Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/freetype@2.1.4-12?arch=el3
Typerpm
Namespaceredhat
Namefreetype
Version2.1.4-12
Qualifiers
arch el3
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3wjn-8gnc-gkhr
vulnerability_id VCID-3wjn-8gnc-gkhr
summary
Multiple vulnerabilities in FreeType might result in the remote execution
    of arbitrary code.
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
1
reference_url http://cvs.savannah.nongnu.org/viewvc/freetype2/src/truetype/ttgload.c?root=freetype&r1=1.177&r2=1.178
reference_id
reference_type
scores
url http://cvs.savannah.nongnu.org/viewvc/freetype2/src/truetype/ttgload.c?root=freetype&r1=1.177&r2=1.178
2
reference_url http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
3
reference_url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
4
reference_url http://lists.gnu.org/archive/html/freetype-devel/2007-04/msg00041.html
reference_id
reference_type
scores
url http://lists.gnu.org/archive/html/freetype-devel/2007-04/msg00041.html
5
reference_url http://osvdb.org/36509
reference_id
reference_type
scores
url http://osvdb.org/36509
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2754.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2754.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-2754
reference_id
reference_type
scores
0
value 0.41922
scoring_system epss
scoring_elements 0.97436
published_at 2026-04-16T12:55:00Z
1
value 0.41922
scoring_system epss
scoring_elements 0.97402
published_at 2026-04-01T12:55:00Z
2
value 0.41922
scoring_system epss
scoring_elements 0.97408
published_at 2026-04-02T12:55:00Z
3
value 0.41922
scoring_system epss
scoring_elements 0.97413
published_at 2026-04-04T12:55:00Z
4
value 0.41922
scoring_system epss
scoring_elements 0.97415
published_at 2026-04-07T12:55:00Z
5
value 0.41922
scoring_system epss
scoring_elements 0.97422
published_at 2026-04-08T12:55:00Z
6
value 0.41922
scoring_system epss
scoring_elements 0.97423
published_at 2026-04-09T12:55:00Z
7
value 0.41922
scoring_system epss
scoring_elements 0.97426
published_at 2026-04-11T12:55:00Z
8
value 0.41922
scoring_system epss
scoring_elements 0.97427
published_at 2026-04-12T12:55:00Z
9
value 0.41922
scoring_system epss
scoring_elements 0.97428
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-2754
8
reference_url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240200
reference_id
reference_type
scores
url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240200
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=502565
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=502565
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2754
11
reference_url http://secunia.com/advisories/25350
reference_id
reference_type
scores
url http://secunia.com/advisories/25350
12
reference_url http://secunia.com/advisories/25353
reference_id
reference_type
scores
url http://secunia.com/advisories/25353
13
reference_url http://secunia.com/advisories/25386
reference_id
reference_type
scores
url http://secunia.com/advisories/25386
14
reference_url http://secunia.com/advisories/25463
reference_id
reference_type
scores
url http://secunia.com/advisories/25463
15
reference_url http://secunia.com/advisories/25483
reference_id
reference_type
scores
url http://secunia.com/advisories/25483
16
reference_url http://secunia.com/advisories/25609
reference_id
reference_type
scores
url http://secunia.com/advisories/25609
17
reference_url http://secunia.com/advisories/25612
reference_id
reference_type
scores
url http://secunia.com/advisories/25612
18
reference_url http://secunia.com/advisories/25654
reference_id
reference_type
scores
url http://secunia.com/advisories/25654
19
reference_url http://secunia.com/advisories/25705
reference_id
reference_type
scores
url http://secunia.com/advisories/25705
20
reference_url http://secunia.com/advisories/25808
reference_id
reference_type
scores
url http://secunia.com/advisories/25808
21
reference_url http://secunia.com/advisories/25894
reference_id
reference_type
scores
url http://secunia.com/advisories/25894
22
reference_url http://secunia.com/advisories/25905
reference_id
reference_type
scores
url http://secunia.com/advisories/25905
23
reference_url http://secunia.com/advisories/26129
reference_id
reference_type
scores
url http://secunia.com/advisories/26129
24
reference_url http://secunia.com/advisories/26305
reference_id
reference_type
scores
url http://secunia.com/advisories/26305
25
reference_url http://secunia.com/advisories/28298
reference_id
reference_type
scores
url http://secunia.com/advisories/28298
26
reference_url http://secunia.com/advisories/30161
reference_id
reference_type
scores
url http://secunia.com/advisories/30161
27
reference_url http://secunia.com/advisories/35074
reference_id
reference_type
scores
url http://secunia.com/advisories/35074
28
reference_url http://secunia.com/advisories/35200
reference_id
reference_type
scores
url http://secunia.com/advisories/35200
29
reference_url http://secunia.com/advisories/35204
reference_id
reference_type
scores
url http://secunia.com/advisories/35204
30
reference_url http://secunia.com/advisories/35233
