Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
Typedeb
Namespacedebian
Namefreetype
Version2.10.4+dfsg-1+deb11u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.12.1+dfsg-5+deb12u4
Latest_non_vulnerable_version2.12.1+dfsg-5+deb12u4
Affected_by_vulnerabilities
0
url VCID-hgm7-qrp2-c3g8
vulnerability_id VCID-hgm7-qrp2-c3g8
summary ftbench.c in FreeType Demo Programs through 2.12.1 has a heap-based buffer overflow.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31782
reference_id
reference_type
scores
0
value 0.00312
scoring_system epss
scoring_elements 0.54411
published_at 2026-04-21T12:55:00Z
1
value 0.00312
scoring_system epss
scoring_elements 0.54325
published_at 2026-04-02T12:55:00Z
2
value 0.00312
scoring_system epss
scoring_elements 0.54355
published_at 2026-04-04T12:55:00Z
3
value 0.00312
scoring_system epss
scoring_elements 0.5433
published_at 2026-04-07T12:55:00Z
4
value 0.00312
scoring_system epss
scoring_elements 0.54382
published_at 2026-04-08T12:55:00Z
5
value 0.00312
scoring_system epss
scoring_elements 0.54377
published_at 2026-04-09T12:55:00Z
6
value 0.00312
scoring_system epss
scoring_elements 0.54426
published_at 2026-04-11T12:55:00Z
7
value 0.00312
scoring_system epss
scoring_elements 0.54408
published_at 2026-04-12T12:55:00Z
8
value 0.00312
scoring_system epss
scoring_elements 0.54386
published_at 2026-04-13T12:55:00Z
9
value 0.00312
scoring_system epss
scoring_elements 0.54425
published_at 2026-04-16T12:55:00Z
10
value 0.00312
scoring_system epss
scoring_elements 0.54429
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31782
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31782
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://usn.ubuntu.com/5528-1/
reference_id USN-5528-1
reference_type
scores
url https://usn.ubuntu.com/5528-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4
aliases CVE-2022-31782
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hgm7-qrp2-c3g8
1
url VCID-uy24-k7je-pyhr
vulnerability_id VCID-uy24-k7je-pyhr
summary A vulnerability has been discovered in FreeType, which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27363.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-27363.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-27363
reference_id
reference_type
scores
0
value 0.63439
scoring_system epss
scoring_elements 0.98411
published_at 2026-04-13T12:55:00Z
1
value 0.63439
scoring_system epss
scoring_elements 0.98416
published_at 2026-04-16T12:55:00Z
2
value 0.63439
scoring_system epss
scoring_elements 0.98415
published_at 2026-04-18T12:55:00Z
3
value 0.64976
scoring_system epss
scoring_elements 0.98464
published_at 2026-04-07T12:55:00Z
4
value 0.64976
scoring_system epss
scoring_elements 0.98459
published_at 2026-04-02T12:55:00Z
5
value 0.64976
scoring_system epss
scoring_elements 0.98462
published_at 2026-04-04T12:55:00Z
6
value 0.64976
scoring_system epss
scoring_elements 0.98467
published_at 2026-04-08T12:55:00Z
7
value 0.64976
scoring_system epss
scoring_elements 0.98468
published_at 2026-04-09T12:55:00Z
8
value 0.68721
scoring_system epss
scoring_elements 0.98627
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-27363
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27363
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2351357
reference_id 2351357
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2351357
5
reference_url https://security.archlinux.org/ASA-202505-11
reference_id ASA-202505-11
reference_type
scores
url https://security.archlinux.org/ASA-202505-11
6
reference_url https://security.archlinux.org/AVG-2877
reference_id AVG-2877
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2877
7
reference_url https://www.facebook.com/security/advisories/cve-2025-27363
reference_id cve-2025-27363
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:N/MAC:L/MPR:N/MUI:N/MS:U/MC:H/MI:H/MA:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-05-07T03:55:53Z/
url https://www.facebook.com/security/advisories/cve-2025-27363
8
reference_url https://security.gentoo.org/glsa/202505-07
reference_id GLSA-202505-07
reference_type
scores
url https://security.gentoo.org/glsa/202505-07
9
reference_url https://access.redhat.com/errata/RHSA-2025:3382
reference_id RHSA-2025:3382
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3382
10
reference_url https://access.redhat.com/errata/RHSA-2025:3383
reference_id RHSA-2025:3383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3383
11
reference_url https://access.redhat.com/errata/RHSA-2025:3384
reference_id RHSA-2025:3384
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3384
12
reference_url https://access.redhat.com/errata/RHSA-2025:3385
reference_id RHSA-2025:3385
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3385
13
reference_url https://access.redhat.com/errata/RHSA-2025:3386
reference_id RHSA-2025:3386
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3386
14
reference_url https://access.redhat.com/errata/RHSA-2025:3387
