Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1049017?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "type": "deb", "namespace": "debian", "name": "freetype", "version": "2.6.3-3.2+deb9u1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.12.1+dfsg-5+deb12u4", "latest_non_vulnerable_version": "2.12.1+dfsg-5+deb12u4", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57318?format=api", "vulnerability_id": "VCID-dcxj-zzfj-3bg7", "summary": "Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27406.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27406.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27406", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35967", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35996", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35828", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35878", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35901", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35907", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35865", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35842", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35881", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35869", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27406" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183", "reference_id": "1010183", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077985", "reference_id": "2077985", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077985" }, { "reference_url": "https://security.gentoo.org/glsa/202402-06", "reference_id": "GLSA-202402-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7745", "reference_id": "RHSA-2022:7745", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7745" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8340", "reference_id": "RHSA-2022:8340", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8340" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0420", "reference_id": "RHSA-2024:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0420" }, { "reference_url": "https://usn.ubuntu.com/5453-1/", "reference_id": "USN-5453-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5453-1/" }, { "reference_url": "https://usn.ubuntu.com/5528-1/", "reference_id": "USN-5528-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5528-1/" }, { "reference_url": "https://usn.ubuntu.com/7352-2/", "reference_id": "USN-7352-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7352-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051184?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1" } ], "aliases": [ "CVE-2022-27406" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dcxj-zzfj-3bg7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32428?format=api", "vulnerability_id": "VCID-nx21-ks3v-53e4", "summary": "Heap buffer overflow in CefSharp\n### Impact\nA memory corruption bug(Heap overflow) in the FreeType font rendering library.\n\n> This can be exploited by attackers to execute arbitrary code by using specially crafted fonts with embedded PNG images .\n\nAs per https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/ \n\nGoogle is aware of reports that an exploit for CVE-2020-15999 exists in the wild.\n\n### Patches\nUpgrade to 85.3.130 or higher\n\n### References\n- https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/\n- https://www.zdnet.com/article/google-releases-chrome-security-update-to-patch-actively-exploited-zero-day/\n- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999\n- https://magpcss.org/ceforum/viewtopic.php?f=10&t=17942\n\nTo review the `CEF/Chromium` patch see https://bitbucket.org/chromiumembedded/cef/commits/cd6cbe008b127990036945fb75e7c2c1594ab10d", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15999", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.92905", "scoring_system": "epss", "scoring_elements": "0.99772", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.92905", "scoring_system": "epss", "scoring_elements": "0.99773", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.92905", "scoring_system": "epss", "scoring_elements": "0.99771", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.92931", "scoring_system": "epss", "scoring_elements": "0.99772", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.92931", "scoring_system": "epss", "scoring_elements": "0.99774", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.92931", "scoring_system": "epss", "scoring_elements": "0.99773", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15999" }, { "reference_url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html" }, { "reference_url": "https://crbug.com/1139963", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://crbug.com/1139963" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576" }, { "reference_url": "http://seclists.org/fulldisclosure/2020/Nov/33", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "http://seclists.org/fulldisclosure/2020/Nov/33" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/cefsharp/CefSharp", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/cefsharp/CefSharp" }, { "reference_url": "https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62" }, { "reference_url": "https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15999", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15999" }, { "reference_url": "https://security.gentoo.org/glsa/202011-12", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://security.gentoo.org/glsa/202011-12" }, { "reference_url": "https://security.gentoo.org/glsa/202012-04", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://security.gentoo.org/glsa/202012-04" }, { "reference_url": "https://security.gentoo.org/glsa/202401-19", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://security.gentoo.org/glsa/202401-19" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240812-0001", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20240812-0001" }, { "reference_url": "https://www.debian.org/security/2021/dsa-4824", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://www.debian.org/security/2021/dsa-4824" }, { "reference_url": "https://www.nuget.org/packages/CefSharp.Common", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.nuget.org/packages/CefSharp.Common" }, { "reference_url": "https://www.nuget.org/packages/CefSharp.WinForms", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.nuget.org/packages/CefSharp.WinForms" }, { "reference_url": "https://www.nuget.org/packages/CefSharp.Wpf", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.nuget.org/packages/CefSharp.Wpf" }, { "reference_url": "https://www.nuget.org/packages/CefSharp.Wpf.HwndHost", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.nuget.org/packages/CefSharp.Wpf.HwndHost" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890210", "reference_id": "1890210", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1890210" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586", "reference_id": "972586", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586" }, { "reference_url": "https://security.archlinux.org/ASA-202010-10", "reference_id": "ASA-202010-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202010-10" }, { "reference_url": "https://security.archlinux.org/ASA-202010-11", "reference_id": "ASA-202010-11", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202010-11" }, { "reference_url": "https://security.archlinux.org/ASA-202011-12", "reference_id": "ASA-202011-12", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202011-12" }, { "reference_url": "https://security.archlinux.org/AVG-1254", "reference_id": "AVG-1254", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1254" }, { "reference_url": "https://security.archlinux.org/AVG-1255", "reference_id": "AVG-1255", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1255" }, { "reference_url": "https://security.archlinux.org/AVG-1279", "reference_id": "AVG-1279", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1279" }, { "reference_url": "https://github.com/advisories/GHSA-pv36-h7jh-qm62", "reference_id": "GHSA-pv36-h7jh-qm62", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-pv36-h7jh-qm62" }, { "reference_url": "https://security.gentoo.org/glsa/202010-07", "reference_id": "GLSA-202010-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202010-07" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/", "reference_id": "J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7", "reference_type": "", "scores": [ { "value": "9.