reference_id
reference_type
scores
url http://secunia.com/advisories/35233
31
reference_url https://issues.rpath.com/browse/RPL-1390
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-1390
32
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11325
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11325
33
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5532
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5532
34
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102967-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-102967-1
35
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-103171-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-103171-1
36
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200033-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200033-1
37
reference_url http://support.apple.com/kb/HT3549
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3549
38
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-330.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-330.htm
39
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.html
40
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.html
41
reference_url http://www.debian.org/security/2007/dsa-1302
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1302
42
reference_url http://www.debian.org/security/2007/dsa-1334
reference_id
reference_type
scores
url http://www.debian.org/security/2007/dsa-1334
43
reference_url http://www.gentoo.org/security/en/glsa/glsa-200705-22.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200705-22.xml
44
reference_url http://www.gentoo.org/security/en/glsa/glsa-200707-02.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200707-02.xml
45
reference_url http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
46
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:121
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:121
47
reference_url http://www.novell.com/linux/security/advisories/2007_41_freetype2.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_41_freetype2.html
48
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.018.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.018.html
49
reference_url http://www.redhat.com/support/errata/RHSA-2007-0403.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0403.html
50
reference_url http://www.redhat.com/support/errata/RHSA-2009-0329.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0329.html
51
reference_url http://www.redhat.com/support/errata/RHSA-2009-1062.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-1062.html
52
reference_url http://www.securityfocus.com/archive/1/469463/100/200/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/469463/100/200/threaded
53
reference_url http://www.securityfocus.com/archive/1/471286/30/6180/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/471286/30/6180/threaded
54
reference_url http://www.securityfocus.com/bid/24074
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/24074
55
reference_url http://www.securitytracker.com/id?1018088
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1018088
56
reference_url http://www.trustix.org/errata/2007/0019/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2007/0019/
57
reference_url http://www.ubuntu.com/usn/usn-466-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-466-1
58
reference_url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
59
reference_url http://www.vupen.com/english/advisories/2007/1894
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1894
60
reference_url http://www.vupen.com/english/advisories/2007/2229
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2229
61
reference_url http://www.vupen.com/english/advisories/2008/0049
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/0049
62
reference_url http://www.vupen.com/english/advisories/2009/1297
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1297
63
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=240200
reference_id 240200
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=240200
64
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425625
reference_id 425625
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=425625
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-2754
reference_id CVE-2007-2754
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-2754
67
reference_url https://security.gentoo.org/glsa/200705-22
reference_id GLSA-200705-22
reference_type
scores
url https://security.gentoo.org/glsa/200705-22
68
reference_url https://security.gentoo.org/glsa/200707-02
reference_id GLSA-200707-02
reference_type
scores
url https://security.gentoo.org/glsa/200707-02
69
reference_url https://security.gentoo.org/glsa/201006-01
reference_id GLSA-201006-01
reference_type
scores
url https://security.gentoo.org/glsa/201006-01
70
reference_url https://access.redhat.com/errata/RHSA-2007:0403
reference_id RHSA-2007:0403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0403
71
reference_url https://access.redhat.com/errata/RHSA-2009:0329
reference_id RHSA-2009:0329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0329