reference_id RHSA-2025:3387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3387
15
reference_url https://access.redhat.com/errata/RHSA-2025:3393
reference_id RHSA-2025:3393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3393
16
reference_url https://access.redhat.com/errata/RHSA-2025:3395
reference_id RHSA-2025:3395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3395
17
reference_url https://access.redhat.com/errata/RHSA-2025:3407
reference_id RHSA-2025:3407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3407
18
reference_url https://access.redhat.com/errata/RHSA-2025:3421
reference_id RHSA-2025:3421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3421
19
reference_url https://access.redhat.com/errata/RHSA-2025:8195
reference_id RHSA-2025:8195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8195
20
reference_url https://access.redhat.com/errata/RHSA-2025:8219
reference_id RHSA-2025:8219
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8219
21
reference_url https://access.redhat.com/errata/RHSA-2025:8253
reference_id RHSA-2025:8253
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8253
22
reference_url https://access.redhat.com/errata/RHSA-2025:8292
reference_id RHSA-2025:8292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8292
23
reference_url https://access.redhat.com/errata/RHSA-2025:9380
reference_id RHSA-2025:9380
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9380
24
reference_url https://usn.ubuntu.com/7352-1/
reference_id USN-7352-1
reference_type
scores
url https://usn.ubuntu.com/7352-1/
25
reference_url https://usn.ubuntu.com/7352-2/
reference_id USN-7352-2
reference_type
scores
url https://usn.ubuntu.com/7352-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4
purl pkg:deb/debian/freetype@2.12.1%2Bdfsg-5%2Bdeb12u4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.12.1%252Bdfsg-5%252Bdeb12u4
aliases CVE-2025-27363
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uy24-k7je-pyhr
Fixing_vulnerabilities
0
url VCID-dcxj-zzfj-3bg7
vulnerability_id VCID-dcxj-zzfj-3bg7
summary Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27406.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27406.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27406
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35967
published_at 2026-04-02T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.35996
published_at 2026-04-04T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.35828
published_at 2026-04-07T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.35878
published_at 2026-04-08T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35901
published_at 2026-04-09T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35907
published_at 2026-04-11T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35865
published_at 2026-04-12T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35842
published_at 2026-04-13T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35881
published_at 2026-04-16T12:55:00Z
9
value 0.00152
scoring_system epss
scoring_elements 0.35869
published_at 2026-04-18T12:55:00Z
10
value 0.00152
scoring_system epss
scoring_elements 0.35819
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27406
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27406
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
reference_id 1010183
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2077985
reference_id 2077985
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2077985
6
reference_url https://security.gentoo.org/glsa/202402-06
reference_id GLSA-202402-06
reference_type
scores
url https://security.gentoo.org/glsa/202402-06
7
reference_url https://access.redhat.com/errata/RHSA-2022:7745
reference_id RHSA-2022:7745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7745
8
reference_url https://access.redhat.com/errata/RHSA-2022:8340
reference_id RHSA-2022:8340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8340
9
reference_url https://access.redhat.com/errata/RHSA-2024:0420
reference_id RHSA-2024:0420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0420
10
reference_url https://usn.ubuntu.com/5453-1/
reference_id USN-5453-1
reference_type
scores
url https://usn.ubuntu.com/5453-1/
11
reference_url https://usn.ubuntu.com/5528-1/
reference_id USN-5528-1
reference_type
scores
url https://usn.ubuntu.com/5528-1/
12
reference_url https://usn.ubuntu.com/7352-2/
reference_id USN-7352-2
reference_type
scores
url https://usn.ubuntu.com/7352-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
1
vulnerability VCID-uy24-k7je-pyhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1
aliases CVE-2022-27406
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dcxj-zzfj-3bg7
1
url VCID-nx21-ks3v-53e4
vulnerability_id VCID-nx21-ks3v-53e4
summary
Heap buffer overflow in CefSharp
### Impact
A memory corruption bug(Heap overflow) in the FreeType font rendering library.