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-50", "reference_id": "mfsa2020-50", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-50" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-51", "reference_id": "mfsa2020-51", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-51" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-52", "reference_id": "mfsa2020-52", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2020-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4351", "reference_id": "RHSA-2020:4351", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4351" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4907", "reference_id": "RHSA-2020:4907", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4907" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4949", "reference_id": "RHSA-2020:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4950", "reference_id": "RHSA-2020:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4951", "reference_id": "RHSA-2020:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4952", "reference_id": "RHSA-2020:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4952" }, { "reference_url": "https://usn.ubuntu.com/4593-1/", "reference_id": "USN-4593-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4593-1/" }, { "reference_url": "https://usn.ubuntu.com/4593-2/", "reference_id": "USN-4593-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4593-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049018?format=api", "purl": "pkg:deb/debian/freetype@2.9.1-3%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.9.1-3%252Bdeb10u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1051184?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1" } ], "aliases": [ "CVE-2020-15999", "GHSA-pv36-h7jh-qm62" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nx21-ks3v-53e4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57317?format=api", "vulnerability_id": "VCID-s148-7tzs-gfg8", "summary": "Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27405.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27405.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27405", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2594", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25982", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25749", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2582", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25872", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25882", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25841", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25785", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.25788", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00092", "scoring_system": "epss", "scoring_elements": "0.2577", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183", "reference_id": "1010183", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077991", "reference_id": "2077991", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077991" }, { "reference_url": "https://security.gentoo.org/glsa/202402-06", "reference_id": "GLSA-202402-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7745", "reference_id": "RHSA-2022:7745", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7745" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8340", "reference_id": "RHSA-2022:8340", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8340" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0420", "reference_id": "RHSA-2024:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0420" }, { "reference_url": "https://usn.ubuntu.com/5528-1/", "reference_id": "USN-5528-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5528-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051184?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1" } ], "aliases": [ "CVE-2022-27405" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s148-7tzs-gfg8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36363?format=api", "vulnerability_id": "VCID-uy24-k7je-pyhr", "summary": "A vulnerability has been discovered in FreeType, which can lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27363.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27363.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27363", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.63439", "scoring_system": "epss", "scoring_elements": "0.98415", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.63439", "scoring_system": "epss", "scoring_elements": "0.98411", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.63439", "scoring_system": "epss", "scoring_elements": "0.98416", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.64976", "scoring_system": "epss", "scoring_elements": "0.98459", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.64976", "scoring_system": "epss", "scoring_elements": "0.98462", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.64976", "scoring_system": "epss", "scoring_elements": "0.98464", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.64976", "scoring_system": "epss", "scoring_elements": "0.98467", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.64976", "scoring_system": "epss", "scoring_elements": "0.98468", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-27363" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351357", "reference_id": "2351357", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351357" }, { "reference_url": "https://security.archlinux.org/ASA-202505-11", "reference_id": "ASA-202505-11", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202505-11" }, { "reference_url": "https://security.archlinux.org/AVG-2877", "reference_id": "AVG-2877", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2877" }, { "reference_url": "https://www.facebook.com/security/advisories/cve-2025-27363", "reference_id": "cve-2025-27363", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-05-07T03:55:53Z/" } ], "url": "https://www.facebook.com/security/advisories/cve-2025-27363" }, { "reference_url": "https://security.gentoo.org/glsa/202505-07", "reference_id": "GLSA-202505-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202505-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3382", "reference_id": "RHSA-2025:3382", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3383", "reference_id": "RHSA-2025:3383", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3383" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3384", "reference_id": "RHSA-2025:3384", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3384" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3385", "reference_id": "RHSA-2025:3385", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3385" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3386", "reference_id": "RHSA-2025:3386", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3386" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