72
reference_url https://access.redhat.com/errata/RHSA-2009:1062
reference_id RHSA-2009:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1062
73
reference_url https://usn.ubuntu.com/466-1/
reference_id USN-466-1
reference_type
scores
url https://usn.ubuntu.com/466-1/
fixed_packages
aliases CVE-2007-2754
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3wjn-8gnc-gkhr
1
url VCID-cvba-wjra-wye9
vulnerability_id VCID-cvba-wjra-wye9
summary
Multiple vulnerabilities in FreeType might result in the remote execution
    of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1861.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-1861.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-1861
reference_id
reference_type
scores
0
value 0.08522
scoring_system epss
scoring_elements 0.92343
published_at 2026-04-01T12:55:00Z
1
value 0.08522
scoring_system epss
scoring_elements 0.9235
published_at 2026-04-02T12:55:00Z
2
value 0.08522
scoring_system epss
scoring_elements 0.92356
published_at 2026-04-04T12:55:00Z
3
value 0.08522
scoring_system epss
scoring_elements 0.9236
published_at 2026-04-07T12:55:00Z
4
value 0.08522
scoring_system epss
scoring_elements 0.92371
published_at 2026-04-08T12:55:00Z
5
value 0.08522
scoring_system epss
scoring_elements 0.92376
published_at 2026-04-09T12:55:00Z
6
value 0.08522
scoring_system epss
scoring_elements 0.92382
published_at 2026-04-13T12:55:00Z
7
value 0.08522
scoring_system epss
scoring_elements 0.92384
published_at 2026-04-12T12:55:00Z
8
value 0.08522
scoring_system epss
scoring_elements 0.92394
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-1861
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1861
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=484437
reference_id 484437
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=484437
4
reference_url https://security.gentoo.org/glsa/200607-02
reference_id GLSA-200607-02
reference_type
scores
url https://security.gentoo.org/glsa/200607-02
5
reference_url https://security.gentoo.org/glsa/200710-09
reference_id GLSA-200710-09
reference_type
scores
url https://security.gentoo.org/glsa/200710-09
6
reference_url https://security.gentoo.org/glsa/201006-01
reference_id GLSA-201006-01
reference_type
scores
url https://security.gentoo.org/glsa/201006-01
7
reference_url https://access.redhat.com/errata/RHSA-2006:0500
reference_id RHSA-2006:0500
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0500
8
reference_url https://access.redhat.com/errata/RHSA-2009:0329
reference_id RHSA-2009:0329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0329
9
reference_url https://access.redhat.com/errata/RHSA-2009:1062
reference_id RHSA-2009:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1062
10
reference_url https://usn.ubuntu.com/291-1/
reference_id USN-291-1
reference_type
scores
url https://usn.ubuntu.com/291-1/
fixed_packages
aliases CVE-2006-1861
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cvba-wjra-wye9
2
url VCID-f9ym-em5n-87ep
vulnerability_id VCID-f9ym-em5n-87ep
summary
Multiple integer overflows in FreeType might allow for the remote execution
    of arbitrary code or a Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0946.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0946.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0946
reference_id
reference_type
scores
0
value 0.16376
scoring_system epss
scoring_elements 0.94827
published_at 2026-04-01T12:55:00Z
1
value 0.16376
scoring_system epss
scoring_elements 0.94836
published_at 2026-04-02T12:55:00Z
2
value 0.16376
scoring_system epss
scoring_elements 0.9484
published_at 2026-04-04T12:55:00Z
3
value 0.16376
scoring_system epss
scoring_elements 0.94842
published_at 2026-04-07T12:55:00Z
4
value 0.16376
scoring_system epss
scoring_elements 0.94851
published_at 2026-04-08T12:55:00Z
5
value 0.16376
scoring_system epss
scoring_elements 0.94856
published_at 2026-04-09T12:55:00Z
6
value 0.16376
scoring_system epss
scoring_elements 0.9486
published_at 2026-04-11T12:55:00Z
7
value 0.16376
scoring_system epss
scoring_elements 0.94863
published_at 2026-04-12T12:55:00Z
8
value 0.16376
scoring_system epss
scoring_elements 0.94864
published_at 2026-04-13T12:55:00Z
9
value 0.16376
scoring_system epss
scoring_elements 0.94872
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0946
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=491384
reference_id 491384
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=491384
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524925
reference_id 524925
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524925
5
reference_url https://security.gentoo.org/glsa/200905-05
reference_id GLSA-200905-05
reference_type
scores
url https://security.gentoo.org/glsa/200905-05
6
reference_url https://security.gentoo.org/glsa/201412-08
reference_id GLSA-201412-08
reference_type
scores
url https://security.gentoo.org/glsa/201412-08
7
reference_url https://access.redhat.com/errata/RHSA-2009:0329
reference_id RHSA-2009:0329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0329
8
reference_url https://access.redhat.com/errata/RHSA-2009:1061