> This can be exploited by attackers to execute arbitrary code by using specially crafted fonts with embedded PNG images .

As per https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/ 

Google is aware of reports that an exploit for CVE-2020-15999 exists in the wild.

### Patches
Upgrade to 85.3.130 or higher

### References
- https://www.secpod.com/blog/chrome-zero-day-under-active-exploitation-patch-now/
- https://www.zdnet.com/article/google-releases-chrome-security-update-to-patch-actively-exploited-zero-day/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
- https://magpcss.org/ceforum/viewtopic.php?f=10&t=17942

To review the `CEF/Chromium` patch see https://bitbucket.org/chromiumembedded/cef/commits/cd6cbe008b127990036945fb75e7c2c1594ab10d
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00016.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-15999.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-15999
reference_id
reference_type
scores
0
value 0.92905
scoring_system epss
scoring_elements 0.99772
published_at 2026-04-16T12:55:00Z
1
value 0.92905
scoring_system epss
scoring_elements 0.99773
published_at 2026-04-21T12:55:00Z
2
value 0.92905
scoring_system epss
scoring_elements 0.99771
published_at 2026-04-12T12:55:00Z
3
value 0.92931
scoring_system epss
scoring_elements 0.99772
published_at 2026-04-04T12:55:00Z
4
value 0.92931
scoring_system epss
scoring_elements 0.99774
published_at 2026-04-08T12:55:00Z
5
value 0.92931
scoring_system epss
scoring_elements 0.99773
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-15999
3
reference_url https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
4
reference_url https://crbug.com/1139963
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://crbug.com/1139963
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15959
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15960
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15961
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15963
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15964
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15965
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15966
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15967
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15968
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15969
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15970
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15971
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15972
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15973
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15974
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15975
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15976
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15977
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15978
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15979
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15980
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15981
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15982
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15983
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15984
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15985
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15986
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15987
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15988
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15989
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15990
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15991
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15992
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16000
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16001
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16002
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16003
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16004
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16005
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16006
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16008
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16009
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16011
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16013
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16014
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16015
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16016
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16018
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16019
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16020
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16021
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16022
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16023
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16024
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16025
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16026
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16027
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16028
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16029
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16030
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16031
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16032
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16033
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16034
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16035
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16036
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16037
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16038
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16039
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16040
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16041
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36765
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6510
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6511
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6512
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6513
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6514
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6515
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6516
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6517
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6518
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6519
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6520
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6521
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6522
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6523
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6524
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6525
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6526
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6527
