reference_id 1763609
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1763609
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-9382
reference_id CVE-2015-9382
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-9382
11
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
12
reference_url https://access.redhat.com/errata/RHSA-2019:4254
reference_id RHSA-2019:4254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:4254
13
reference_url https://usn.ubuntu.com/4126-2/
reference_id USN-4126-2
reference_type
scores
url https://usn.ubuntu.com/4126-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
purl pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
5
vulnerability VCID-y4qf-qfbv-mqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1
aliases CVE-2015-9382
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ysfs-xxjz-vbep
9
url VCID-zpnw-kwqf-63bp
vulnerability_id VCID-zpnw-kwqf-63bp
summary security update
references
0
reference_url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1
reference_id
reference_type
scores
url http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9747.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9747.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9747
reference_id
reference_type
scores
0
value 0.01099
scoring_system epss
scoring_elements 0.78063
published_at 2026-04-16T12:55:00Z
1
value 0.01099
scoring_system epss
scoring_elements 0.7803
published_at 2026-04-12T12:55:00Z
2
value 0.01099
scoring_system epss
scoring_elements 0.78028
published_at 2026-04-13T12:55:00Z
3
value 0.01099
scoring_system epss
scoring_elements 0.77971
published_at 2026-04-01T12:55:00Z
4
value 0.01099
scoring_system epss
scoring_elements 0.77979
published_at 2026-04-02T12:55:00Z
5
value 0.01099
scoring_system epss
scoring_elements 0.78008
published_at 2026-04-04T12:55:00Z
6
value 0.01099
scoring_system epss
scoring_elements 0.7799
published_at 2026-04-07T12:55:00Z
7
value 0.01099
scoring_system epss
scoring_elements 0.78016
published_at 2026-04-08T12:55:00Z
8
value 0.01099
scoring_system epss
scoring_elements 0.78021
published_at 2026-04-09T12:55:00Z
9
value 0.01099
scoring_system epss
scoring_elements 0.78048
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9747
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://savannah.nongnu.org/bugs/?41309
reference_id
reference_type
scores
url https://savannah.nongnu.org/bugs/?41309
8
reference_url http://www.debian.org/security/2015/dsa-3370
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3370
9
reference_url http://www.openwall.com/lists/oss-security/2015/09/11/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/09/11/4
10
reference_url http://www.openwall.com/lists/oss-security/2015/09/25/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/09/25/4
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1262373
reference_id 1262373
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1262373
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619
reference_id 798619
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9747
reference_id CVE-2014-9747
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2014-9747
fixed_packages
0
url pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
purl pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17au-pc1k-m7at
1
vulnerability VCID-1ws8-ww77-ybah
2
vulnerability VCID-3jn7-t1f6-uyfr
3
vulnerability VCID-468g-dxsr-8yer
4
vulnerability VCID-6xf8-49hw-hfaf
5
vulnerability VCID-73d5-ezt5-87eh
6
vulnerability VCID-73e1-scax-8ugj
7
vulnerability VCID-a9r6-k8gp-nbfs
8
vulnerability VCID-ask2-xeb7-7qbk
9
vulnerability VCID-b35u-t7u2-sudy
10
vulnerability VCID-dcxj-zzfj-3bg7
11
vulnerability VCID-fp2p-5ymf-wffj
12
vulnerability VCID-gtka-sbgw-tuf5
13
vulnerability VCID-hutw-rk7x-5bc3
14
vulnerability VCID-jg4p-nv1j-fyb9
15
vulnerability VCID-jn9w-2axj-8ke5
16
vulnerability VCID-m8ha-zxb7-tyg6
17
vulnerability VCID-nakp-vmxa-akey
18
vulnerability VCID-nfp7-sjcv-wkfv
19
vulnerability VCID-nn4w-gq71-kfgd
20
vulnerability VCID-nx21-ks3v-53e4
21
vulnerability VCID-p2yw-ksc4-jfe9
22
vulnerability VCID-p8h9-9xku-hbhv
23
vulnerability VCID-pznp-81q7-z3d4
24
vulnerability VCID-s148-7tzs-gfg8
25
vulnerability VCID-th47-m45d-m7dk
26
vulnerability VCID-tmb5-g2ua-ekek
27
vulnerability VCID-tsw4-kqbc-kqf1
28
vulnerability VCID-tu7r-tsp8-73ew
29
vulnerability VCID-u15r-u7zz-17ad
30
vulnerability VCID-uh3u-pzzg-fkgg
31
vulnerability VCID-uhnk-v91u-p7e5
32
vulnerability VCID-uy24-k7je-pyhr
33
vulnerability VCID-wr9p-x4sm-aqdh
34
vulnerability VCID-xb9q-dk8j-fbch
35
vulnerability VCID-y4qf-qfbv-mqdg
36
vulnerability VCID-ysfs-xxjz-vbep
37
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3
1
url pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
purl pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6xf8-49hw-hfaf
1
vulnerability VCID-a9r6-k8gp-nbfs
2
vulnerability VCID-b35u-t7u2-sudy
3
vulnerability VCID-dcxj-zzfj-3bg7
4
vulnerability VCID-hutw-rk7x-5bc3
5
vulnerability VCID-m8ha-zxb7-tyg6
6
vulnerability VCID-nn4w-gq71-kfgd
7
vulnerability VCID-nx21-ks3v-53e4
8
vulnerability VCID-s148-7tzs-gfg8
9
vulnerability VCID-tsw4-kqbc-kqf1
10
vulnerability VCID-uy24-k7je-pyhr
11
vulnerability VCID-wr9p-x4sm-aqdh
12
vulnerability VCID-xb9q-dk8j-fbch
13
vulnerability VCID-y4qf-qfbv-mqdg
14
vulnerability VCID-ysfs-xxjz-vbep
15
vulnerability VCID-zpnw-kwqf-63bp
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2
2
url pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
purl pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
5
vulnerability VCID-y4qf-qfbv-mqdg
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1
aliases CVE-2014-9747
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zpnw-kwqf-63bp
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1