reference_id RHSA-2009:1061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1061
9
reference_url https://access.redhat.com/errata/RHSA-2009:1062
reference_id RHSA-2009:1062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1062
10
reference_url https://usn.ubuntu.com/767-1/
reference_id USN-767-1
reference_type
scores
url https://usn.ubuntu.com/767-1/
fixed_packages
aliases CVE-2009-0946
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f9ym-em5n-87ep
3
url VCID-rcck-xn4c-k3at
vulnerability_id VCID-rcck-xn4c-k3at
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717
reference_id
reference_type
scores
url http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=717
1
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
2
reference_url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
3
reference_url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
4
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2008-August/064118.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1808.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1808.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1808
reference_id
reference_type
scores
0
value 0.0261
scoring_system epss
scoring_elements 0.8566
published_at 2026-04-16T12:55:00Z
1
value 0.0261
scoring_system epss
scoring_elements 0.85565
published_at 2026-04-01T12:55:00Z
2
value 0.0261
scoring_system epss
scoring_elements 0.85577
published_at 2026-04-02T12:55:00Z
3
value 0.0261
scoring_system epss
scoring_elements 0.85594
published_at 2026-04-04T12:55:00Z
4
value 0.0261
scoring_system epss
scoring_elements 0.856
published_at 2026-04-07T12:55:00Z
5
value 0.0261
scoring_system epss
scoring_elements 0.8562
published_at 2026-04-08T12:55:00Z
6
value 0.0261
scoring_system epss
scoring_elements 0.85631
published_at 2026-04-09T12:55:00Z
7
value 0.0261
scoring_system epss
scoring_elements 0.85644
published_at 2026-04-11T12:55:00Z
8
value 0.0261
scoring_system epss
scoring_elements 0.85641
published_at 2026-04-12T12:55:00Z
9
value 0.0261
scoring_system epss
scoring_elements 0.85637
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1808
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1808
9
reference_url http://secunia.com/advisories/30600
reference_id
reference_type
scores
url http://secunia.com/advisories/30600
10
reference_url http://secunia.com/advisories/30721
reference_id
reference_type
scores
url http://secunia.com/advisories/30721
11
reference_url http://secunia.com/advisories/30740
reference_id
reference_type
scores
url http://secunia.com/advisories/30740
12
reference_url http://secunia.com/advisories/30766
reference_id
reference_type
scores
url http://secunia.com/advisories/30766
13
reference_url http://secunia.com/advisories/30819
reference_id
reference_type
scores
url http://secunia.com/advisories/30819
14
reference_url http://secunia.com/advisories/30821
reference_id
reference_type
scores
url http://secunia.com/advisories/30821
15
reference_url http://secunia.com/advisories/30967
reference_id
reference_type
scores
url http://secunia.com/advisories/30967
16
reference_url http://secunia.com/advisories/31479
reference_id
reference_type
scores
url http://secunia.com/advisories/31479
17
reference_url http://secunia.com/advisories/31577
reference_id
reference_type
scores
url http://secunia.com/advisories/31577
18
reference_url http://secunia.com/advisories/31707
reference_id
reference_type
scores
url http://secunia.com/advisories/31707
19
reference_url http://secunia.com/advisories/31709
reference_id
reference_type
scores
url http://secunia.com/advisories/31709
20
reference_url http://secunia.com/advisories/31711
reference_id
reference_type
scores
url http://secunia.com/advisories/31711
21
reference_url http://secunia.com/advisories/31712
reference_id
reference_type
scores
url http://secunia.com/advisories/31712
22
reference_url http://secunia.com/advisories/31823
reference_id
reference_type
scores
url http://secunia.com/advisories/31823
23
reference_url http://secunia.com/advisories/31856
reference_id
reference_type
scores
url http://secunia.com/advisories/31856
24
reference_url http://secunia.com/advisories/31900
reference_id
reference_type
scores
url http://secunia.com/advisories/31900
25
reference_url http://secunia.com/advisories/33937
reference_id
reference_type
scores
url http://secunia.com/advisories/33937
26
reference_url http://secunia.com/advisories/35204
reference_id
reference_type
scores
url http://secunia.com/advisories/35204
27
reference_url http://security.gentoo.org/glsa/glsa-200806-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200806-10.xml
28
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
29
reference_url http://securitytracker.com/id?1020240
reference_id
reference_type
scores
url http://securitytracker.com/id?1020240
30
reference_url https://issues.rpath.com/browse/RPL-2608
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-2608
31
reference_url http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?group_id=3157&release_id=605780
32
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11188
33