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6528
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6529
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6530
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6531
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6532
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6533
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6534
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6535
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6536
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6537
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6538
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6539
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6540
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6541
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6542
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6543
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6544
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6545
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6547
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6548
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6549
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6550
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6551
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6552
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6553
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6554
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6555
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6556
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6557
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6559
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6560
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6561
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6562
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6563
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6564
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6565
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6566
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6567
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6568
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6569
140
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6570
141
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6571
142
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6573
143
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6575
144
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6576
145
reference_url http://seclists.org/fulldisclosure/2020/Nov/33
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url http://seclists.org/fulldisclosure/2020/Nov/33
146
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
147
reference_url https://github.com/cefsharp/CefSharp
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/cefsharp/CefSharp
148
reference_url https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/cefsharp/CefSharp/security/advisories/GHSA-pv36-h7jh-qm62
149
reference_url https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://googleprojectzero.blogspot.com/p/rca-cve-2020-15999.html
150
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
151
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
152
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-15999
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-15999
153
reference_url https://security.gentoo.org/glsa/202011-12
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://security.gentoo.org/glsa/202011-12
154
reference_url https://security.gentoo.org/glsa/202012-04
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://security.gentoo.org/glsa/202012-04
155
reference_url https://security.gentoo.org/glsa/202401-19
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://security.gentoo.org/glsa/202401-19
156
reference_url https://security.netapp.com/advisory/ntap-20240812-0001
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20240812-0001
157
reference_url https://www.debian.org/security/2021/dsa-4824
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://www.debian.org/security/2021/dsa-4824
158
reference_url https://www.nuget.org/packages/CefSharp.Common
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/CefSharp.Common
159
reference_url https://www.nuget.org/packages/CefSharp.WinForms
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/CefSharp.WinForms
160
reference_url https://www.nuget.org/packages/CefSharp.Wpf
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/CefSharp.Wpf
161
reference_url https://www.nuget.org/packages/CefSharp.Wpf.HwndHost
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/CefSharp.Wpf.HwndHost
162
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1890210
reference_id 1890210
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1890210
163
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586
reference_id 972586
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972586
164
reference_url https://security.archlinux.org/ASA-202010-10
reference_id ASA-202010-10
reference_type
scores
url https://security.archlinux.org/ASA-202010-10
165
reference_url https://security.archlinux.org/ASA-202010-11
reference_id ASA-202010-11
reference_type
scores
url https://security.archlinux.org/ASA-202010-11
166
reference_url https://security.archlinux.org/ASA-202011-12
reference_id ASA-202011-12
reference_type
scores
url https://security.archlinux.org/ASA-202011-12
167
reference_url https://security.archlinux.org/AVG-1254
reference_id AVG-1254
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1254
168
reference_url https://security.archlinux.org/AVG-1255
reference_id AVG-1255
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1255
169
reference_url https://security.archlinux.org/AVG-1279
reference_id AVG-1279
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1279
170
reference_url https://github.com/advisories/GHSA-pv36-h7jh-qm62
reference_id GHSA-pv36-h7jh-qm62
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pv36-h7jh-qm62
171
reference_url https://security.gentoo.org/glsa/202010-07
reference_id GLSA-202010-07
reference_type
scores
url https://security.gentoo.org/glsa/202010-07
172
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/
reference_id J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T14:58:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J3QVIGAAJ4D62YEJAJJWMCCBCOQ6TVL7/
173
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
reference_id mfsa2020-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-50
174
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
reference_id mfsa2020-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-51
175
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
reference_id mfsa2020-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-52
176
reference_url https://access.redhat.com/errata/RHSA-2020:4351
reference_id RHSA-2020:4351