3387", "reference_id": "RHSA-2025:3387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3393", "reference_id": "RHSA-2025:3393", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3393" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3395", "reference_id": "RHSA-2025:3395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3395" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3407", "reference_id": "RHSA-2025:3407", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3407" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3421", "reference_id": "RHSA-2025:3421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8195", "reference_id": "RHSA-2025:8195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8219", "reference_id": "RHSA-2025:8219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8219" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8253", "reference_id": "RHSA-2025:8253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8292", "reference_id": "RHSA-2025:8292", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8292" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:9380", "reference_id": "RHSA-2025:9380", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:9380" }, { "reference_url": "https://usn.ubuntu.com/7352-1/", "reference_id": "USN-7352-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7352-1/" }, { "reference_url": "https://usn.ubuntu.com/7352-2/", "reference_id": "USN-7352-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7352-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1056064?format=api", "purl": "pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4" } ], "aliases": [ "CVE-2025-27363" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uy24-k7je-pyhr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57316?format=api", "vulnerability_id": "VCID-xb9q-dk8j-fbch", "summary": "Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27404.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27404.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27404", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31668", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31713", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31531", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31584", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31614", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31618", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31576", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31539", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31574", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00124", "scoring_system": "epss", "scoring_elements": "0.31551", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-27404" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183", "reference_id": "1010183", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077989", "reference_id": "2077989", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077989" }, { "reference_url": "https://security.gentoo.org/glsa/202402-06", "reference_id": "GLSA-202402-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7745", "reference_id": "RHSA-2022:7745", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7745" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8340", "reference_id": "RHSA-2022:8340", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8340" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0420", "reference_id": "RHSA-2024:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0420" }, { "reference_url": "https://usn.ubuntu.com/5528-1/", "reference_id": "USN-5528-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5528-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051184?format=api", "purl": "pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hgm7-qrp2-c3g8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1" } ], "aliases": [ "CVE-2022-27404" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xb9q-dk8j-fbch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83705?format=api", "vulnerability_id": "VCID-y4qf-qfbv-mqdg", "summary": "freetype: NULL pointer dereference in the Ins_GETVARIATION() function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6942.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6942.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6942", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41717", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41695", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00197", "scoring_system": "epss", "scoring_elements": "0.41742", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49131", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49113", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49167", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49164", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49181", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49155", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49098", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.4916", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-6942" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544771", "reference_id": "1544771", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544771" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890450", "reference_id": "890450", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890450" }, { "reference_url": "https://security.archlinux.org/ASA-201805-3", "reference_id": "ASA-201805-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201805-3" }, { "reference_url": "https://security.archlinux.org/AVG-613", "reference_id": "AVG-613", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-613" }, { "reference_url": "https://usn.ubuntu.com/3572-1/", "reference_id": "USN-3572-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3572-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049018?format=api", "purl": "pkg:deb/debian/freetype@2.9.1-3%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.9.1-3%252Bdeb10u3" } ], "aliases": [ "CVE-2018-6942" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y4qf-qfbv-mqdg" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61655?format=api", "vulnerability_id": "VCID-6xf8-49hw-hfaf", "summary": "Multiple vulnerabilities have been found in FreeType, the worst of\n which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10244.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10244.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10244", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66463", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66502", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66527", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66499", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66547", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66561", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.6658", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66568", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66536", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66572", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66589", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429965", "reference_id": "1429965", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1429965" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856971", "reference_id": "856971", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856971" }, { "reference_url": "https://security.gentoo.org/glsa/201706-14", "reference_id": "GLSA-201706-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201706-14" }, { "reference_url": "https://usn.ubuntu.com/3237-1/", "reference_id": "USN-3237-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3237-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2016-10244" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6xf8-49hw-hfaf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82140?format=api", "vulnerability_id": "VCID-a9r6-k8gp-nbfs", "summary": "freetype: a heap-based buffer over-read in tt_cmap14_validate in sfnt/ttcmap.c may lead to a DoS", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9383.