Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/127752?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/127752?format=api", "purl": "pkg:rpm/redhat/freetype@2.2.1-25?arch=el5_5", "type": "rpm", "namespace": "redhat", "name": "freetype", "version": "2.2.1-25", "qualifiers": { "arch": "el5_5" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35785?format=api", "vulnerability_id": "VCID-3xz8-4wu5-fugq", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=6305b869d86ff415a33576df6d43729673c66eee" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2500.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2500", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85805", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.8568", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85692", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.8571", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85717", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85736", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85747", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85762", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85758", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85755", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85773", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85778", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85771", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85794", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85804", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2500" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://securitytracker.com/id?1024266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024266" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30263", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30263" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2070" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-963-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-963-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613167", "reference_id": "613167", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613167" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2500", "reference_id": "CVE-2010-2500", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2500" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0577", "reference_id": "RHSA-2010:0577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578", "reference_id": "RHSA-2010:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0578" }, { "reference_url": "https://usn.ubuntu.com/963-1/", "reference_id": "USN-963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/963-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-2500" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3xz8-4wu5-fugq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35790?format=api", "vulnerability_id": "VCID-57th-r73p-a3fy", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2-demos.git/commit/?id=b995299b73ba4cd259f221f500d4e63095508bec" }, { "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127912955808467&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127912955808467&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2527.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2527", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84883", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84752", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84767", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84786", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84788", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.8481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84817", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84835", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84832", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84827", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84848", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84849", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84847", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84873", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02329", "scoring_system": "epss", "scoring_elements": "0.84884", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2527" }, { "reference_url": "http://savannah.nongnu.org/bugs/?30054", "reference_id": "", "reference_type": "", "scores": [], "url": "http://savannah.nongnu.org/bugs/?30054" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://securitytracker.com/id?1024266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024266" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2070" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-963-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-963-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=614557", "reference_id": "614557", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=614557" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2527", "reference_id": "CVE-2010-2527", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2527" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0577", "reference_id": "RHSA-2010:0577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578", "reference_id": "RHSA-2010:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0578" }, { "reference_url": "https://usn.ubuntu.com/963-1/", "reference_id": "USN-963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/963-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-2527" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-57th-r73p-a3fy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35784?format=api", "vulnerability_id": "VCID-ahxa-yjxp-a7en", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=c69891a1345640096fbf396e8dd567fe879ce233" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f29f741efbba0a5ce2f16464f648fb8d026ed4c8" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2499.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2499.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2499", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87419", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.8733", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.8734", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87355", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87356", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87374", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87381", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87393", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87388", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87384", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87399", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87402", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87396", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87412", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87418", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2499" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://securitytracker.com/id?1024266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024266" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30248", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30248" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30249", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30249" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2070" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-963-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-963-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613162", "reference_id": "613162", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613162" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2499", "reference_id": "CVE-2010-2499", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2499" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578", "reference_id": "RHSA-2010:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0578" }, { "reference_url": "https://usn.ubuntu.com/963-1/", "reference_id": "USN-963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/963-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-2499" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ahxa-yjxp-a7en" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35791?format=api", "vulnerability_id": "VCID-gmk4-9sks-s3a5", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://freetype.sourceforge.net/index2.html#release-freetype-2.4.2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2541.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2541", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88809", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88818", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88834", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88837", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88854", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88859", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04292", "scoring_system": "epss", "scoring_elements": "0.88871", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04622", "scoring_system": "epss", "scoring_elements": "0.89299", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04622", "scoring_system": "epss", "scoring_elements": "0.89272", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04622", "scoring_system": "epss", "scoring_elements": "0.89303", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04622", "scoring_system": "epss", "scoring_elements": "0.89269", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04622", "scoring_system": "epss", "scoring_elements": "0.89282", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04622", "scoring_system": "epss", "scoring_elements": "0.89277", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04622", "scoring_system": "epss", "scoring_elements": "0.89295", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2541" }, { "reference_url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.launchpad.net/ubuntu/maverick/+source/freetype/+bug/617019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541" }, { "reference_url": "http://secunia.com/advisories/40982", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40982" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://securitytracker.com/id?1024266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024266" }, { "reference_url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/projects/freetype/files/freetype2/2.4.2/NEWS/view" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0577.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-972-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-972-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2106", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2106" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=617342", "reference_id": "617342", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=617342" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2541", "reference_id": "CVE-2010-2541", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2541" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0577", "reference_id": "RHSA-2010:0577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578", "reference_id": "RHSA-2010:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0578" }, { "reference_url": "https://usn.ubuntu.com/972-1/", "reference_id": "USN-972-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/972-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-2541" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gmk4-9sks-s3a5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35783?format=api", "vulnerability_id": "VCID-pzsb-3h3d-t7hq", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=8d22746c9e5af80ff4304aef440986403a5072e2" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2498.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2498.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2498", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85805", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.8568", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85692", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.8571", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85717", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85736", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85747", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85762", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85758", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85755", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85773", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85778", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85771", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85794", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02649", "scoring_system": "epss", "scoring_elements": "0.85804", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2498" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://securitytracker.com/id?1024266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024266" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30106", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30106" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2070" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-963-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-963-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613160", "reference_id": "613160", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613160" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2498", "reference_id": "CVE-2010-2498", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2498" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578", "reference_id": "RHSA-2010:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0578" }, { "reference_url": "https://usn.ubuntu.com/963-1/", "reference_id": "USN-963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/963-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-2498" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pzsb-3h3d-t7hq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35786?format=api", "vulnerability_id": "VCID-wbve-vpw4-tqhe", "summary": "Multiple vulnerabilities have been found in FreeType, allowing\n remote attackers to possibly execute arbitrary code or cause a Denial of\n Service.", "references": [ { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=5ef20c8c1d4de12a84b50ba497c2a358c90ec44b" }, { "reference_url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=b2ea64bcc6c385a8e8318f9c759450a07df58b6d" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.nongnu.org/archive/html/freetype/2010-07/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127905701201340&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127905701201340&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=127909326909362&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127909326909362&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2519.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2519.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2519", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89192", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89105", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89114", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89128", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89131", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89149", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89154", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89164", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.8916", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89157", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.8917", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89167", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89183", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0452", "scoring_system": "epss", "scoring_elements": "0.89189", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2519" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519" }, { "reference_url": "http://secunia.com/advisories/48951", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48951" }, { "reference_url": "http://securitytracker.com/id?1024266", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024266" }, { "reference_url": "https://savannah.nongnu.org/bugs/?30306", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.nongnu.org/bugs/?30306" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2070" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:137" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0578.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-963-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-963-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613194", "reference_id": "613194", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613194" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2519", "reference_id": "CVE-2010-2519", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2519" }, { "reference_url": "https://security.gentoo.org/glsa/201201-09", "reference_id": "GLSA-201201-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-09" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0578", "reference_id": "RHSA-2010:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0578" }, { "reference_url": "https://usn.ubuntu.com/963-1/", "reference_id": "USN-963-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/963-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-2519" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wbve-vpw4-tqhe" } ], "fixing_vulnerabilities": [], "risk_score": "3.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/freetype@2.2.1-25%3Farch=el5_5" }