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4351
177
reference_url https://access.redhat.com/errata/RHSA-2020:4907
reference_id RHSA-2020:4907
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4907
178
reference_url https://access.redhat.com/errata/RHSA-2020:4949
reference_id RHSA-2020:4949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4949
179
reference_url https://access.redhat.com/errata/RHSA-2020:4950
reference_id RHSA-2020:4950
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4950
180
reference_url https://access.redhat.com/errata/RHSA-2020:4951
reference_id RHSA-2020:4951
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4951
181
reference_url https://access.redhat.com/errata/RHSA-2020:4952
reference_id RHSA-2020:4952
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4952
182
reference_url https://usn.ubuntu.com/4593-1/
reference_id USN-4593-1
reference_type
scores
url https://usn.ubuntu.com/4593-1/
183
reference_url https://usn.ubuntu.com/4593-2/
reference_id USN-4593-2
reference_type
scores
url https://usn.ubuntu.com/4593-2/
fixed_packages
0
url pkg:deb/debian/freetype@2.9.1-3%2Bdeb10u3
purl pkg:deb/debian/freetype@2.9.1-3%2Bdeb10u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-dcxj-zzfj-3bg7
1
vulnerability VCID-nx21-ks3v-53e4
2
vulnerability VCID-s148-7tzs-gfg8
3
vulnerability VCID-uy24-k7je-pyhr
4
vulnerability VCID-xb9q-dk8j-fbch
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.9.1-3%252Bdeb10u3
1
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
1
vulnerability VCID-uy24-k7je-pyhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1
aliases CVE-2020-15999, GHSA-pv36-h7jh-qm62
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nx21-ks3v-53e4
2
url VCID-s148-7tzs-gfg8
vulnerability_id VCID-s148-7tzs-gfg8
summary Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27405.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27405.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27405
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.2594
published_at 2026-04-02T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25982
published_at 2026-04-04T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25749
published_at 2026-04-07T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.2582
published_at 2026-04-08T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25872
published_at 2026-04-09T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25882
published_at 2026-04-11T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25841
published_at 2026-04-12T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25785
published_at 2026-04-13T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25788
published_at 2026-04-16T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.2577
published_at 2026-04-18T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25743
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27405
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27405
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
reference_id 1010183
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2077991
reference_id 2077991
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2077991
6
reference_url https://security.gentoo.org/glsa/202402-06
reference_id GLSA-202402-06
reference_type
scores
url https://security.gentoo.org/glsa/202402-06
7
reference_url https://access.redhat.com/errata/RHSA-2022:7745
reference_id RHSA-2022:7745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7745
8
reference_url https://access.redhat.com/errata/RHSA-2022:8340
reference_id RHSA-2022:8340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8340
9
reference_url https://access.redhat.com/errata/RHSA-2024:0420
reference_id RHSA-2024:0420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0420
10
reference_url https://usn.ubuntu.com/5528-1/
reference_id USN-5528-1
reference_type
scores
url https://usn.ubuntu.com/5528-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
1
vulnerability VCID-uy24-k7je-pyhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1
aliases CVE-2022-27405
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s148-7tzs-gfg8
3
url VCID-xb9q-dk8j-fbch
vulnerability_id VCID-xb9q-dk8j-fbch
summary Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27404.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-27404.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-27404
reference_id
reference_type
scores
0
value 0.00124
scoring_system epss
scoring_elements 0.31668
published_at 2026-04-02T12:55:00Z
1
value 0.00124
scoring_system epss
scoring_elements 0.31713
published_at 2026-04-04T12:55:00Z
2
value 0.00124
scoring_system epss
scoring_elements 0.31531
published_at 2026-04-07T12:55:00Z
3
value 0.00124
scoring_system epss
scoring_elements 0.31584
published_at 2026-04-08T12:55:00Z
4
value 0.00124
scoring_system epss
scoring_elements 0.31614
published_at 2026-04-09T12:55:00Z
5
value 0.00124
scoring_system epss
scoring_elements 0.31618
published_at 2026-04-11T12:55:00Z
6
value 0.00124
scoring_system epss
scoring_elements 0.31576
published_at 2026-04-12T12:55:00Z
7
value 0.00124
scoring_system epss
scoring_elements 0.31539
published_at 2026-04-13T12:55:00Z
8
value 0.00124
scoring_system epss
scoring_elements 0.31574
published_at 2026-04-16T12:55:00Z
9
value 0.00124
scoring_system epss
scoring_elements 0.31551
published_at 2026-04-18T12:55:00Z
10
value 0.00124
scoring_system epss
scoring_elements 0.31519
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-27404
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27404
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
reference_id 1010183
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1010183
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2077989
reference_id 2077989
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2077989
6
reference_url https://security.gentoo.org/glsa/202402-06
reference_id GLSA-202402-06
reference_type
scores
url https://security.gentoo.org/glsa/202402-06
7
reference_url https://access.redhat.com/errata/RHSA-2022:7745
reference_id RHSA-2022:7745
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7745
8
reference_url https://access.redhat.com/errata/RHSA-2022:8340
reference_id RHSA-2022:8340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8340
9
reference_url https://access.redhat.com/errata/RHSA-2024:0420
reference_id RHSA-2024:0420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0420
10
reference_url https://usn.ubuntu.com/5528-1/
reference_id USN-5528-1
reference_type
scores
url https://usn.ubuntu.com/5528-1/
fixed_packages
0
url pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
purl pkg:deb/debian/freetype@2.10.4%2Bdfsg-1%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-hgm7-qrp2-c3g8
1
vulnerability VCID-uy24-k7je-pyhr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1
aliases CVE-2022-27404
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xb9q-dk8j-fbch
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/freetype@2.10.4%252Bdfsg-1%252Bdeb11u1