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9383.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9383", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85895", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85984", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85966", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85961", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.8598", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85906", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85923", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85925", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85944", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85954", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02734", "scoring_system": "epss", "scoring_elements": "0.85968", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9383" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html" }, { "reference_url": "https://savannah.nongnu.org/bugs/?46346", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?46346" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763613", "reference_id": "1763613", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763613" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9383", "reference_id": "CVE-2015-9383", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9383" }, { "reference_url": "https://usn.ubuntu.com/4126-1/", "reference_id": "USN-4126-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4126-1/" }, { "reference_url": "https://usn.ubuntu.com/4126-2/", "reference_id": "USN-4126-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4126-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2015-9383" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a9r6-k8gp-nbfs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58974?format=api", "vulnerability_id": "VCID-b35u-t7u2-sudy", "summary": "security update", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8b281f83e8516535756f92dbf90940ac44bd45e1" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9746.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9746.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9746", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74771", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74727", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74764", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74684", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74687", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74714", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.7472", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74734", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74757", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00842", "scoring_system": "epss", "scoring_elements": "0.74736", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://savannah.nongnu.org/bugs/?41309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?41309" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3370", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3370" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/11/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/09/11/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/25/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/09/25/4" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262373", "reference_id": "1262373", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262373" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619", "reference_id": "798619", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9746", "reference_id": "CVE-2014-9746", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9746" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2014-9746" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b35u-t7u2-sudy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58972?format=api", "vulnerability_id": "VCID-hutw-rk7x-5bc3", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9745.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9745.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9745", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02361", "scoring_system": "epss", "scoring_elements": "0.84887", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02361", "scoring_system": "epss", "scoring_elements": "0.84889", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02361", "scoring_system": "epss", "scoring_elements": "0.84854", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02361", "scoring_system": "epss", "scoring_elements": "0.84869", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.8637", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86365", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86382", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86386", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86349", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86359", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02908", "scoring_system": "epss", "scoring_elements": "0.86373", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262377", "reference_id": "1262377", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262377" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798620", "reference_id": "798620", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798620" }, { "reference_url": "https://usn.ubuntu.com/2739-1/", "reference_id": "USN-2739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2739-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2014-9745" ], "risk_score": 0.6, "exploitability": "0.5", "weighted_severity": "1.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hutw-rk7x-5bc3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61660?format=api", "vulnerability_id": "VCID-m8ha-zxb7-tyg6", "summary": "Multiple vulnerabilities have been found in FreeType, the worst of\n which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8105.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8105.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8105", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81728", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81831", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.8176", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81786", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81792", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81811", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81799", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81794", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81739", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01616", "scoring_system": "epss", "scoring_elements": "0.81762", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8105" }, { "reference_url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=935" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3839", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-3839" }, { "reference_url": "http://www.securityfocus.com/bid/99093", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/99093" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446500", "reference_id": "1446500", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