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-239006-1
34
reference_url http://support.apple.com/kb/HT3026
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3026
35
reference_url http://support.apple.com/kb/HT3129
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3129
36
reference_url http://support.apple.com/kb/HT3438
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3438
37
reference_url http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2008-318.htm
38
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00717.html
39
reference_url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00721.html
40
reference_url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255
reference_id
reference_type
scores
url http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0255
41
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:121
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:121
42
reference_url http://www.redhat.com/support/errata/RHSA-2008-0556.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0556.html
43
reference_url http://www.redhat.com/support/errata/RHSA-2008-0558.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0558.html
44
reference_url http://www.redhat.com/support/errata/RHSA-2009-0329.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0329.html
45
reference_url http://www.securityfocus.com/archive/1/495497/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495497/100/0/threaded
46
reference_url http://www.securityfocus.com/archive/1/495869/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/495869/100/0/threaded
47
reference_url http://www.securityfocus.com/bid/29637
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29637
48
reference_url http://www.securityfocus.com/bid/29639
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/29639
49
reference_url http://www.ubuntu.com/usn/usn-643-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-643-1
50
reference_url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2008-0014.html
51
reference_url http://www.vmware.com/support/player2/doc/releasenotes_player2.html
reference_id
reference_type
scores
url http://www.vmware.com/support/player2/doc/releasenotes_player2.html
52
reference_url http://www.vmware.com/support/player/doc/releasenotes_player.html
reference_id
reference_type
scores
url http://www.vmware.com/support/player/doc/releasenotes_player.html
53
reference_url http://www.vmware.com/support/server/doc/releasenotes_server.html
reference_id
reference_type
scores
url http://www.vmware.com/support/server/doc/releasenotes_server.html
54
reference_url http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
reference_id
reference_type
scores
url http://www.vmware.com/support/ws55/doc/releasenotes_ws55.html
55
reference_url http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
reference_id
reference_type
scores
url http://www.vmware.com/support/ws6/doc/releasenotes_ws6.html
56
reference_url http://www.vupen.com/english/advisories/2008/1794
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1794
57
reference_url http://www.vupen.com/english/advisories/2008/1876/references
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/1876/references
58
reference_url http://www.vupen.com/english/advisories/2008/2423
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2423
59
reference_url http://www.vupen.com/english/advisories/2008/2466
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2466
60
reference_url http://www.vupen.com/english/advisories/2008/2525
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2525
61
reference_url http://www.vupen.com/english/advisories/2008/2558
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2558
62
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=450774
reference_id 450774
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=450774
63
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841
reference_id 485841
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485841
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-1808
reference_id CVE-2008-1808
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-1808
77
reference_url https://security.gentoo.org/glsa/200806-10
reference_id GLSA-200806-10
reference_type
scores
url https://security.gentoo.org/glsa/200806-10
78
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
79
reference_url https://access.redhat.com/errata/RHSA-2008:0556
reference_id RHSA-2008:0556
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0556
80
reference_url https://access.redhat.com/errata/RHSA-2008:0558
reference_id RHSA-2008:0558
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0558
81
reference_url https://access.redhat.com/errata/RHSA-2009:0329
reference_id RHSA-2009:0329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0329
82
reference_url https://usn.ubuntu.com/643-1/
reference_id USN-643-1
reference_type
scores
url https://usn.ubuntu.com/643-1/
fixed_packages
aliases CVE-2008-1808
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rcck-xn4c-k3at
Fixing_vulnerabilities
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/freetype@2.1.4-12%3Farch=el3