446500" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861220", "reference_id": "861220", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861220" }, { "reference_url": "https://security.archlinux.org/ASA-201705-10", "reference_id": "ASA-201705-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-10" }, { "reference_url": "https://security.archlinux.org/ASA-201705-7", "reference_id": "ASA-201705-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-7" }, { "reference_url": "https://security.archlinux.org/AVG-257", "reference_id": "AVG-257", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-257" }, { "reference_url": "https://security.archlinux.org/AVG-258", "reference_id": "AVG-258", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-258" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8105", "reference_id": "CVE-2017-8105", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8105" }, { "reference_url": "https://security.gentoo.org/glsa/201706-14", "reference_id": "GLSA-201706-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201706-14" }, { "reference_url": "https://usn.ubuntu.com/3282-1/", "reference_id": "USN-3282-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3282-1/" }, { "reference_url": "https://usn.ubuntu.com/3282-2/", "reference_id": "USN-3282-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3282-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2017-8105" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m8ha-zxb7-tyg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82320?format=api", "vulnerability_id": "VCID-nn4w-gq71-kfgd", "summary": "freetype: buffer over-read in function T1_Get_Private_Dict in type1/t1parse.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9290.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9290.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9290", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65886", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65927", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65958", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65924", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65975", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65987", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.66006", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65993", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65962", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65997", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.66011", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9290" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9290", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9290" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741802", "reference_id": "1741802", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1741802" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2015-9290" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nn4w-gq71-kfgd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82082?format=api", "vulnerability_id": "VCID-tsw4-kqbc-kqf1", "summary": "freetype: a heap-based buffer over-read in T1_Get_Private_Dict in type1/t1parse.c leading to crash", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9381.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9381", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.722", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72294", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72256", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72242", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72285", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72205", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72225", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72201", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72237", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72249", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72272", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9381" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9381" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html" }, { "reference_url": "https://savannah.nongnu.org/bugs/?45955", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?45955" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752788", "reference_id": "1752788", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752788" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9381", "reference_id": "CVE-2015-9381", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9381" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140", "reference_id": "RHSA-2018:3140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3140" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:4254", "reference_id": "RHSA-2019:4254", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:4254" }, { "reference_url": "https://usn.ubuntu.com/4126-2/", "reference_id": "USN-4126-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4126-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2015-9381" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tsw4-kqbc-kqf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61661?format=api", "vulnerability_id": "VCID-wr9p-x4sm-aqdh", "summary": "Multiple vulnerabilities have been found in FreeType, the worst of\n which allows remote attackers to execute arbitrary code.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8287.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8287.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8287", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73951", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74048", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73989", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74002", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74024", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74006", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73999", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.74039", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73958", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73984", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00797", "scoring_system": "epss", "scoring_elements": "0.73955", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8287" }, { "reference_url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=941" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3839", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-3839" }, { "reference_url": "http://www.securityfocus.com/bid/99091", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/99091" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446073", "reference_id": "1446073", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1446073" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861308", "reference_id": "861308", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861308" }, { "reference_url": "https://security.archlinux.org/ASA-201705-10", "reference_id": "ASA-201705-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-10" }, { "reference_url": "https://security.archlinux.org/ASA-201705-7", "reference_id": "ASA-201705-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-7" }, { "reference_url": "https://security.archlinux.org/AVG-257", "reference_id": "AVG-257", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-257" }, { "reference_url": "https://security.archlinux.org/AVG-258", "reference_id": "AVG-258", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-258" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8287", "reference_id": "CVE-2017-8287", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8287" }, { "reference_url": "https://security.gentoo.org/glsa/201706-14", "reference_id": "GLSA-201706-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201706-14" }, { "reference_url": "https://usn.ubuntu.com/3282-1/", "reference_id": "USN-3282-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3282-1/" }, { "reference_url": "https://usn.ubuntu.com/3282-2/", "reference_id": "USN-3282-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3282-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2017-8287" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wr9p-x4sm-aqdh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82139?format=api", "vulnerability_id": "VCID-ysfs-xxjz-vbep", "summary": "freetype: mishandling ps_parser_skip_PS_token in an FT_New_Memory_Face operation in skip_comment, psaux/psobjs.c, leads to a buffer over-read", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-9382.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9382", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.73965", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74063", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74021", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74014", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74054", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.73972", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.73998", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.73969", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74003", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74017", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74039", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-9382" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9382" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00002.html" }, { "reference_url": "https://savannah.nongnu.org/bugs/?45922", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?45922" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763609", "reference_id": "1763609", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763609" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9382", "reference_id": "CVE-2015-9382", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9382" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140", "reference_id": "RHSA-2018:3140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3140" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:4254", "reference_id": "RHSA-2019:4254", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:4254" }, { "reference_url": "https://usn.ubuntu.com/4126-2/", "reference_id": "USN-4126-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4126-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2015-9382" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ysfs-xxjz-vbep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58976?format=api", "vulnerability_id": "VCID-zpnw-kwqf-63bp", "summary": "security update", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/tree/src/type42/t42parse.c?id=8b281f83e8516535756f92dbf90940ac44bd45e1" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9747.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9747.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9747", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78062", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78028", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78063", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.77971", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.77979", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78008", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.7799", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78016", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78021", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78048", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.7803", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9745" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9747" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://savannah.nongnu.org/bugs/?41309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?41309" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3370", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3370" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/11/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/09/11/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/09/25/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/09/25/4" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262373", "reference_id": "1262373", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1262373" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619", "reference_id": "798619", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798619" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9747", "reference_id": "CVE-2014-9747", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9747" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/571392?format=api", "purl": "pkg:deb/debian/freetype@2.4.9-1.1%2Bdeb7u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-17au-pc1k-m7at" }, { "vulnerability": "VCID-1ws8-ww77-ybah" }, { "vulnerability": "VCID-3jn7-t1f6-uyfr" }, { "vulnerability": "VCID-468g-dxsr-8yer" }, { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-73d5-ezt5-87eh" }, { "vulnerability": "VCID-73e1-scax-8ugj" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-ask2-xeb7-7qbk" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-fp2p-5ymf-wffj" }, { "vulnerability": "VCID-gtka-sbgw-tuf5" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-jg4p-nv1j-fyb9" }, { "vulnerability": "VCID-jn9w-2axj-8ke5" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nakp-vmxa-akey" }, { "vulnerability": "VCID-nfp7-sjcv-wkfv" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-p2yw-ksc4-jfe9" }, { "vulnerability": "VCID-p8h9-9xku-hbhv" }, { "vulnerability": "VCID-pznp-81q7-z3d4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-th47-m45d-m7dk" }, { "vulnerability": "VCID-tmb5-g2ua-ekek" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-tu7r-tsp8-73ew" }, { "vulnerability": "VCID-u15r-u7zz-17ad" }, { "vulnerability": "VCID-uh3u-pzzg-fkgg" }, { "vulnerability": "VCID-uhnk-v91u-p7e5" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.4.9-1.1%252Bdeb7u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1035561?format=api", "purl": "pkg:deb/debian/freetype@2.5.2-3%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6xf8-49hw-hfaf" }, { "vulnerability": "VCID-a9r6-k8gp-nbfs" }, { "vulnerability": "VCID-b35u-t7u2-sudy" }, { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-hutw-rk7x-5bc3" }, { "vulnerability": "VCID-m8ha-zxb7-tyg6" }, { "vulnerability": "VCID-nn4w-gq71-kfgd" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-tsw4-kqbc-kqf1" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-wr9p-x4sm-aqdh" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" }, { "vulnerability": "VCID-ysfs-xxjz-vbep" }, { "vulnerability": "VCID-zpnw-kwqf-63bp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.5.2-3%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1049017?format=api", "purl": "pkg:deb/debian/freetype@2.6.3-3.2%2Bdeb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-dcxj-zzfj-3bg7" }, { "vulnerability": "VCID-nx21-ks3v-53e4" }, { "vulnerability": "VCID-s148-7tzs-gfg8" }, { "vulnerability": "VCID-uy24-k7je-pyhr" }, { "vulnerability": "VCID-xb9q-dk8j-fbch" }, { "vulnerability": "VCID-y4qf-qfbv-mqdg" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" } ], "aliases": [ "CVE-2014-9747" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zpnw-kwqf-63bp" } ], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.6.3-3.2%252Bdeb9u1" }